Role Based Information Security Awareness Training
Posted on 22 Mar 13:16 | by mitsumi | 6 views
Role Based Information Security Awareness Training
Published 3/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.79 GB | Duration: 1h 33m
General users & role specific scenarios of cyber risks
Published 3/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.79 GB | Duration: 1h 33m
General users & role specific scenarios of cyber risks
What you'll learn
Identify common security threats and attacks that can impact your organization and recognize the signs of a potential security breach.
Understand the importance of role-based security and the specific responsibilities and best practices for your job function to maintain a secure workplace.
Be more vigilant post the training
Contribute to the Organizations security overall
Requirements
No prior Experience needed, some basic understanding of day to day systems would suffice
Description
Welcome to the Ultimate Information Security Awareness Course! In today's world, information is the most valuable commodity, and the consequences of losing it can be catastrophic. As a result, information security has become a critical issue in organizations worldwide. Whether you're an employee, manager, or CEO, understanding the basics of information security is essential to keep your organization safe from cyber-attacks, data breaches, and other malicious activities.In this course, we'll dive deep into the world of information security and provide you with a comprehensive understanding of the role that you play in keeping your organization safe. This course was developed after extensive research over a period of time by industry experts to identify the scenarios that could present themselves based on the roles. We have also tried to making very captivating for the learners to be engaged and enjoy the learning process.Our course is specifically tailored to your role, whether you're from C-Suite, Marketing, Mergers & Acquisition or a HR, Legal or Finance professional or end-user, ensuring that you have the necessary knowledge to secure your organization's information assets effectively. With practical exercises, real-life case studies, and expert advice from seasoned security professionals, you'll gain the confidence and expertise to manage your organization's security risks.Join us on this exciting journey to take your information security awareness to the next level!
Overview
Lecture 1 Introduction
Section 1: Introduction to General Cyber Awareness
Lecture 2 Why Security is important
Section 2: Phishing- Game of Emotions
Lecture 3 Game of Emotions
Lecture 4 Desire
Lecture 5 Fear
Lecture 6 Curiosity
Lecture 7 Impulse
Lecture 8 Trust & Happiness
Section 3: Types of Cyber Attacks
Lecture 9 Social Engineering, Phishing & Business Email Compromise (BEC)
Lecture 10 Vishing, Smishing & Spear Phishing
Lecture 11 Session Hijacking & Malvertizing
Section 4: Anatomy of a Phishing Email
Lecture 12 Anatomy of a Phishing Email
Section 5: How can you Make a Difference
Lecture 13 How can you make a Difference
Section 6: Role Based Scenarios Section - All employees & End Users
Lecture 14 Introduction to Role Based Scenarios Section
Lecture 15 Why are employees easy target for hackers
Lecture 16 Common Types of Attacks
Lecture 17 Phishing attacks (spear phishing, whaling, etc.)
Lecture 18 Types of Attacks Part 01
Lecture 19 Types of Attacks Part 02
Lecture 20 Cyber Frauds on Social Media
Lecture 21 Have you been clicking on ads or pop ups on sites & Internet of Things (IoT)
Lecture 22 Unusual scenarios where users are tricked Part 01
Lecture 23 Unusual scenarios where users are tricked Part 02
Lecture 24 How can you protect Yourself & the Organization
Lecture 25 Summary
Section 7: C-Suites
Lecture 26 Why are C-Suites subjected to Cyber Attacks
Lecture 27 What kind of attacks are planned against C-Suites
Lecture 28 How are attacks against C-Suites planned
Lecture 29 Techniques of gathering information
Lecture 30 What can one bad click result in & what should you do protect Yourself
Section 8: Human Resource (HR)
Lecture 31 Why Human Resource (HR) professionals are targets of Cyber Attacks
Lecture 32 Cyber frauds relevant to HR Function
Lecture 33 What can one bad click do
Lecture 34 Summary of Cyber frauds in HR
Lecture 35 What can HR Professionals do protect themselves from Cyber Threats
Section 9: Mergers & Acquistions (M&A)
Lecture 36 Why are Mergers & Acquisitions (M&A) teams targetted
Lecture 37 What are the different kinds of attacks M&A teams face
Lecture 38 What can bad click result in & how can you protect
Section 10: Legal
Lecture 39 Why & how legal teams & are facing Cyber Threats
Lecture 40 A realtime scenario where "one bad click " caused a catastrophic effect
Lecture 41 What can legal professionals do to protect themselves from Cyber Threats
Lecture 42 Summary of role & scenario based section
Section 11: Course conclusion
Lecture 43 Course conclusion & summary
This course is for users who connect to internet and for all employees in an organization
Download link
rapidgator.net:
https://rapidgator.net/file/81f93ebb35c715d7c49158307e05a1b8/lbpqd.Role.Based.Information.Security.Awareness.Training.part1.rar.html
https://rapidgator.net/file/df811a2366a64ce1462dbffc39bbafd6/lbpqd.Role.Based.Information.Security.Awareness.Training.part2.rar.html
uploadgig.com:
https://uploadgig.com/file/download/4a685226797417e2/lbpqd.Role.Based.Information.Security.Awareness.Training.part1.rar
https://uploadgig.com/file/download/2989f97845A37Cf5/lbpqd.Role.Based.Information.Security.Awareness.Training.part2.rar
nitro.download:
https://nitro.download/view/AB285AE915BA306/lbpqd.Role.Based.Information.Security.Awareness.Training.part1.rar
https://nitro.download/view/0C41708CA9F5BFA/lbpqd.Role.Based.Information.Security.Awareness.Training.part2.rar
1dl.net:
https://1dl.net/xhpdivkvj3cs/lbpqd.Role.Based.Information.Security.Awareness.Training.part1.rar
https://1dl.net/8tc7hn9qm3s4/lbpqd.Role.Based.Information.Security.Awareness.Training.part2.rar
Related News
System Comment
Information
Users of Visitor are not allowed to comment this publication.
Facebook Comment
Member Area
Top News