Cyber Security

Duration
60 minutes

Contents

  • Module 1 - IT Security Management
    - General aspects
    - Definitions
    - Scopes
    - Countermeasures
    - Safety standards
  • Module 2 - Information systems security standards
    - Password
    - Hardware
    - Software
    - E-mail
    - Internet
    - VPN


Recipients
The course is aimed at owners, administrators, managers or employees who - for reasons of regulatory or corporate organizational compliance - must receive training and information on this topic

Prerequisites
There are no access requirements.

Certificates
At the end of the course, a certificate of attendance will be issued which can be downloaded directly from the platform.


Online Security Fundamentals

Duration
45 minutes

Goals
The course provides some basic strategies for protecting yourself from online threats in order to safeguard networks and devices from cyber criminals. It also suggests how to act quickly to limit the danger in the event of an attack.

Contents
- What is cybersecurity?
- Best practices for surfing the internet safely
- Tips for using public Wi-Fi safely
- Safe use of social media
- Deal with an accident safely
- Assess understanding
- Summary


Prerequisites
There are no specific access requirements.

Certificates
At the end of the course, a certificate of attendance will be issued which can be downloaded directly from the platform.

 


How to Protect Yourself against Phishing Attacks

Duration
30 minutes

Goals
The course provides information on the characteristics of phishing attacks. It also gives suggestions on how to prevent theft and stop any attackers in time.

Contents
- What is phishing?
- Protect company email from possible attacks
- Prevent phone or vishing attacks
- Protect yourself from malware
- Assessment
- Summary

Prerequisites
There are no specific access requirements.

Certificates
At the end of the course, a certificate of attendance will be issued which can be downloaded directly from the platform.


How to Protect Your Data

Duration
30 minutes

Goals
The course explains what confidential data consists of, why it is important to keep it safe, and what essential security best practices are that include both cyberspace and physical facilities.

Contents
- What is confidential data?
- How to protect confidential information
- Create and manage strong passwords
- A Guide to multi-factor authentication
- Security of portable devices and removable media
- Using physical security to keep facilities and assets safe

Prerequisites
There are no specific access requirements.

Certificates
At the end of the course, a certificate of attendance will be issued which can be downloaded directly from the platform.


What is Social Engineering?

Duration
30 minutes

Goals
This course provides an overview of how "social engineers" exploit human psychology to access sensitive information, as well as tips for recognizing attacks.

Contents
- What is Social Engineering?
- How does it work?
- How to spot an attack
- Types of attack
- Quiz

Prerequisites
There are no specific access requirements.

Certificates
At the end of the course, a certificate of attendance will be issued which can be downloaded directly from the platform.


Spot the Phish

Duration
15 minutes

Goals
This mini-course explains how to recognize a phishing email.

Contents
- Phishing emails
- Facts about phishing

Prerequisites
There are no specific access requirements.

Certificates
At the end of the course, a certificate of attendance will be issued which can be downloaded directly from the platform.