Cyber Security
Duration
60 minutes
Contents
- Module 1 - IT Security Management
- General aspects
- Definitions
- Scopes
- Countermeasures
- Safety standards - Module 2 - Information systems security standards
- Password
- Hardware
- Software
- E-mail
- Internet
- VPN
Recipients
The course is aimed at owners, administrators, managers or employees who - for reasons of regulatory or corporate organizational compliance - must receive training and information on this topic
Prerequisites
There are no access requirements.
Certificates
At the end of the course, a certificate of attendance will be issued which can be downloaded directly from the platform.
Online Security Fundamentals
Duration
45 minutes
Goals
The course provides some basic strategies for protecting yourself from online threats in order to safeguard networks and devices from cyber criminals. It also suggests how to act quickly to limit the danger in the event of an attack.
Contents
- What is cybersecurity?
- Best practices for surfing the internet safely
- Tips for using public Wi-Fi safely
- Safe use of social media
- Deal with an accident safely
- Assess understanding
- Summary
Prerequisites
There are no specific access requirements.
Certificates
At the end of the course, a certificate of attendance will be issued which can be downloaded directly from the platform.
How to Protect Yourself against Phishing Attacks
Duration
30 minutes
Goals
The course provides information on the characteristics of phishing attacks. It also gives suggestions on how to prevent theft and stop any attackers in time.
Contents
- What is phishing?
- Protect company email from possible attacks
- Prevent phone or vishing attacks
- Protect yourself from malware
- Assessment
- Summary
Prerequisites
There are no specific access requirements.
Certificates
At the end of the course, a certificate of attendance will be issued which can be downloaded directly from the platform.
How to Protect Your Data
Duration
30 minutes
Goals
The course explains what confidential data consists of, why it is important to keep it safe, and what essential security best practices are that include both cyberspace and physical facilities.
Contents
- What is confidential data?
- How to protect confidential information
- Create and manage strong passwords
- A Guide to multi-factor authentication
- Security of portable devices and removable media
- Using physical security to keep facilities and assets safe
Prerequisites
There are no specific access requirements.
Certificates
At the end of the course, a certificate of attendance will be issued which can be downloaded directly from the platform.
What is Social Engineering?
Duration
30 minutes
Goals
This course provides an overview of how "social engineers" exploit human psychology to access sensitive information, as well as tips for recognizing attacks.
Contents
- What is Social Engineering?
- How does it work?
- How to spot an attack
- Types of attack
- Quiz
Prerequisites
There are no specific access requirements.
Certificates
At the end of the course, a certificate of attendance will be issued which can be downloaded directly from the platform.
Spot the Phish
Duration
15 minutes
Goals
This mini-course explains how to recognize a phishing email.
Contents
- Phishing emails
- Facts about phishing
Prerequisites
There are no specific access requirements.
Certificates
At the end of the course, a certificate of attendance will be issued which can be downloaded directly from the platform.