Skip to content
Cybersecurity Awareness Training
Learning Outcomes Sample Lesson
Welcome to Cybersecurity Awareness Training
Learning Outcomes
Introduction
Every Day…
Vandalism
Real Threat: World (1 of 4)
Real Threat: World (2 of 4)
Real Threat: World (3 of 4)
Real Threat: World (4 of 4)
Real Threat: ABC Corp
IT Cyber Response team (1 of 2)
IT Cyber Response team (2 of 2)
Cybersecurity Introduction Quiz
Phishing
Real Threat: World
Introduction (1 of 2)
Introduction (2 of 2)
Reality Check
Anatomy of an email
Anatomy of an email: The Sender (1 of 3)
Anatomy of an email: The sender (2 of 3)
Anatomy of an email: The Sender (3 of 3)
Anatomy of an email: How to check a web address
Anatomy of an email: Identifying phishing links
Phishing Knowledge Check
Anatomy of an email: The Subject (1 of 2)
Anatomy of an email: The Subject (2 of 2)
Anatomy of an email: The Body (1 of 4)
Anatomy of an email: The Body (2 of 4)
Anatomy of an email: The Body (3 of 4)
Anatomy of an email: The Body (4 of 4)
Anatomy of an email: The Closing (1 of 2)
Anatomy of an email: The Closing (2 of 2)
Investigating an email (1 of 2)
Investigating an email (2 of 2)
1 of 2
Social Media
Introduction (1 of 2)
Introduction (2 of 2)
How we get attacked
Social media sites can be dangerous (1 of 5)
Social media sites can be dangerous (2 of 5)
Social media sites can be dangerous (3 of 5)
Social media sites can be dangerous (4 of 5)
Social media sites can be dangerous (5 of 5)
Social media guidance
Knowledge Check
Computing Devices
Introduction
Lost or stolen devices
Social networking apps & websites
Personal email
DO NOT! (1 of 5)
DO NOT! (2 of 5)
DO NOT! (3 of 5)
DO NOT! (4 of 5)
DO NOT! (5 of 5)
Knowledge Check
Non-Company Equipment
Introduction
Non-standard equipment and software (1 of 3)
Non-standard equipment and software (2 of 3)
Non-standard equipment and software (3 of 3)
Passwords
Real threat: World (1 of 2)
Real threat: World (2 of 2)
Introduction (1 of 3)
Introduction (2 of 3)
Introduction (3 of 3)
Characteristics of a strong password
Passwords
Passwords best practices
Knowledge Check
Closing
Review – Wherever company data is stored, it is at risk
Review – Always
Review – Never
People are the first and last line of defense!
Darasa Online image alt logo
Previous Topic
Next Lesson

Learning Outcomes

  1. Cybersecurity Awareness Training
  2. Learning Outcomes
  3. Learning Outcomes
Play Audio
https://darasaonlinebusinessbucket.s3.amazonaws.com/wp-content/uploads/2023/02/13081855/CyberSecurity_learning-outcomes.mp3

Copyright © Darasa Online Ltd – All Rights Reserved

Previous Topic
Back to Lesson
Next Lesson