Cyber Security Awareness Training
Learning Outcomes
2 Topics
Welcome to Cyber Security Awareness Training
Learning Outcomes
Introduction
9 Topics
|
1 Quiz
Every Day…
Vandalism
Real Threat: World (1 of 4)
Real Threat: World (2 of 4)
Real Threat: World (3 of 4)
Real Threat: World (4 of 4)
Real Threat: ABC Corp
IT Cyber Response team (1 of 2)
IT Cyber Response team (2 of 2)
Cyber Security Introduction Quiz
Phishing
30 Topics
|
3 Quizzes
Real Threat: World
Introduction (1 of 2)
Introduction (2 of 2)
Reality Check
Anatomy of an email
Anatomy of an email: The Sender (1 of 3)
Anatomy of an email: The sender (2 of 3)
Anatomy of an email: The Sender (3 of 3)
Anatomy of an email: How to check a web address
Anatomy of an email: Identifying phishing links
Phishing Knowledge Check
Anatomy of an email: The Subject (1 of 2)
Anatomy of an email: The Subject (2 of 2)
Anatomy of an email: The Body (1 of 4)
Anatomy of an email: The Body (2 of 4)
Anatomy of an email: The Body (3 of 4)
Anatomy of an email: The Body (4 of 4)
Anatomy of an email: The Closing (1 of 2)
Anatomy of an email: The Closing (2 of 2)
Investigating an email (1 of 2)
Investigating an email (2 of 2)
Social Media
9 Topics
|
1 Quiz
Introduction (1 of 2)
Introduction (2 of 2)
How we get attacked
Social media sites can be dangerous (1 of 5)
Social media sites can be dangerous (2 of 5)
Social media sites can be dangerous (3 of 5)
Social media sites can be dangerous (4 of 5)
Social media sites can be dangerous (5 of 5)
Social media guidance
Knowledge Check
Computing Devices
9 Topics
|
1 Quiz
Introduction
Lost or stolen devices
Social networking apps & websites
Personal email
DO NOT! (1 of 5)
DO NOT! (2 of 5)
DO NOT! (3 of 5)
DO NOT! (4 of 5)
DO NOT! (5 of 5)
Knowledge Check
Non-Company Equipment
4 Topics
Introduction
Non-standard equipment and software (1 of 3)
Non-standard equipment and software (2 of 3)
Non-standard equipment and software (3 of 3)
Passwords
8 Topics
|
1 Quiz
Real threat: World (1 of 2)
Real threat: World (2 of 2)
Introduction (1 of 3)
Introduction (2 of 3)
Introduction (3 of 3)
Characteristics of a strong password
Passwords
Passwords best practices
Knowledge Check
Closing
4 Topics
Review – Wherever company data is stored, it is at risk
Review – Always
Review – Never
People are the first and last line of defense!
Previous Topic
Learning Outcomes
Cyber Security Awareness Training
Learning Outcomes
Learning Outcomes
Play Audio
https://darasaonlinebusinessbucket.s3.amazonaws.com/wp-content/uploads/2023/02/13081855/CyberSecurity_learning-outcomes.mp3
Copyright © Darasa Online Ltd – All Rights Reserved
Previous Topic
Back to Lesson