Cyber Security Awareness Training

Icon-videos

ELEARNING (SELF-PACED)

Duration: 02:00 Hours

Videos: 14

COST: $39

AUDIENCE: Everyone

PREREQS:

None

Aziksa Security Awareness Training specializes in helping employees understand the mechanisms of spam, phishing, spear-phishing, malware and social engineering and are able to apply this knowledge in their day-to-day job.

Data Protection

Learn about a variety of data protection issues including your responsibilities toward data privacy, data destruction standards, and dangers of leaving private/confidential information out in the open.

Insider Treats 

Topics include the danger posed by insider threats, the three types of insider threats, and what to do if you observe suspicious activity.

Malicious Links

Learn how seemingly safe links can be dangerous, how to identify the components of a link and break down the parts of a URL, and what to do if you are targeted with a malicious link.

Malware

Understand the definition of malware, common varieties of malware, how malware is used, and the value and limitations of anti-virus software.

Mobile Devices

Learn how malware is delivered to your mobile device, ways to protect your device, and what to do if your device is lost or stolen.

Passwords

How to protect your passwords, the different cyber-attacks that put your password at risk, what constitutes a strong password, how to manage your passwords, and how multi-factor authentication keeps your account safer.

Physical Security

Lean what can happen when your device is stolen, why you might be a target for device theft, what is physical security, and steps that will enhance the security of your device.

Security Outside the Office

What are the most dangerous attack methods that put your information at risk, the risks of using a portable storage device, the difference between a public and a secure network, and what to do if your device is lost or stolen.

Social Networking 

Protect yourself when posting online, how apps can make you vulnerable, what makes a site a social network, and how to utilize privacy settings.

Social Engineering

Learn the difference between a technical and non-technical attack, different types of social engineering, and what to do if you are the target of a social engineering scam.

Spear Phishing

The dangers of spear fishing and why spear phishing poses a threat to your organization, the three types of spear phishing emails, and the indicators of a spear phishing email.

Surfing the Web 

Learn about the safest way to surf the web, secure websites, and how to identify and avoid malicious sites and links.

Icon-linkedin Icon-twitter Icon-fb Icon-youtube