eAgent Logo REA Training Provider Logo 📞 09-889-7653

Cybersecurity 1: Fundamentals for Employees

eAgent Member eAgent Member Login

new MemberNew Member Signup

enroll now

Cybersecurity 1: Fundamentals for Employees

Price: $ 49.95+GST

Cybersecurity 1 explores the murky world of cybercrime. It will ensure that staff gain an appreciation of the company-wide measures to protect against cyberattacks and their own role in the success of these defense measures. Importantly, it will help staff recognize Phishing Attacks and understand what steps to take when a cyberattack has been successful to mitigate the effect. It emphasizes the importance of practicing safe social media behavior to prevent cyber criminals from mining sensitive personal and company data. Each participant leaves with their own Personal Cybersecurity Plan to be ready to enter the fight against cybercrime.

Starting with an understanding of the history and the current state of cyberattacks in terms of quantity and cost to business this course has the participant explore the various forms of cybercrime so they know how to recognize and defend against them at a company and an individual level. Further it explores the role of information obtained on social media platforms in these attacks and allows so the participant to understand what they should and should not be putting on these platforms. This ends with participants creating their own Personal Cybersecurity Plan.

Table of Contents

1. Session One: Course Overview
Learning Objectives
Pre-Course Assessment
2. Session Two: The State of Cybercrime
History of Cybercrime
Recalling Cybercrimes
Historical Examples of Cybercrime Part One
Historical Examples of Cybercrime Part Two
Cost of Cybercrime Part One
Cost of Cybercrime Part Two
Cybercrime Circumstances
3. Session Three: Types of Cyberattacks
Types of Attacks
4. Session Four: Role of Human Error
The Role of Human Error
Opening Email
5. Session Five: What Can a Company Do?
Company-wide Defenses
Other Company-wide Defenses Part One
Other Company-wide Defenses Part Two
Focus on Social Media
How it Can Work
Create a Social Media Policy
6. Session Six: Best Practices for Remote or Travelling Employees
Out of Office Protections
7. Session Seven: Scenarios
Scenario: Malware
Scenario: Potential Data Breach
8. Session Eight: Cyberattacks on Individuals
Cyberattacks to Obtain Sensitive Information
Cyberattacks to Obtain Sensitive
Information Part Two
Malware (Malicious Software)
Social Media
Social Media Scams
9. Session Nine: Recognizing Phishing Attacks
The Giveaway Clues to Phishing Attacks
Spot the Clue
Email One
Email Two
Email Three
Phishing Emails
10. Session Ten: What Can a Person Do?
Supporting Company Efforts
Social Media
Focus on Spear Phishing
How to Protect the Organization Part One
How to Protect the Organization Part Two
Social Media Safety
11. Session Eleven: Creating a Personal Cybersecurity Plan
Cybersecurity Starts with You!
12. Personal Action Plan
Starting Point
Where I Want to Go
How I Will Get There
13. Course Summary
14. Recommended Reading List
15. Post-Course Assessment