Cybersecurity awerness training
Gain essential cyber security knowledge and skills, to help protect your digital life.
MISSION
Vulnerability – potential for a security breach
Threat – exploit of a vulnerability
Action –protect your information against threats and vulnerabilities.
Cybersecurity awareness is very relevant in any organisation and it is not a question of if but when you are attacked
Every individual and every organization will at some point in time be affected by an attack.
The potential impact to you and your business is enormous.
We teach you to understand the most common threats, attacks and vulnerabilities.
Gain insights on the challenges companies and organisations face and how your business should protect their operations from attacks both internally and externally.
Benefit 1
Training developed by The Open University with support from the UK Government’s National Cyber Security Programme
Benefit 2
Certified by APMG on behalf of the NCSC (part of GCHQ).
” Course meets the awareness level requirements of NCSC Assured Training”
The Institute of Information Security Professionals: (IISP)
” demonstrates awareness of cyber security issues across 12 of the IISP skills groups”
OUTLINE
Understand the security threat landscape.
Learn how to protect your computers and your digital information.
Securing your digital information
Learn how to secure your sensitive information online
Malware and how it gets into your computer
Learn about malware, phishing and how to be more security aware
defending against phishing
Learn how to spot a phishing email and be alert against phishing attempts
Understanding common threats
Learn about different kinds of threats
and how to guard against them.
threat actors are impersonating you
Learn various ways of improving your password security
Secure your devices
Learn how to update your devices and protect them from unauthorized use
Reporting breaches
Learn the importance of reporting any security incident so that it can be contained and controlled
FAQ
What are the most common types of attacks?
fradulent emails
fraudlent website directions
viruses-spyware-malware
Hacking of Bank accounts
Ransomeware
Unauthorized use of computers by outsiders
Unaothorized use of computers by staff
What is Phishing?
A form of social engineering where you get an email from someone you believe is genuine
How are passwords attacked?
1. Dictionary attacks which use hashed values of words-slow but sure
2. Brute force attack- computer will work through all possible passwords (so beginning with ‘A’, then ‘AA’, ‘AB’ and so on …) until it stumbles upon an actual password.
Why should you only download apps from official sites?
Official sites have to meet certain legal requirements like permissions and privacy laws so they have a trust policy.
What is Malware?
Short for malicious software
2 most common ones are:
Spyware- used to steal you information
Ransomware – used to extract money from you in return to give you back control of your own computer
What is the best way of storing passwords?
1. write them down,but secure them safely
2. With a password manager with security for all of your accounts.
3. In your browser, password protect your device in case it is lost or stolen.
Should you ignore a software update notice?
Ignoring the update completely could put your device at risk
Why is it important to report a cyber security incident as soon as possible?
To reduce the impact of any potential harm and damage to other hardware
Cyber Awerness Training
We help your business avoid and protect against cyberattacks by using training methods approved by NCSC (part of GCHQ).