
Please Login to access this course.
Course Description
Packed with basic cybersecurity techniques, principals and best practices. It is intended to educate computer users to operate corporate issued digital devices and the company’s network in a secure fashion. Well trained computer users have proven to be much more effective than any cybersecurity solution when it comes to preventing a data breach.
The course is broken down into several lessons that are comprised of written content, informative images, videos, and a short quiz. Lessons can taken one at time, and the system will save your progress so the training can be resumed at a later time within a 30 day period. Users must take and pass the quiz of each lesson before they can move on to the next one. Once you conclude the training, a certificate of completion will be generated and may be downloaded at the end of the course for your records.
Content:
- Introduction
- Understand Your Environment
- Social Engineering
- Phishing
- Targeted Email SCAMS
- Smishing
- Vishing
- Fake Technical Support
- Passwords Best Practices
- Malware fundamentals
- Safely Accessing Corporate Assets