Online Cybersecurity & Information Technology Awareness Training
Our online Cyber security awareness platform allows you to customize your training to fit your organization’s needs and schedule.
- The modules are delivered online and involves a number of interactive exercises that help in the learning experience.
- Different groups of users can be assigned different modules and durations.
- Phishing emails are also sent during the course of the year.
- Reporting will be done after every 90 days or as requested.
At the end of this course participants will be able to:
Understand the basics of an IT architecture
Understand and know how they can help keep information and data safe and why
Understand any regulations, acts and laws that interact with their day to day use of technology and how they affect them Understand how to use technology safely and wisely and why Understand what technologies help keep their system safe from hackers, viruses, spam, and other risks
Understand data protection guidelines as they relate to the Data Protection Act and the Freedom of Information Act Understand good practices when using the Internet, email and social media and how to use these wisely and safely
2. Password Security
5. Mobile Security
6. Mobile Wi-Fi Security
7. Public Networks and Computers
8. Social Engineering
9. Safe Web Browsing
10. Working Remotely
11. Physical Security
12. Removeable Media
13. PCI DSS
14. Privacy and PII
15. International Travel Security
16. Avoiding Cybersecurity Risks for Executes
17. Social Media
On-Site Cyber Security Training
We can also deliver cyber security training in person at your office of place of business. This may be preffered when you want a more ‘hands-on,’ personal approach or there are specific topics you want to cover in detail.
At the end of this course participants will understand:
The basics of an IT architecture
Why and how they can keep information safe
The regulations, acts and laws that interact with their day to day use of technology
How to use technology safely and wisely
What technologies help keep their system safe from hackers, viruses, spam and other risks
Data protection guideslines as they relate to the Data Protection Act and the Freedom of Information Act
Good practices when using the Internet, email and social media