Do you ever worry about falling victim to cyberattacks? In the bustling metropolis of CPU City, cybercriminals are always lurking! This cybersecurity awareness course will equip you with the knowledge to navigate the digital world safely.
Program Description:
- Evil Twin: An “Evil Twin” is a technique hackers use gain to access your information through phony Wi-Fi access points that appears to be legitimate. Evil Twins can be difficult to spot because they often have names very similar to authentic access points. This short instructional video highlights simple steps you can take to evade an Evil Twin attack.
- Home Invasion: The Internet of Terrors?: It is projected that by 2025, there will be over 75 billion “things” connected to the Internet, otherwise known as the Internet of Things (IoT). Such massive connectivity will make life much more convenient for you, but potentially for criminals as well. Many of these devices do not use current security features and are very susceptible to hackers. Watch this video to learn more about what you can do to help protect yourself from IoT threats.
- The In-Personator: A Social Engineering Threat: Social engineers prepare themselves by thoroughly researching their targets before launching an in-person attack. They will often go as far as disguising themselves as a repair person, or maybe even impersonating a uniformed worker. Although social engineers can be tricky, you can prevent an in-person attack by following the tips outlined in this social engineering training video.
- Typosquatting: Cybersquatters are counting on you to make a typing error that leads you to a bogus site. The attack is called typosquatting and it’s an emerging threat that can yield big returns in more ways than you might think. Watch the video to find out what to look for and how to protect against this menacing attack.
- USB Baiting: Don’t Take the Bait: Compromised USB drives can be used to inject malicious code, redirect you to phishing websites, or give a hacker remote access to your computer. In this video, an employee is faced with a decision that could ultimately decide the fate of his organization. Watch to find out what he does (or doesn’t do) to protect himself and what you can do to avoid being victimized by an uncanny social engineering attack.
- Dial V for Vishing: In this episode, Private File uncovers an evil physical security plot that releases mayhem upon our beloved CPU City. Learn how the plot unfolds and what strategies can be used to combat the menacing physical threat we call tailgating.
- Tales from CPU City: Crypto jacking: Episode One of Tales from CPU City takes place at the CPU City Clinic. Find out what happens when an ailing laptop checks in to see why his performance is faltering and learn what you can do to help protect your computer from being crypto jacked.
- Tales from CPU City: Tailgating: In this episode, Private File uncovers an evil physical security plot that releases mayhem upon our beloved CPU City. Learn how the plot unfolds and what strategies can be used to combat the menacing physical threat we call tailgating.
Audience: This course is intended for all employees.
Registration: Registration is Per-Participant and includes 4 weeks access. Time to complete course is approximately 4 hours.
Bundle Options Available! Are there a few self-paced online courses you would like to see offered in a bundle at a bundle price? Contact Emily@CFTeducation.org to discuss today!
