Self-Paced Course Description:
This self-paced online bundle equips you with the knowledge and strategies to combat today’s most prevalent cybersecurity threats, both from external sources and from within your organization. Designed for all employees, regardless of technical background, this program will equip you with valuable knowledge so you play a crucial role in safeguarding your organization’s sensitive data and maintaining a secure work environment.
- An Introduction to Insider Threats
- Across the globe, organizations spend countless hours working to keep sensitive data out of the hands of cybercriminals. This task has become even more difficult to manage due to an increasing number of data compromises that stem from insider threats. This threat from within, or “insider threat” can be successfully addressed using the strategies shared in this module. In this module we will discuss the three types of insider threats, some recognizable behaviors associated with each type and provide simple yet effective strategies to counteract each threat.
- Defending Against Ransomware
- Ransomware is malicious software that prevents or restricts users from accessing computer systems or files until a ransom is paid. Computers typically become infected by ransomware when the user clicks on a malicious link or opens an infected attachment in an email. In addition to computers, ransomware can target mobile devices, smart TVs, and other Internet of Things (IoT) devices. But there are simple steps you can take to help protect yourself and your organization. This short video will provide you with the necessary information you need to protect yourself from ransomware.
- Preventing Malware: Mobile Devices
- This course acknowledges the commonplace usage of mobile devices at work and explains key vulnerabilities that users must be aware of. By mastering the information presented in this course you will be able to help defend your mobile devices from security threats.
- Protecting Against Malicious Insiders
- The threat is real. It’s taking place somewhere, right now. A malicious insider has decided to mount a cyberattack against your organization from the inside out. This malicious insider will stop at nothing to get the data they need to commit theft, fraud or sabotage. By applying the strategies provided in this module and being willing to take action you can help rid the workplace of these malicious insider threats. In this module you will learn what a malicious insider does, some recognizable threat indicators and simple yet effective ways to address the malicious insider threat.
- Ransomware: How to Defend Yourself
- Ransomware is a type of malicious software used by hackers to encrypt files and other functions from a user until the victim pays a “ransom.” This form of cyberattack has become one of the most used and most costly threats to businesses and individuals alike. By mastering the information presented in this course you will be able to help defend your personal and workplace data from ransomware threats.
- The Malware Threat
- Malware is any type of software that is intended to damage or disable computer systems. It is often used to steal information, destroy, or lock users from data, or disrupt operations. This course defines malware and the associated security threats and describes common types of malware. By mastering the information presented in this course you will be able to help defend your personal and workplace data from these threats.
Audience: This course is intended for all employees.
Registration: Registration is Per-Participant and includes 4 weeks access. Time to complete course is approximately 3 hours.
Bundle Options Available! Are there a few self-paced online courses you would like to see offered in a bundle at a bundle price? Contact Emily@CFTeducation.org to discuss today!
