This learning path will build the essential skills your team needs for cyber security awareness.
Protecting your personal data online is important, especially in this day and age. In this program, we are going to talk about the General Data Protection Regulation, also known as GDPR. While GDPR is not in effect in the United States, it still affects you, your data, and your company. If you're an EU citizen traveling in the United States, you are still protected by GDPR. This program is intended to give you helpful advice on what GDPR is. This is not, however, a definitive statement of law.
It's hard to have a conversation about cybersecurity without throwing around a lot of jargon, so in this course we're going to break down some common cybersecurity terms. We'll define cyberspace, cybersecurity, cybercrime, and cyberterrorism. We'll also go over other familiar terms including malware, phishing attacks and emails, and identity theft.
No matter how many times we're told to create strong passwords, or to use different passwords on every site, we just don't do it. It's not convenient. We know the risk, but we think "it won't happen to us." But the minute your information is compromised, and you're on the phone with your bank trying to determine when and how your identity was stolen, and how long it'll take to get access to your money, you'll regret being lazy about passwords. The Federal Trade Commission (FTC) estimates that recovering from identity theft takes an average of 6 months and 200 hours of work. In this program, we're going go over a system that helps you set unique passwords for each site. We'll also discuss some additional tips for making your passwords more creative.
Many of us forget that our phones are computers that are vulnerable to the same cyber threats as our desktops and laptops. There are things you can do to keep your mobile device safe, and we discuss them here.
The goal of cybersecurity is to protect your devices and your data. How does that work when you're traveling? What are the precautions that you need to take to keep your information safe? What happens if one of your devices gets stolen? What about unsecure Wi-Fi networks? What do you need to be aware of when using public networks? We'll answer these questions and more. We'll also discuss what you should do before you travel, while you're away, and what to do once you're back home.
In this course, we will define malware and go through the warning signs of being attacked. Then, we'll go through what to do to best mitigate any damage.
Certain types of malware can impact your computer in different ways, but in the end, the impact is usually expensive, time consuming, and frustrating. In order to help prevent a cyberattack, it's good to have an understanding of what's out there and how they get into your system. This course will walk viewers through the many types of malware including adware, bots, ransomware, rootkits, spyware, Trojan malware, computer viruses, and worms. We'll also discuss the warning signs that indicate a malware infection.
Ransomware is malware that infects your system and either locks it down or encrypts your files, and then demands a ransom for those files to be unlocked or restored. You know you have a ransomware attack when you receive a pop-up window demanding a ransom of a certain amount. It may also provide a way to contact the hacker and detail how that ransom should be paid. In this course, we'll discuss the different types of ransomware, what you should do if you receive a ransomware message, and how to protect yourself from it.
You've likely received phishing emails. They're the emails that bait you to click on them. They show up in all forms, from blatantly fake emails, to confusing emails coming from your actual contacts, to emails disguised to look just like your bank or Netflix, or some other trusted provider. They almost always contain a link that they want you to click, or prompt you to fill out a form, or pay money, or otherwise ask you to reveal personal information in some way. In this course, we'll discuss why phishing emails are so successful, what you should do if you suspect you've received a phishing email, and the steps to take if you inadvertently click on a link.
According to the Department of Justice, identity theft and identity fraud refer to all types of crime in which someone wrongfully uses another person's personal data in some way that involves fraud or deception, typically for economic gain. If you pay attention to the news, there's often reports of large banks or companies being hacked and thousands of personal records being compromised. In fact, you've likely had your debit card replaced at least once or twice as a result of your bank being proactive when they suspect your account might have been compromised. Unfortunately, identity theft has become commonplace. In this course, we'll go over the different ways that your financial standing may be impacted as a result of identity theft. We will also discuss credit bureaus, how to protect yourself, and what to do if your identity is stolen.
Most of us don't even think about the dangers of constantly navigating the internet. We're connected through our phones, computers, watches, televisions, cars, and even through little speakers at home that are listening to everything we say! In this course, we'll go over the risks and your responsibility, at least in the workplace, to protect yourself and your organization.
Social engineering is a huge part of your daily cyber threat, and it's important to have an understanding of what it is, how it's used, and what to look for to protect yourself and your company. Social engineering is the use of deception to manipulate individuals into revealing confidential or personal information that may be used for fraudulent purposes. Cybercriminals use social engineering as a non-technical strategy, relying on human mistakes. What does that all of that really mean? That's what this course is all about.
The threat of cyberattacks are increasing each year. Cybercriminals are attacking businesses just like yours to gain employee or client information, expose user data, or gain access to confidential information. And the truth is this, most successful attacks are the result of employee negligence. While you may have the latest antivirus software installed on everyone's computers, the reality is that training your employees to be vigilant is the most important thing you can do to protect your business and your assets. As with most training, it's up to you to determine what employees need to know, how frequently they need to relearn it, and how the information should be presented. We're here to help you sort all that out. Even if you already have your cybersecurity training in place, this course can serve as a checklist to ensure you're not missing something.
According to statistics, insider threats are responsible for more than half of all data breaches. Insiders are part of the team in some way. It could be employees, vendors, third party affiliates, contractors, business partners, or former employees. It could be anyone who currently has or previously had privileged access to confidential or important data. An insider threat is the threat of malicious behaviors coming from someone who's a part of one of these insider groups. The cost to you could be enormous, so the purpose of this course is to help you minimize the risk.
Based on the FBI's definition, intellectual property (IP) theft involves robbing people or companies of their ideas, inventions, and creative expressions, which can include everything from trade secrets and proprietary products or parts, to movies, music, and software. The IP Commission Report estimates that the annual cost of IP theft on the U.S. economy falls somewhere between $225 billion and $600 billion. Those costs are divided into three categories that we'll cover in this program. We'll also talk about how intellectual property theft happens, how to establish intellectual property as your own, and knowing your own vulnerabilities.
You are responsible for keeping your computer and your personal information safe. That means at home, at work, and anywhere else you happen to be in the world. This course is in place to provide tips on how you should protect yourself and your information.
Learn at work, at home or on the go. All of our courses our online and play well with desktops and mobile devices.
Upon completion of this Learning Path, you will be awarded a Certificate of Completion showing that you have gained the skills presented.
Have a question? We're here to help. We have detailed FAQs and resources as well as a support team ready to assist you.
We offer over 90 professionally hand-crafted learning paths to get you started, but we realized that not everyone wants to learn the same things. That's why we give you the flexibility to create your own, custom learning paths just for you and your team.