The aim of this course is to provide learners with engaging and easy-to-connect learning material that helps to unravel the wide world of Cyber Security. Two animated characters - the villainous DDoS and the heroic Crypto - will accompany you as you progress through this course. In the cyber world, DDoS refers to a cyberattack on a machine or network resource which temporarily or indefinitely disrupts Internet and computing services for intended users. Crypto, on the other hand, is a term associated with data protection and is our heroic character in this cyber security course.
This course will take you through a range of cyber threats you are likely to encounter in the workplace, such as:
- The Internet of Things (IOT)
- Insider Threats
The purpose of this course is to familiarize and hopefully pique your interest, in terms of the types of threats you might face on a daily basis. Its recommended that you work through the modules at your own pace, deploying the learning mode that suits you best.
For some, this might be sitting the entire course in one session, for others they may prefer to remotely access the course, or you might complete it at work as part of your induction or ongoing program of training and awareness.
- An Overview of the Cyber World & Threats
- Threats from Third Parties
- All You Need to Know About Phishing
- Dealing with Ransomware
- Preventing Doxing
- Internet of Things (IoT)
- Safeguarding Smart TVs
- Dealing with Insider Threats
- PC, Mac, Tablet, Smartphone