Book Image

Data Security and Privacy Training [Video]

By : CyberTraining 365
5 (1)
Book Image

Data Security and Privacy Training [Video]

5 (1)
By: CyberTraining 365

Overview of this book

<p><span id="description" class="sugar_field">The objective of this course is to ensure that all your employees can clearly identify, mitigate, and report any potential cyber threats to your organization. Our data is being compromised more than ever. Training all employees to protect themselves against attacks is one of the most effective ways to protect your organization. <br /></span></p> <p><span id="description" class="sugar_field">This course includes topics such as:<br /></span></p> <ul> <li><span id="description" class="sugar_field">What is information Security?</span></li> <li><span id="description" class="sugar_field">What are the threats?</span></li> <li><span id="description" class="sugar_field">How to practice Information Security at Work</span></li> <li><span id="description" class="sugar_field">Email safety and Safe Online Browsing</span></li> <li><span id="description" class="sugar_field">Information Security Policy and Conclusion</span></li> </ul> <p><span id="description" class="sugar_field">All the supporting files and Quizzes for this course are available at: <a href="https://github.com/PacktPublishing/Data-Security-and-Privacy-Training" target="_new">https://github.com/PacktPublishing/Data-Security-and-Privacy-Training</a></span></p> <h1><span class="sugar_field">Style and Approach</span></h1> <p><span class="sugar_field"><span id="trade_selling_points_c" class="sugar_field">This training offers a fresh approach by presenting engaging content in a scenario-based format. This training uses the micro-learning methodology to ensure learners aren’t overwhelmed with information. Throughout the course, the learner will take interactive quizzes and assessments to test their readiness. The training is available on-demand so learners can take it at their own pace or as part of a designated employee training program.</span></span></p>
Table of Contents (5 chapters)
Chapter 2
What are the threats?
Content Locked
Section 3
How Malware Spreads
The following malware topics like Email attachments, USB stick threats, infected websites, how hackers use websites to spread malware, sharing files or using the cloud, social engineering, the human facto, mitigating malware threats, strategies to reduce risk in your company, being prepared, and knowing how IT team works are covered here.