Book Image

Data Security and Privacy Training [Video]

By : CyberTraining 365
5 (1)
Book Image

Data Security and Privacy Training [Video]

5 (1)
By: CyberTraining 365

Overview of this book

<p><span id="description" class="sugar_field">The objective of this course is to ensure that all your employees can clearly identify, mitigate, and report any potential cyber threats to your organization. Our data is being compromised more than ever. Training all employees to protect themselves against attacks is one of the most effective ways to protect your organization. <br /></span></p> <p><span id="description" class="sugar_field">This course includes topics such as:<br /></span></p> <ul> <li><span id="description" class="sugar_field">What is information Security?</span></li> <li><span id="description" class="sugar_field">What are the threats?</span></li> <li><span id="description" class="sugar_field">How to practice Information Security at Work</span></li> <li><span id="description" class="sugar_field">Email safety and Safe Online Browsing</span></li> <li><span id="description" class="sugar_field">Information Security Policy and Conclusion</span></li> </ul> <p><span id="description" class="sugar_field">All the supporting files and Quizzes for this course are available at: <a href="https://github.com/PacktPublishing/Data-Security-and-Privacy-Training" target="_new">https://github.com/PacktPublishing/Data-Security-and-Privacy-Training</a></span></p> <h1><span class="sugar_field">Style and Approach</span></h1> <p><span class="sugar_field"><span id="trade_selling_points_c" class="sugar_field">This training offers a fresh approach by presenting engaging content in a scenario-based format. This training uses the micro-learning methodology to ensure learners aren’t overwhelmed with information. Throughout the course, the learner will take interactive quizzes and assessments to test their readiness. The training is available on-demand so learners can take it at their own pace or as part of a designated employee training program.</span></span></p>
Table of Contents (5 chapters)
Chapter 1
What is Information Security?
Content Locked
Section 4
Be aware of the broad obstacles we face in information security
This video covers the following topics like how security can be inconvenient, how employees can be complacent and make security lapses, how society urges people to share information, how accessible data can be hard to secure, understanding the misconceptions of Cyber Security, kinds of threats, general ways of addressing threats, overview of procedure employees should follow daily, and more.