Course and Package Description
Course
Price
mSkills - Cyber Complete w/ Secure Remote Work 4
Price: $59

Cyber Complete w/ Secure Remote Work 4

 Information Security

Infosec. It sounds mysterious, right? Like something supersecret spies deal with while sitting in darkened rooms, wearing sunglasses, and still somehow managing to see what they’re doing. Well, it’s not. It’s just a shortened version of information security, which is something we should all be aware of.

Information is the world’s most valuable commodity, so keeping it secure is vitally important. It’s something we should all know how to do well. Poor infosec can damage your business, and leave your reputation in tatters. And, with online threats becoming more common and increasingly sophisticated, you really can’t afford to leave anything to chance.

By the end of this course, you’ll be able to:

• Identify the 3 pillars of information security
• Recognize the impacts of poor information security
• Apply information security successfully

Why take this course?

If you deal with sensitive information of any kind, then you need to make sure it’s secure. This course will help you identify the 3 pillars of information security, recognize the impacts of poor information security, and figure out how to apply information security tools and techniques successfully.

10 mins | SCORM | Workbook

Phishing and Anti-Spam Software

Ever received an email from your bank which seems to be legit but, well, there’s something off about it? Maybe it starts with, “Dear valued customer” instead of using your name? If you have received anything like this, then it’s likely you’ve been targeted by phishing criminals.

Phishers pretend to be from authorized organizations to trick you into giving away sensitive information, such as usernames or credit card details. It’s a malicious and widespread activity. But suffering loss as a result can be prevented. One of the most effective ways is through anti-spam software which blocks suspicious emails from getting into your account.

By the end of this course, you’ll be able to:

• Recognize a phishing attack, for example an email or cell phone message
• Understand how anti-spam software works to prevent email spamming
• Protect yourself and avoid becoming a victim of phishing

Why take this course?

Phishing scammers release thousands of attacks every single day. Yet knowledge is power, and by learning how to spot the signs you will help to protect yourself. This short course is suitable for professionals, organizations, and any individual who uses a computer or cell phone. Yep, that means pretty much all of us.

15 mins | SCORM | Workbook

Social Engineering

“You must trust and believe in people, or life becomes impossible.” So said the famous Russian writer Anton Chekhov. And, well, he had a point. Without trust, we wouldn’t form friendships or relationships. But here’s the thing, Anton: you really can’t trust everyone.

It was probably a bit different back in the 19th century what with the lack of computers and everything. But cyber tricksters and con artists are everywhere today, and they’re preying on our natural inclination to trust and help others. By pretending to be genuine, social engineering criminals manipulate people into giving away confidential and sensitive information.

By the end of this course, you’ll be able to:

• Understand the dangers of social engineering and how it works
• Recognize the different types of social engineering attacks
• Avoid becoming a victim of social engineering

Why take this course?

The majority of cyberattacks are the result of social engineering. Yet, we can reduce the chances of falling victim by spotting the signs and remembering to think before opening that attachment. This short course is suitable for everyone, particularly organizations, professionals, and social media users. So, trust this course to help you protect yourself.

10 mins | SCORM | Workbook

Secure Remote Working(Cyber)

In the past, you’d probably have classed remote workers as people working on their own in a faraway land. Like a great explorer trekking to the poles, or a solitary spy on a top-secret mission. Fast forward to today, and remote working is something that pretty much everyone can, and has to, do.

Remote working’s a great thing. It can expand possibilities for businesses and workers alike. But it does bring a new set of problems: making sure that IT systems and data stay protected. To combat potential risks, businesses and employees need to kick their security controls up a notch to enable safe and secure remote working for everyone.

By the end of this course, you’ll be able to:

• Identify the security risks of remote working
• Recognize the benefits of secure remote working
• Adopt best practices for remote-working security

Why take this course?

If you work remotely or manage employees that do, this course will explain the risks that remote working presents and best practices to help stop risk becoming reality. And, by using the advice in this course, you’ll be able to develop secure remote-working methods that’ll help keep data protected.

10 mins | SCORM | Takeaway Tasks