$25

Credit Hours:
Categories: , Valid in the following states: , , , , , ,

Digital Armor: Strengthening Security Awareness

Cybersecurity Course

The Digital Armor: Strengthening Security Awareness course provides a comprehensive overview of information security, emphasizing the importance of maintaining a secure computing environment and promoting safe online practices. The training covers various topics, including computer acceptable use, work from home (WFH) security, cybercrime, phishing, and email security. Participants will learn how to identify phishing attempts and explore notable phishing campaigns from 2022, such as bank scams, OneDrive scams, Netflix scams, Apple scams, and PayPal scams.

The module also highlights the significance of securing personal and sensitive information, emphasizing the need to encrypt data and implement mobile device security measures. Participants will gain insights into password safety and best practices, as well as the risks associated with compromised email accounts. Social engineering and its impact on security are discussed, along with the threat of ransomware and its true cost. Techniques for protecting against ransomware and responding to incidents are explored, emphasizing incident response and business continuity strategies.

Additionally, the training covers social media do’s and don’ts to ensure responsible and secure usage. Participants will develop an understanding of web services such as the surface web, deep web, and dark web, along with the potential risks they pose. By completing this module, individuals will be equipped with essential knowledge and skills to enhance information security awareness and mitigate potential risks in both personal and professional settings.

Categories: , Valid in the following states: , , , , , ,

Product Description / Course Objectives

Learning Objectives:

At the conclusion of this course, the learner will:

  • Understand the concept of information security and its importance in personal and professional contexts.
  • Familiarize oneself with the principles of computer acceptable use and the responsible use of technology.
  • Recognize the security challenges and best practices related to working from home (WFH) environments.
  • Gain knowledge about various types of cybercrime, including phishing, and the potential risks they pose.
  • Learn how to identify phishing attempts and enhance the ability to detect suspicious emails or messages.
  • Explore the most successful phishing campaigns in 2022, such as bank scams, OneDrive scams, Netflix scams, Apple scams, and PayPal scams, to understand their tactics and strategies.
  • Develop an understanding of email security measures and how to protect against common threats.
  • Comprehend the concept of spear phishing and the targeted nature of such attacks.
  • Learn the importance of encrypting sensitive data and methods for implementing data encryption.
  • Recognize the risks associated with text message scams and best practices for avoiding them.
  • Understand the significance of using secure HTTP connections (https://) for web browsing and online transactions.
  • Explore the differences between the surface web, deep web, and dark web, and the potential risks associated with each.
  • Acquire knowledge about mobile device security measures to protect personal and organizational data.
  • Understand password safety principles and best practices to create strong and secure passwords.
  • Recognize the risks and consequences of compromised email accounts and methods for mitigating such incidents.
  • Gain insights into social engineering techniques and how to identify and defend against them.
  • Understand the concept of ransomware and its potential impact on individuals and organizations.
  • Explore the true cost of ransomware attacks, including financial, reputational, and operational consequences.
  • Learn about effective ransomware protection measures and strategies to prevent and mitigate attacks.
  • Develop an understanding of incident response procedures and the importance of prompt and effective responses to security incidents.
  • Comprehend the concept of business continuity and the role it plays in maintaining operations during and after security incidents.
  • Understand the do’s and don’ts of social media usage to ensure responsible and secure online presence.

States: AL, KY, LA, MS, MT, TX