Cybersecurity Training Course Topics

Cybersecurity Series

The Cybersecurity Series on Cyber Safety is divided into 3 parts: Beginner, Intermediate, and Advanced.

Beginner modules cover the basics of what every team member needs to know. The intermediate modules build on those beginner concepts, and advanced modules touch on more technical topics. 

We strongly recommend that all team members (full time and part time) partake in all Cybersecurity Series courses.

Beginner Modules

  1. Security at Home
    This course identifies crucial actions for working securely at home, which is important for mobile and remote workers.
  2. Cloud Security
    A crash course in the business benefits and security drawbacks of cloud computing services and platforms.
  3. Secure Internet Use
    We use email and internet technologies daily to conduct business, so it’s essential to keep security in mind when doing so.
  4. Mobile Device Security
    This course covers specific concerns for the mobile devices which are increasingly a part of our work lives.
  5. Phishing
    Since it’s now easier to trick somebody into giving you access than hacking your way in, it’s essential to train your users to spot & avoid such attempts.
  6. Physical Security
    This course details how physical security measures are required to protect data and information systems.
  7. Public Wi-Fi
    It’s convenient but not a secure option: how to use and ensure you stay secure on public Wi-Fi.
  8. Removable Media
    When data goes portable it needs additional protections: how to keep data on removable devices confidential.
  9. Secure Passwords & Authentication
    Secure credentials are a requirement, and this course highlights best practices for password security and measures like 2- or multi-factor authentication (2FA and MFA).
  10. Social Engineering
    Similar to phishing, social engineering exploits human weaknesses, and this course helps your users spot and avoid such attacks.
  11. Using Social Media Safely
    Details posted on social media can often lead to social engineering attacks or, at worst, data breaches; this course highlights best practices for using social media in a company setting.
  12. Working Remotely
    Tips and best practices for workers who don’t work in a company-controlled space, including additional elements of mobile device security, public Wi-Fi, and physical security.

Intermediate Modules

  1. Ransomware
    Ransomware attacks can be highly damaging to businesses. Learn what ransomware is, how it spreads, and how to help prevent it from affecting your company.

  2. What Makes a Cyber Criminal?
    Cyber criminals aren’t just hooded villains typing away in dark basements. Learn about what motivates cyber criminals - and how this knowledge can help you stay secure.

  3. The Internet of Things
    The Internet of Things is a growing network of connected smart devices. Learn why there are security risks associated with the Internet of Things, and what you can do to keep your devices and data secure.

  4. The Insider Threat
    What is the Insider Threat, and how can you protect your organization? Learn about the different types of insider attack and how you can counter them.

  5. Information & Data
    What is the difference between information and data? Learn how to tell the two apart, and how to protect sensitive information in your organization.

  6. Smishing
    What is smishing, and how do you protect yourself and your data from it? Learn the essentials of combating text-message-based scams.

  7. Secure Email Use
    While email is an essential tool in any workplace, there are a number of security risks associated with its use. Learn how to use email securely at work.

  8. Videoconferencing Securely
    What security risks are associated with online calls and videoconferences, and how can you stay safe? Learn the essentials of safely meeting online.

  9. Data Loss
    What is data loss, why should you be concerned about it, and how can you prevent it? Learn about the ramifications of data loss now.

  10. Denial of Service Attacks (DoS)
    What are Denial of Service attacks, why might they target your organization, and how do you protect yourself against them? Learn the essentials of DoS attacks.

  11. Patching & Updating
    Regularly downloading and installing updates is one of the keys to secure computing. But why exactly are updates so important - and do they really have to be released so often? Learn all you need to know about patching and updating in this course.

  12. Vishing
    Scammers use phone calls and voice-mail messages to dupe employees into giving up sensitive information. Learn what vishing scams are, how they work, and how to identify and stop them.

Advanced Modules

  1. Spyware & Adware
    What are spyware and adware, what impact can they have on your devices and data, and how can you protect yourself from infection?

  2. The Dark Web
    What is the dark web, is it illegal, and how can you protect yourself when accessing it?

  3. Protecting Your Online Privacy
    Why does online privacy matter, why do criminals care about your data, and how can your privacy become compromised?

  4. BYOD
    What does BYOD mean, what security risks does it involve, and how can you help keep data safe when working from personal devices?

  5. Secure VPN Use
    How does a VPN help you secure your connection, when should you use one, and how can you ensure you're using your VPN safely?

  6. File Sharing in the Workplace
    How can files be shared, what security risks are involved, and how can you keep data and devices safe?

  7. Home Network Security
    Why do you need to protect your home network, and what threats are there?

  8. Clear Desk Policy
    What does a Clear Desk Policy involve, and what threats does it help counter?

  9. Online Payments
    What security risks come with online payments, and how do you keep them secure?

  10. Malicious Websites & Applications
    What type of malicious websites and applications are there, and what are the risks?

  11. Malware
    What types of malware are there, how can you become infected and what damage can they cause? Learn how to protect your data, devices and organization from malware.

  12. Using Third Party Services Securely
    What risks can third-party services pose to data security, and how can you help mitigate the impact of breaches?

Additional Cybersecurity Courses

In addition to the core Cybersecurity Series, we offer the following courses that you can assign to relevant team members.

Coronavirus Phishing (US)

Cybercriminals are exploiting the coronavirus outbreak with phishing emails. This course will show you how to stay safe from COVID-19 phishing scams.

Protecting Corporate Social Media Accounts

How can corporate social media accounts become compromised, and why can it be so damaging? Learn how to protect your company's social media profiles.

Return to Office: Essential Security Awareness

While working from the office gives you better access to the IT support team, it is important to stay aware of the security risks. Learn what security threats you should be on the lookout for when returning to your workplace, and how to keep your data and devices protected.

The Importance of VPNs

What exactly is a VPN, how do they work, and why should you use one? Learn all the essentials of Virtual Private Network use.

Have more questions? Submit a request