Companies Home Search Profile

Cyber Awareness Training - for employees and individuals

Focused View

Martin Voelk

45:09

64 View
  • 1. Introduction.mp4
    03:03
  • 1. Entry quiz.html
  • 1. Computer Usage.mp4
    03:32
  • 2. Module 1 review quiz.html
  • 3. Useful links.html
  • 1. Your Identity.mp4
    08:10
  • 2. Module 2 review quiz.html
  • 3. Useful links.html
  • 1. In and around the office.mp4
    05:44
  • 2. Module 3 review quiz.html
  • 3. Useful links.html
  • 1. Email Communication.mp4
    06:12
  • 2. Module 4 review quiz.html
  • 3. Useful links.html
  • 1. Portable Media.mp4
    03:19
  • 2. Module 5 review quiz.html
  • 3. Useful links.html
  • 1. Social Media.mp4
    03:52
  • 2. Module 6 review quiz.html
  • 3. Useful links.html
  • 1. Using the Web.mp4
    03:44
  • 2. Module 7 review quiz.html
  • 3. Useful links.html
  • 1. Home Computer Usage and Working from Home.mp4
    02:16
  • 2. Module 8 review quiz.html
  • 3. Useful links.html
  • 1. Wireless Security and Mobile Devices.mp4
    05:17
  • 2. Module 9 review quiz.html
  • 3. Useful links.html
  • 1. Final Exam.html
  • 1.1 SECURITY-TIPS-CHEAT-SHEET.pdf
  • 1. Cyber Awareness Cheat Sheet.html
  • Description


    Learn how to detect Cyber Threats and how to protect yourself from them

    What You'll Learn?


    • Cyber Awareness
    • Phishing Awareness
    • Identify Cyber Threats
    • Avoid Cyber Threats
    • Stay safe online
    • Protect yourself from cyber crime

    Who is this for?


  • Any Internet user
  • Any employee or contractor using information technology
  • Any individual going online
  • More details


    Description

    Why you should take this Cyber Awareness Training?
    Technology can stop a lot of cyber attacks - but not all. You can have the latest cutting edge security systems in place, if your company staff is not cyber aware it's only a matter of time until a breach will happen. Be proactive - not reactive

    • Every major breach these days typically starts with Social Engineering

    • Millions of people are targeted with phishing and spear phishing attacks on a daily basis

    • It only takes one wrong click or user action to have the whole organization compromised

    • Attackers use Email, Phone calls, Impersonation, Portal Media, QR Codes and other vectors

    • Don’t fall victim and learn how you can protect yourself

    This Cyber Awareness training program educates users on threats and methods hackers use and will help organizations to mitigate risk. I recommend this training to any company employee or contractor using Information Technology as part of their jobs. The cyber security course's online modules take the student through  steps to stay secure.


    Course Modules
    Before starting the training, you will be presented with a little entry quiz to check how Cyber aware you already are. All modules contain a video lesson, a quiz at the end and some useful links. At the end of the training you will have the opportunity to test your acquired knowledge by taking an 18 question exam and you will receive a downloadable cheat sheet with best practices in bullet points based on the training.

    Module 1: Computer Usage
    Module 2: Your Identity
    Module 3: In and around the Office
    Module 4: Email Communication
    Module 5: Portable Media
    Module 6: Social Media
    Module 7: Using the Web
    Module 8: Home Computer Usage and Working from Home
    Module 9: Wireless Security and Mobile Devices


    About the Author
    Martin is an expert in Cyber Security Veteran with 25 years of experience holding most prestigious certifications. He provides Cyber Security services to government entities and commercials worldwide. Martin is a former IT security trainer to the US military and incredibly highly accredited and experienced ethical hacker! Real-life experience in plain English for non-technical employees - to encourage secure practices and protect your business.


    What is Social Engineering?
    Most of the data breaches you read about in the news today start off with an attack vector referred to as Social Engineering. Unsuspecting users are being targeted with phone calls, phishing, spear phishing, portable media and other types of attacks in order to gain access to corporate networks. The majority of IT users have no technical background and are unaware of the techniques and methods hackers use to target them.

    Who this course is for:

    • Any Internet user
    • Any employee or contractor using information technology
    • Any individual going online

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Martin Voelk
    Martin Voelk
    Instructor's Courses
    Hello! I am an IT and Cyber Security veteran with 25 years of experience. I have worked for ISPs, banks, manufacturers, government entities and many other verticals. I hold some of the highest certification incl. CISSP, OSCP, OSWP, Portswigger BSCP, CCIE, PCI ISA and PCIP. I used to run a Penetration Testing company called Cyber 51 LLC which I have sold in 2018. I am now working as a senior security consultant for a big tech company and as a freelance Bug Bounty hunter. SpecialitiesAll CISSP domainsNetwork Security (Firewalls, Infrastructure etc.)Application SecurityPenetration Testing (Infrastructure, IoT, Web Apps, Mobile Apps, Wireless)Cyber Intelligence, online investigations, OSINTPCI ComplianceGeneral Security Certifications:CISSP #339608 (Certified Information Systems Security Professional) PCI-ISA (Certified Payment Card Industry Industry Internal Security Assessor)PCIP (PCI Certified Professional)Penetration Testing Certifications:BSCP (Burp Suite Certified Practitioner) OSCP (Offensive Security Certified Professional)OSWP (Offensive Security Wireless Professional) CREST (UK CREST Registered Penetration Tester) CEH (Certified Ethical Hacker) v8 - Retired Bug Bounty Hunter Since 2021 I hold the #1 spot for the Researcher with most vulnerabilities foundCisco Certifications:Cisco Certified Internetwork Expert (CCIE # 13708) (July 2004)Emeritus as of 2018
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 10
    • duration 45:09
    • Release Date 2023/06/08

    Courses related to Cyber Security

    Courses related to Cyber Security Awareness