Information Security Awareness Training



Overview

There is no successful information security program without an effective information security awareness training program for all managers and employees of a company or an organization, that are usually the weakest link in information security.

If managers and employees do not understand the risks and the consequences, it is unlikely to comply with corporate policies. They will continue to cut corners and compromise security in the name of convenience.

Process owners and persons having access to systems and data must understand the cyber security threats, and they must learn what they can do to protect themselves, their firm or organization, and the critical infrastructure.


Target Audience

The program is beneficial to all managers and employees of companies and organizations of the private and the public sector.


Duration

One hour to one day, depending on the needs, the content of the program and the case studies. We always tailor the program to the needs of each client.


Instructor

Our instructors are working professionals that have the necessary knowledge and experience in the fields in which they teach. They can lead full-time, part-time, and short-form programs that are tailored to your needs. You will always know up front who the instructor of the training program will be.


Course Synopsis:

Understanding the importance of information security.

- Legal and regulatory obligations.

- Importance of information security for the organization and the country.

- Importance of information security for the employees and contractors.


Desktop Security.

- A password-protected screen saver.

- Locking computers when users walk away from them.

- Shoulder surfing.

- Key loggers.


Password Security.

- Eliminating default passwords.

- What constitutes a strong, secure passphrase.

- Cracking passwords.

- Minimum password requirements.

- Sharing passwords.

- Examples of passphrases.


Wireless Security.

- The ease of use vs. security.

- The wireless networks and possible security problems.

- Mobile Devices and Wireless.


Email Security.

- Protecting information when using the internet and email.


Malware.

- Viruses, worms, trojans, spyware, adware.

- Examples and case studies.


Phishing.

- What is phishing.

- Examples and case studies.

- Things to avoid.

- Clicking on links provided in e-mails.


Social engineering, hoaxes, scams.

- Social engineering examples and case studies.

- Types of hoaxes.

- Examples and case studies.

- Comparing hoaxes to viruses.

- Preventing the spread of hoaxes.

- Social Engineering.


Social Media.

- Risks to the person and the organization.

- Exploiting human networks.


Legal issues.

- File sharing and copyright.

- Downloading unknown or unsolicited programs or files.

- Copyrighted documents in the corporate network.

- Recordings, videos, software.

- Illegal file sharing and downloading.


Travel Security.

- Laptops.

- Corporate data and intellectual property.

- Examples and case studies.


Reporting security incidents.

- The importance of reporting, from policies to reality.


Closing remarks.

- Examples and case studies.

For more information, you may contact us.


Terms and conditions

You may visit: https://www.cyber-risk-gmbh.com/Terms.html




Cyber Security Training

Cyber security is ofter boring for employees. We can make it exciting.


Online Cybersecurity Training

Online Training

Recorded on-demand training and live webinars.

In-house Cybersecurity Training

In-house Training

Engaging training classes and workshops.

Social Engineering Training

Social Engineering

Developing the human perimeter to deal with cyber threats.


Cybersecurity Training for the Board

For the Board

Short and comprehensive briefings for the board of directors.


Cybersecurity Assessment

Assessments

Open source intelligence (OSINT) reports and recommendations.


High Value Targets Cybersecurity Training

High Value Targets

They have the most skilled adversaries. We can help.





Which is the next step?

1

You contact us

2

We discuss

3

Our proposal

4

Changes and approval

5

We deliver







Cyber Risk GmbH, Cyber Risk Awareness and Training