Introduction to Cybersecurity Online Training

Join This Course

Includes
  • 12 months access
  • Certificate on completion
  • Proven eLearning platform
  • Optimised for mobile devices and desktop
Training more than 500 people?

Introduction to Cybersecurity Online Training

Cybersecurity eLearning is a must for all organisations who wish to protect their information and systems from the threat of hackers and others with malicious intent. The biggest weakness in your system is usually the human element, and hackers will employ a range of sophisticated techniques to gain access to your system through your team.

Our cybersecurity course outlines the risks your team will face and teaches them how to mitigate against them.  It includes detailed information on how to recognise phishing attacks, scams, how to set strong passwords and good practice cybersecurity awareness.

Introduction to Cybersecurity is written by our experts with decades of experience in regulatory risk and cybersecurity for major corporations. We use straightforward language, in an easy to navigate eLearning environment so every member of your team can complete the training without any issues.

This course includes a competency-based assessment at the end of the course to test knowledge. On successful completion of the course and assessment, users will receive a Sovy Academy certificate, valid for one year.

All Sovy Academy courses include use of our learning management system, online customer support and auto-renewing subscriptions, so you can conduct your yearly training without any fuss. However, if you’d prefer to use your own learning management system, customise our courses, or purchase the courses as a one-off expense, just get in touch with us!

Text and Image Screen: One mistake is all it takes.
Interactive Screen: Data breach case studies. Maersk. FedEx. UPS. Toyota. British Airways.
Interactive Screen: Three common mistakes. Being curious. Being overly helpful. Being too quick.
Knowledge Check: Identifying risks leading to data security or privacy incidents.

Text and Image Screen: What is phishing?
Knowledge Check: The causes of data breaches.
Interactive Screen: Six signs of phishing. Examples. Poorly written. Not addressed to you. Official-looking. Prizes. Verify or reset. Inaccurate details.
Interactive Screen: Consequences of phishing. Ransom. Encrypted lock-out. Malware copies. Device takeover. Financial fraud.
Knowledge Check: Assessing emails for a phish.
Knowledge Check: Assessing links in emails.
Knowledge Check: What to do if you suspect a phish.

Interactive Screen: Password mistakes. Weak passwords. Password reuse. Sharing passwords. Poor safeguarding.
Text and Image Screen: Creating strong passwords.
Interactive Screen: Tips for creating strong passwords. Combining characters. Avoiding similar characters in sequence. Avoiding substituting symbols for letters. Add numbers and symbols.
Text and Image Screen: Multiple passwords for business and personal use. Actions.
Text and Image Screen: Sharing passwords. Safeguarding passwords. Actions.
Knowledge Check: Identify actions which can lead to data security incidents.

Interactive Screen: Smartphones and devices. Remote connections. Physical security. Clear desk and screen. Data classification. Events and incidents.

Formal assessment with 15 questions. A score of 70% or above is required to pass the course and receive a certificate.