Introduction to Cybersecurity Online Training
Introduction to Cybersecurity course outlines the risks your team will face and teaches them how to mitigate against them.
Join This Course
- 12 months access
- Certificate on completion
- Proven eLearning platform
- Optimised for mobile devices and desktop
Introduction to Cybersecurity eLearning is a must for all organisations who wish to protect their information and systems from the threat of hackers and others with malicious intent.
The biggest weakness in your system is usually the human element, and hackers will employ a range of sophisticated techniques to gain access to your system through your team.
It includes detailed information on how to recognise phishing attacks, scams, how to set strong passwords and good practice cybersecurity awareness.
Introduction to Cybersecurity is written by our experts with decades of experience in regulatory risk and cybersecurity for major corporations. We use straightforward language, in an easy to navigate eLearning environment so every member of your team can complete the cybersecurity training without any issues.
The cybersecurity training includes a competency-based assessment at the end of the course to test knowledge. On successful completion of the course and assessment, users will receive a Sovy Academy certificate, valid for one year.
All Sovy Academy courses include use of our learning management system, online customer support and auto-renewing subscriptions, so you can conduct your yearly training without any fuss. However, if you’d prefer to use your own learning management system, customise our courses, or purchase the courses as a one-off expense, just get in touch with us!
|One mistake is all it takes.
|Data breach case studies. Maersk. FedEx. UPS. Airways.
|Three common mistakes.
|Identifying risks leading to data security or privacy incidents.
|What is phishing?
|The causes of data breaches.
|Six signs of phishing. Examples.
|Consequences of phishing.
|Assessing emails for a phish.
|Assessing links in emails.
|What to do if you suspect a phish.
|Password mistakes. Weak passwords. Password reuse. Sharing passwords.
|Creating strong passwords.
|Tips for creating strong passwords.
|Multiple passwords for business and personal use. Actions.
|Sharing passwords. Safeguarding passwords. Actions.
|Identify actions which can lead to data security incidents.
|Smartphones and devices. Remote connections. Physical security.
|Formal assessment with 15 questions. A score of 70% or above is required to pass the course and receive a certificate.