Cyber Security for Everyone
$65
Leads to certification with duration:
2 years
Cybersecurity

Cyber Security for Everyone

This 1.01 Cyber Security Awareness course, provides an overview of the risk associated with modern cyber-crime and some of the effective techniques that help detect, protect, and manage it.  Time and time again, in the world's largest breaches, attackers hone their skills at compromising humans, and the machines through them.   Stolen credit cards, identities, real estate, corporate secrets.. the list goes on.   

This course provides elementary security foundation for any adult operating a computer system.  Covering a broad spectrum of attack vectors with interactive slides, local examples, various games to keep you engaged, the course facilitates practical advice.


Curriculum content

  • Infosec. It sounds mysterious, right? Like something supersecret spies deal with while sitting in darkened rooms, wearing sunglasses, and still somehow managing to see what they’re doing. Well, it’s not. It’s just a shortened version of information security, which is something we should all be aware of. Information is the world’s most valuable commodity, so keeping it secure is vitally important. It’s something we should all know how to do well. Poor infosec can damage your business, and leave your reputation in tatters. And, with online threats becoming more common and increasingly sophisticated, you really can’t afford to leave anything to chance. By the end of this course, you’ll be able to: • Identify the 3 pillars of information security • Recognize the impacts of poor information security • Apply information security successfully Why take this course? If you deal with sensitive information of any kind, then you need to make sure it’s secure. This course will help you identify the 3 pillars of information security, recognize the impacts of poor information security, and figure out how to apply information security tools and techniques successfully. 10 mins | SCORM | Workbook
    • Lesson Information Security

  • Data is the most prized resource in the world and is far more valuable than money, precious metals, or even oil. It’s no wonder then, that so many criminals seek to steal it. Every hour of every day, hackers and cybercriminals attempt to breach IT networks. They’re trying to gain access to stores of data with the aim of selling them on to the highest bidder. The consequences of data breaches can be catastrophic, both financially and on a human level. So, it’s important you do everything you can to stop them. The great news is that data breaches, both intentional and unintentional, can be prevented. But how do you do it? By the end of this course, you’ll be able to: • Identify ways in which data breaches can be prevented • Recognize the consequences of data breaches • Apply solutions to prevent data breaches Why take this course? In this digital age, almost all of us work with data of some kind. So, it’s important to know how to stop data breaches from occurring, to recognize the consequences of data breaches, and to be able to apply preventative solutions. This course will show you how. 20 mins | SCORM | Workbook
  • Considering there’s over 7 billion people in the world, it’s pretty amazing that no 2 people have been found to have the same fingerprint. Even between identical twins! This just goes to show that our identities are completely and utterly unique. Unfortunately, however, and even though we are unique, cybercriminals have found several ways to steal our information and commit identity theft. This is a major crime and can have serious, long-lasting effects on its victims. Consequences include financial, emotional, and physical stress. By the end of this course, you’ll be able to: • Recognize the different types of identity theft and how they occur • Understand the effects and know what to do if you are a victim • Prevent and reduce the risk of your identity being stolen Why take this course? Identity theft is a preventable crime. Simple things like creating stronger passwords and not using public Wi-Fi to make bank transactions can significantly reduce the chances of becoming a target. This short course is suitable for everyone, particularly consumers, social media users, and professionals. 15 mins | SCORM | Workbook
  • It’s been a stalwart of movie plots since cinema began: Bad guy kidnaps the love interest of the main protagonist, demands an impossible ransom, and hero has to try and save the day. When it happens on screen for your entertainment, it’s fine, right? The thing is, criminals these days might not kidnap people. They’ve learned from the mistakes people made in the movies and go after something much easier. Your data. Whether it’s at home or at work, when a rogue element takes over your computer and encrypts your files so you can’t access them unless you pay a fee, that’s called ransomware. This can be scary, and also financially damaging if you don’t know what to do. By the end of this course, you’ll be able to: • Understand what ransomware is • Understand the consequences of not protecting data • Protect yourself from ransomware attacks Why take this course? Imagine the damage it would cause if you could never access your computer again. That business plan people are relying on. The payroll details. Holiday schedules. It doesn’t bear thinking about. And a simple ‘reset password’ call to the IT department isn’t going to work. This course will show you how you can prevent attacks and protect your data. 10 mins | SCORM | Workbook
  • Imagine a world where you can feed your cat or dog remotely via your cell phone and the thermostat is set to your ideal, toasty temperature. Wait a minute – we already live in that world! Yep, the future, aka the Internet of Things, is here and it is very smart. The Internet of Things (IoT) creates connections between multiple devices, or things. This connectivity enables data to be delivered to the internet, allowing for improved efficiency and reduced human effort. But there is a downside: security threats and cyberattacks. These can include device hijackings and home invasions. By the end of this course, you’ll be able to: • Understand how the Internet of Things works • Identify the security risks associated with the IoT • Protect yourself and avoid an IoT attack on your devices Why take this course? It isn’t just in the home that we’re vulnerable to an IoT attack. Workplaces are also at risk. For example, smart assistants may be hacked, meaning that confidential data is exposed. Suitable for organizations and individuals, this course will show you how to tighten your IoT security measures and prevent an attack. So, let’s get smart about security. 10 mins | SCORM | Workbook
  • How many times have you opened a new app and typed the same password you’ve had since forever? And if it doesn’t accept it, you say, “Ok, I’ll add a 1 on the end. A capital letter? Fine. Now it wants to recommend a password too? How on earth will I remember that nonsense! I’ll have to get it tattooed on my arm.” This rigmarole may seem like someone’s testing your limits, but password protection isn’t there to annoy you – it’s there to protect your data and personal information. In the workplace, it’s not just your data and personal information you need to worry about. It’s your customers’ too. While having the same password for everything seems convenient, a weak password can be your biggest downfall. By the end of this course, you’ll be able to: • Understand the downfalls of a weak password • Understand the need to protect any data you access • Set a strong password Why take this course? Learning to come up with a strong password is really important, whether it’s for work or personal tech. To help you successfully navigate the online world, this course explains why you should be using a strong password and how to create one. 10 mins | SCORM | Workbook
  • Passwords help to keep systems and data secure. But if passwords are intercepted by cybercriminals, they can create a security vulnerability. This allows those same criminals to access all kinds of confidential data, giving them the ability to wreak havoc and hold organizations to ransom. Cybercriminals and the scams and software they use to gain access to information like passwords are more sophisticated than ever. Whatever size organization you’re working for, you can’t afford to ignore password management. Luckily, there are tools available that both you and your organization can use to keep your systems as secure as possible. By the end of this course, you’ll be able to: • Define password management and the challenges faced when implementing it • Explain how a zero-trust approach helps protect organizations against cyberattacks • Understand the difference between single sign-on (SSO) and multi-factor authentication (MFA) and how both can increase password security Why take this course? These days we all use password-protected systems to complete our jobs and even to manage our personal data. That’s why everyone needs to understand how to overcome the challenges of password management. This course will help you understand how you and your organization can keep your systems and data as safe as possible. 10 mins | SCORM | Workbook
  • There are currently over 4.5 billion internet users. That’s a mind-boggling amount of people creating data – no wonder the internet is called the “information superhighway.” With every webpage you visit, you leave a digital footprint. In some places, you offer further information, like when you’re inputting your credit card details for that latest must-have! But how do you know that your data is safe? For businesses, ensuring data is secure should be a top priority. If it’s not handled correctly, sensitive customer data could be lost or stolen, resulting in some pretty harsh consequences. By the end of this course, you’ll be able to: • Understand why it’s important to look after data • Understand the consequences of poor data storage • Keep data safe Why take this course? Often, we take for granted that data is secure. We assume it’s inaccessible to anyone but the people who need it, and that it will stay that way. But the truth is, you need to take steps to ensure this. Regardless of your role, keeping data safe is everyone’s job. This course will show you why, and also how you can take steps to make sure your data is secure. 10 mins | SCORM | Workbook
  • Who could have predicted that the sum total of all knowledge in the world would be accessible through a tiny device that we all keep in our pockets? Even fewer could’ve predicted that we only seem to use it to watch cute kitty videos. Totally worth it. Your cellphone is so much more than just a way to stay connected. Your contacts, diary dates, and business notes are inside. Not to mention medical records, fastest run times, pictures of everyone and everything you’ve ever met! You’ve simply got to keep it safe. By the end of this course, you’ll be able to: • Understand why keeping your phone safe is so important • Identify the potential consequences of losing your work mobile • Use practical methods to minimize the risk of theft, loss, and damage Why take this course? Whether it’s a personal or work mobile, lose it, and you’ve lost a lot of data. Some of this data may be clawed back, depending on how carefully you’ve been managing it. But if personal or confidential information falls into the wrong hands, that could cause trouble. This course is designed to help make sure that your cellphone is in safe hands. 10 mins | SCORM | Workbook
  • “You must trust and believe in people, or life becomes impossible.” So said the famous Russian writer Anton Chekhov. And, well, he had a point. Without trust, we wouldn’t form friendships or relationships. But here’s the thing, Anton: you really can’t trust everyone. It was probably a bit different back in the 19th century what with the lack of computers and everything. But cyber tricksters and con artists are everywhere today, and they’re preying on our natural inclination to trust and help others. By pretending to be genuine, social engineering criminals manipulate people into giving away confidential and sensitive information. By the end of this course, you’ll be able to: • Understand the dangers of social engineering and how it works • Recognize the different types of social engineering attacks • Avoid becoming a victim of social engineering Why take this course? The majority of cyberattacks are the result of social engineering. Yet, we can reduce the chances of falling victim by spotting the signs and remembering to think before opening that attachment. This short course is suitable for everyone, particularly organizations, professionals, and social media users. So, trust this course to help you protect yourself. 10 mins | SCORM | Workbook
  • We’ve all had those absent-minded moments where we’ve forgotten something vital, right? Locking your keys inside your home is easily done, but at least it only affects you. Imagine then, if you’d misplaced or lost something a bit more, well, disruptive. For example, leaving an external drive with customer data on it on public transport could cause quite a problem. Why do people continue to use external drives anyway? These days, there are other options such as cloud storage. But which is safer? We need to take a deeper look at why external drives are still in use and how we can keep these important little devices as safe and secure as possible. This course will help with that. By the end of this course, you’ll be able to: • Compare the benefits of external-drive usage vs cloud storage • Demonstrate practical tips for keeping your external drive secure • Identify situations in which using an external drive could go wrong, so they can be avoided Why take this course? You don’t have to be a spy to know the value of looking after an external drive properly. If you use an external drive for work or for leisure, then it’s likely that whatever is on it will be something you can’t afford to lose. Taking this course will put data security in the forefront of your mind and help to mitigate against a potentially devastating situation. 10 mins | SCORM | Takeaway Tasks
  • There are lots of sci-fi classics about dystopian futures where the human race is enslaved by the technology it has created. All of this used to sound implausible, but take one look at social media today and you’ll see we’re not that far off. One of the biggest problems with modern tech is the threat of viruses and malware hijacking computer systems. This not only is an inconvenience to you or your business but also poses serious risks to data. By the end of this course, you’ll be able to: • Understand why people create viruses • Identify common computer viruses and how they work • Understand what malware is Why take this course? If rogue agents take over your computer, you’re at risk of financial or personal loss. So, you need to know how to protect yourself and your business. Whatever your role, this short course will help you understand the dangers and how to prevent them. 10 mins | SCORM | Workbook
  • The daily commute can be a grind for so many of us. But at least there’s that 10-minute stop-off at your favorite coffee shop to look forward to. You can order a complicated drink. You can have a muffin. You can log in to the coffee shop’s Wi-Fi and unwillingly expose your organization’s network and confidential data to cybercriminals. That last bit doesn’t sound so great, does it? Using public Wi-Fi is not without risk. Understanding these risks and how to overcome them will help you protect the organization you work for. The techniques that cybercriminals use to steal data like passwords and confidential communications are more sophisticated than ever. So it’s vital you know how to avoid compromising your organization’s privacy and security. By the end of this course, you’ll be able to: • Understand the risks associated with using public Wi-Fi • Explain how a VPN can help increase privacy when using public Wi-Fi • Recognize the dos and don’ts of using public Wi-Fi Why take this course? Everyone has a role to play in protecting their organization’s data from being hijacked by cybercriminals. That’s why everyone can benefit from understanding risks to security and how to overcome them. This course will show you why public Wi-Fi can be dangerous, along with how to be as safe as possible while using it. 10 mins | SCORM | Workbook
  • Virtual private networks – or VPNs – provide an encrypted tunnel through which all online activity and communication can travel. This helps keep you and your organization safe from cybercriminals and protects confidentiality. Pretty clever stuff, right? They can even help remote teams access work networks more safely. The thing is, even though VPNS are a useful tool, understanding exactly what they do can be challenging. And your organization’s precise needs relate to their size and the type of work being undertaken. Understanding the pros and cons of using a VPN, along with the main types, and what to look out for, will help you make the most of the benefits that VPNs have to offer. By the end of this course, you’ll be able to: • Understand the advantages and disadvantages of using VPNs • Define the 3 main types of VPN and what they offer • Recognize what your organization should consider when choosing a VPN Why take this course? Cybercriminals become more sophisticated and dangerous every day. That’s why everyone working within an IT environment needs to understand the pros and cons of working with VPNs and how to go about choosing one. This course will help you understand the ins and outs of VPNs and how they can protect the organization you work for against cyberattacks and data breaches. 15 mins | SCORM | Workbook
  • Interesting fact: The word Wi-Fi doesn’t actually have any meaning. The word became the brainchild of a brand consultancy firm, when it was decided that its real name, “IEEE 802.11,” wasn’t exactly catchy . That’s fair enough. But with more than 22 billion Wi-Fi enabled devices currently active in the world, it’s natural that some are susceptible to hacking or disruptions by criminals. The internet is so widely used that you can access it from almost anywhere in the world. Wi-Fi networks make that access faster and easier than ever. Individuals and companies rely on having uninterrupted Wi-Fi networks. Imagine life without it! Unfortunately, unless your networks are well protected, they’re in danger of being exploited. This course is here to help you protect what’s yours. By the end of this course, you’ll be able to: • Explain the basics of how Wi-Fi works and why it can be disrupted • Describe the potential consequences of failing to secure your network • Identify and implement practical ways to secure your network Why take this course? We all use Wi-Fi technology these days, whether at home or at work. That means everyone has a potential security risk to deal with. To ignore the issue is to invite criminals into your home or place of business and let them take whatever they want. It’s extremely important to secure your Wi-Fi networks, and this course will help. 10 mins | SCORM | Takeaway Tasks
  • In the past, you’d probably have classed remote workers as people working on their own in a faraway land. Like a great explorer trekking to the poles, or a solitary spy on a top-secret mission. Fast forward to today, and remote working is something that pretty much everyone can, and has to, do. Remote working’s a great thing. It can expand possibilities for businesses and workers alike. But it does bring a new set of problems: making sure that IT systems and data stay protected. To combat potential risks, businesses and employees need to kick their security controls up a notch to enable safe and secure remote working for everyone. By the end of this course, you’ll be able to: • Identify the security risks of remote working • Recognize the benefits of secure remote working • Adopt best practices for remote-working security Why take this course? If you work remotely or manage employees that do, this course will explain the risks that remote working presents and best practices to help stop risk becoming reality. And, by using the advice in this course, you’ll be able to develop secure remote-working methods that’ll help keep data protected. 10 mins | SCORM | Takeaway Tasks
  • Would you leave your house without first checking that all windows and doors are locked? Of course you wouldn’t, unless you live in a magical dreamland. Maybe you have a strong alarm system or motion detectors in place, too. These are vital and essential steps we all take to ensure security and prevent intruders from stealing our belongings. Computer networks and cloud storage systems are also at risk of virtual intruders breaking in and stealing our data. Alongside theft, compromised security may lead to the corruption of files through viruses and the erasure of critical documents via harmful malware. By the end of this course, you’ll be able to: • Recognize the importance of securing your network and cloud services • Identify the risks of inadequate network and cloud security • Understand how to improve protection and prevent threats Why take this course? Cyberattacks continue to rise as criminals find sneakier ways of infiltrating security systems. If you’re a business owner or employer, this puts your organization at an increased risk of sabotage. This course will show you effective ways to reduce the risks and help ensure safety. It’s also suitable for individuals, because even in a dreamland there might be gremlins. 10 mins | SCORM | Workbook
  • If you were asked to climb a chain that had a rusty link somewhere, you’d probably think twice. After all, a chain is only as strong as its weakest link. It’s an expression we’ve all heard before, but it’s true. One weak point and the whole thing snaps, and you’re tumbling to the floor! The same is true for cybersecurity. Cybercriminals are most likely to attack at the weakest point. If you have a weak link, they’ll be able to exploit it and cause damage along the entire supply chain. This course will help you ensure your entire supply chain has robust cybersecurity. By the end of this course, you’ll be able to: • Explain why cybersecurity is paramount to every step of a supply chain • Recognize common supply chain cyberattacks • Implement the principles of supply chain cybersecurity Why take this course? For your cybersecurity to be effective, it needs to cover your entire supply chain. This course, suitable for anyone in IT or security management, will teach you how to spot and deal with weak links. You’ll also learn some common cyber supply chain attacks, so you can work to prevent them from happening to you. 10 mins | SCORM | Workbook
  • These days, pretty much every industry uses and stores some kind of data, so you need to think very carefully about how to protect it. Just running a garage business on the World Wide Web can see you handling personal data from the other side of the planet. The problem is, data protection laws are different the world over. And when you do business in global markets, data regularly travels across borders. So, how do you deal with that? Well, while rules and regulations might change from country to country, techniques you can use to protect data remain largely the same. By the end of this course, you’ll be able to: • Recognize some of the differences in data protection laws worldwide • Describe how data can be used • Apply data protection techniques Why take this course? No matter your industry, if you work with data, then you need to know how to protect it and what the consequences might be if you don’t. This course will show you some of the differences in data protection laws around the world, explain the ways you can protect data, and show you how to put data protection laws into practice. 15 mins | SCORM | Workbook
  • Just because you’re at work doesn’t mean you forget to drink water and eat food. Yes, your day will probably be filled with important business, but you still need to do basic life tasks to keep yourself healthy at work. So why is it that so many workers forget basic cybersecurity to keep their tech healthy at home? It can leave them and even their work, through connected devices, vulnerable to a cyberattack. This course will help you maintain your cybersecurity awareness from office to home. By the end of this course, you’ll be able to: • Explain the benefits of having a “Just Culture” when it comes to cybersecurity • Compare common security failings at home and work • Implement ways to be more security conscious both at home and at work Why take this course? This course will give you cybersecurity best practices that you can implement wherever and whenever. You’ll learn what security failings to look out for both at home and work to remain secure online. We all need to stay vigilant against cyberattacks, so this course is suitable for everyone. 10 mins | SCORM | Workbook