Sales 0333 577 5016

sales@i2comply.com

Support 0333 577 5017

support@i2comply.com
Discounts
No. of licences % saving
1-9
10-19 10%
20-49 20%
50-99 25%
100-149 30%
150-199 35%

For discounted prices on 200+ licences, please email us at info@i2comply.com or call us on 0333 577 5016.

Download

Click on the image below to download the Cyber Security Awareness flyer.

Cyber Security Awareness

Duration: 1.5 hours
Cost: £15+VAT

This online Cyber Security Awareness training will help you to understand the potential impact of common cyber threats. It outlines safe behaviour on the Internet and identifies what steps you can take to protect yourself and your organisation from cyber-attacks.

The approximate duration of this training is 1.5 hours.

Who is it for?

The training is suitable for anyone who uses the Internet at work and applies to all devices that have internet access, including desktop and laptop computers, tablets and smartphones.

When do I get my certificate?

When you have successfully passed the course you will be able to download and print your certificate straight away.

As this course has been accredited by the CPD Certification Service, your certificate will contain the CPD logo and can be used to provide evidence for compliance.

What does the course cover?

The course contains the following 7 topics and includes an assessment:

Introduction to Cyber Security

  • Who is a potential target for cyber-attacks.
  • Who commits cyber-crime.
  • How human behaviour creates risks.
  • The risks associated with the Internet of Things.
  • How data protection regulations affect you with respect to cyber-crime.

Brute Force Attacks

  • What a brute force attack is.
  • How social media is targeted by hackers to help them guess passwords.
  • What makes for a secure password.

Internet Cookies

  • Why cookies are important and what they do.
  • The risks associated with them.
  • What you can do to minimise these risks.

Social Engineering Attacks

  • Four kinds of social engineering - tailgating, phishing, baiting and chat-in-the-middle.
  • Ways to protect yourself from phishing attacks.

Malware

  • Types of malware - viruses, worms, Trojans, logic bombs and ransomware.
  • Ways to defend against malware attacks.

Grayware

  • How a variety of different grayware works - adware, keyloggers, bots and botnets.
  • Ways to reduce grayware on your device.

Identity theft

  • How criminals steal identities and what they do with them.
  • Signs that indicate you may be a victim of identity theft.
  • What to do if your identity is stolen.

Assessment

The assessment is generated from question banks so that the questions change each time a candidate takes the assessment – making the training suitable for initial and refresher training.

There is no limit on the number of attempts at the assessment and informative feedback is given so candidates can learn from their incorrect responses.

Can’t find the training you want? Just email us at info@i2comply.com or call us on 0333 577 5016 to discuss what you are looking for. We regularly add to our training portfolio and adapt existing training to specific end user requirements.