Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Certified Security Awareness Practitioner

Alexhost
O 0

oaxino

Alpha and Omega
Member
Access
Joined
Nov 24, 2022
Messages
30,041
Reaction score
874
Points
113
Age
35
Location
japanse
grants
₲90,192
2 years of service

db6f561b9310ee1e2b77c449e499793d.jpeg

Certified Security Awareness Practitioner
Published 2/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.03 GB | Duration: 1h 44m

Learn the basics of running a successful training and awareness program.​

What you'll learn
Defining Security and Awarness
Developing a successful Security and Awarness Program
Protect the organization data and ressources
Help employees to protects their assets against any leakage
Understanding the basic concept of Cybersecurity
Understand the basic concept of Sales and Marketing
Requirements
No prior knowledge is required
Description
Not all training and awareness programs are alike. Building a robust security awareness program is important, but it can be in vain in your employees don't buy into what you're selling and actually change their security behavior. Go "beyond compliance" to learn about sales and marketing techniques that can take a training and awareness program to the next level: engagement and behavior change. This course also includes security basics for soft-skilled professionals new to the security field, as well as how to leverage brain chemistry to be more effective. This learning path is designed for established security practitioners with existing security expertise who are new to the practice of security training and awareness and people with existing marketing and communications experience who are entering the field of security training and awareness. Any hacker will tell you that the easiest target isn't a system or a technology; it's people. In this learning path, you'll learn how to engage your audience and create "pull" for your training and awareness. You'll learn how to assess the security culture of your organization and map out a plan to improve it. You'll learn how align your program to your organization's goals and get executive support. You'll learn how people learn, and how they consume media. You'll learn how to create marketing personas and how to get the right message to the right person at the right time, increasing the likelihood of behavioral change. You'll also learn about: the awareness maturity model, measuring impact and engagement, integrating existing technology with your training and awareness program, and evaluating human risk.
Overview
Lecture 1 Course Overview
Lecture 2 Who Am I
Section 1: Training and Awareness Basics Overview
Lecture 3 What is Training and Awarness
Section 2: Security Basics
Lecture 4 People, Process, Technology and the NIST Framework
Lecture 5 Basic Security Terminology and Concepts
Lecture 6 Basic Risk Terminology
Lecture 7 Terminology: Law, Regulation, Policy, Standard, Guideline
Lecture 8 Attacks and Social Engineering Terminology
Section 3: Introduction to Security and Awarness
Lecture 9 Current State of Training and Awareness and Employee Engagement
Lecture 10 Bias, Distraction, Apathy and Fatigue
Section 4: Sales and Marketing Concepts and Techniques for Training and Awareness
Lecture 11 Human Attention Spans, the Hook and Storytelling
Lecture 12 Introduction to Marketing, Personas and the Sales Funnel
Lecture 13 Tactics, Marketing Automation and Integrated Campaigns
Section 5: Creative
Lecture 14 Branding and Positioning
Section 6: Program Execution
Lecture 15 Designing and Planning a Program
Lecture 16 Learning Science, Fogg and Gardner
Lecture 17 Right Message, Right Person, Right Time
Lecture 18 Launching Phishing and Training, Reporting
Lecture 19 Carrot vs Stick, Repeat Offenders
Ambitious Students who want to entry to the cybersecurity learning path

8568c87fe687aa4f5ac9ff8ccbd80e9a.jpeg

Download link

rapidgator.net:
You must reply in thread to view hidden text.

uploadgig.com:
You must reply in thread to view hidden text.

nitroflare.com:
You must reply in thread to view hidden text.
 
Top Bottom