Welcome to Mobilarian Forum - Official Symbianize forum.

Join us now to get access to all our features. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, and so, so much more. It's also quick and totally free, so what are you waiting for?

Role Based Information Security Awareness Training

Alexhost
OP
O 0

oaxino

Alpha and Omega
Member
Access
Joined
Nov 24, 2022
Messages
30,024
Reaction score
874
Points
113
Age
35
Location
japanse
grants
₲89,817
1 years of service

c7d547f74244f00a7ab36bbe354c0ceb.jpeg

Role Based Information Security Awareness Training
Published 3/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.79 GB | Duration: 1h 33m

General users & role specific scenarios of cyber risks​

What you'll learn
Identify common security threats and attacks that can impact your organization and recognize the signs of a potential security breach.
Understand the importance of role-based security and the specific responsibilities and best practices for your job function to maintain a secure workplace.
Be more vigilant post the training
Contribute to the Organizations security overall
Requirements
No prior Experience needed, some basic understanding of day to day systems would suffice
Description
Welcome to the Ultimate Information Security Awareness Course! In today's world, information is the most valuable commodity, and the consequences of losing it can be catastrophic. As a result, information security has become a critical issue in organizations worldwide. Whether you're an employee, manager, or CEO, understanding the basics of information security is essential to keep your organization safe from cyber-attacks, data breaches, and other malicious activities.In this course, we'll dive deep into the world of information security and provide you with a comprehensive understanding of the role that you play in keeping your organization safe. This course was developed after extensive research over a period of time by industry experts to identify the scenarios that could present themselves based on the roles. We have also tried to making very captivating for the learners to be engaged and enjoy the learning process.Our course is specifically tailored to your role, whether you're from C-Suite, Marketing, Mergers & Acquisition or a HR, Legal or Finance professional or end-user, ensuring that you have the necessary knowledge to secure your organization's information assets effectively. With practical exercises, real-life case studies, and expert advice from seasoned security professionals, you'll gain the confidence and expertise to manage your organization's security risks.Join us on this exciting journey to take your information security awareness to the next level!
Overview
Lecture 1 Introduction
Section 1: Introduction to General Cyber Awareness
Lecture 2 Why Security is important
Section 2: Phishing- Game of Emotions
Lecture 3 Game of Emotions
Lecture 4 Desire
Lecture 5 Fear
Lecture 6 Curiosity
Lecture 7 Impulse
Lecture 8 Trust & Happiness
Section 3: Types of Cyber Attacks
Lecture 9 Social Engineering, Phishing & Business Email Compromise (BEC)
Lecture 10 Vishing, Smishing & Spear Phishing
Lecture 11 Session Hijacking & Malvertizing
Section 4: Anatomy of a Phishing Email
Lecture 12 Anatomy of a Phishing Email
Section 5: How can you Make a Difference
Lecture 13 How can you make a Difference
Section 6: Role Based Scenarios Section - All employees & End Users
Lecture 14 Introduction to Role Based Scenarios Section
Lecture 15 Why are employees easy target for hackers
Lecture 16 Common Types of Attacks
Lecture 17 Phishing attacks (spear phishing, whaling, etc.)
Lecture 18 Types of Attacks Part 01
Lecture 19 Types of Attacks Part 02
Lecture 20 Cyber Frauds on Social Media
Lecture 21 Have you been clicking on ads or pop ups on sites & Internet of Things (IoT)
Lecture 22 Unusual scenarios where users are tricked Part 01
Lecture 23 Unusual scenarios where users are tricked Part 02
Lecture 24 How can you protect Yourself & the Organization
Lecture 25 Summary
Section 7: C-Suites
Lecture 26 Why are C-Suites subjected to Cyber Attacks
Lecture 27 What kind of attacks are planned against C-Suites
Lecture 28 How are attacks against C-Suites planned
Lecture 29 Techniques of gathering information
Lecture 30 What can one bad click result in & what should you do protect Yourself
Section 8: Human Resource (HR)
Lecture 31 Why Human Resource (HR) professionals are targets of Cyber Attacks
Lecture 32 Cyber frauds relevant to HR Function
Lecture 33 What can one bad click do
Lecture 34 Summary of Cyber frauds in HR
Lecture 35 What can HR Professionals do protect themselves from Cyber Threats
Section 9: Mergers & Acquistions (M&A)
Lecture 36 Why are Mergers & Acquisitions (M&A) teams targetted
Lecture 37 What are the different kinds of attacks M&A teams face
Lecture 38 What can bad click result in & how can you protect
Section 10: Legal
Lecture 39 Why & how legal teams & are facing Cyber Threats
Lecture 40 A realtime scenario where "one bad click " caused a catastrophic effect
Lecture 41 What can legal professionals do to protect themselves from Cyber Threats
Lecture 42 Summary of role & scenario based section
Section 11: Course conclusion
Lecture 43 Course conclusion & summary
This course is for users who connect to internet and for all employees in an organization

Download link

rapidgator.net:
You must reply in thread to view hidden text.

uploadgig.com:
You must reply in thread to view hidden text.

nitroflare.com:
You must reply in thread to view hidden text.

1dl.net:
You must reply in thread to view hidden text.
 
K 0

KatzSec DevOps

Alpha and Omega
Philanthropist
Access
Joined
Jan 17, 2022
Messages
621,937
Reaction score
7,884
Points
83
grants
₲58,427
2 years of service
oaxino salamat sa pag contribute. Next time always upload your files sa
Please, Log in or Register to view URLs content!
para siguradong di ma dedeadlink. Let's keep on sharing to keep our community running for good. This community is built for you and everyone to share freely. Let's invite more contributors para mabalik natin sigla ng Mobilarian at tuloy ang puyatan. :)
 
Top Bottom