Themabewertung:
  • 0 Bewertung(en) - 0 im Durchschnitt
  • 1
  • 2
  • 3
  • 4
  • 5
Information Security Awareness An Introduction For Uk Smes
#1

[Bild: e2b01bec579e551da6547e988a673ebc.jpeg]


Last updated 4/2018
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.26 GB | Duration: 1h 49m

Recognise the main UK SME cyber security breaches and learn how to protect yourself and your company from common attacks


What you'll learn
Recognise the main UK SME cyber security threats including viruses, malware, impersonation, hacking, identity theft and corporate identity fraud.
Protect yourself from social engineering attacks through cautious behaviour, call verification and email precautions.
Safely handle email attachments and follow hyperlinks, identify fake emails, and recognise common business scams.
Avoid social media dangers including identity theft, social engineering attacks and malware, and adopt sound social media practices.
Securely manage your passwords.
Requirements
An appreciation of UK small business and its environment.
A general familiarity with internet browsing and typical office applications.
Description
What Will I Learn?
The value of stolen information and how to recognise UK SME cyber security threats including viruses, spyware, malware, impersonation, denial-of-service, hacking, identity theft and corporate identity fraud,How social engineering attacks operate and how to protect yourself through cautious behaviour, call verification and by applying email precautions,Sound practices to safely handle email attachments and follow hyperlinks, identify fake emails, and recognise common business scams,To recognise and avoid social media dangers including identity theft, social engineering attacks and malware, by adopting sound social media practices,To securely manage your passwords.
Requirements
An appreciation of the small business workplace,A general familiarity with internet browsing and common office applications.
Description
UK SMEs are at risk of cyber-attack. Security awareness training helps SMEs defend themselves. This introductory, non-technical information security awareness course, avoids (almost all) jargon to outline key SME workplace security threats and give you actionable solutions.
Develop a security-mindset based on a realistic, evidence-based UK SME threat awareness
Know who the attackers target and why,Minimise your user-enabled security attacks,Defend yourself and your company against phishing and other lure-based attacks,Adopt safe, and avoid unsafe workplace social media practices,Improve your password management.
Protect yourself and your SME
SMEs with a security-aware culture are less likely to suffer an expensive cyber-attack. Educating yourself about workplace information security threats and adopting secure practices will help protect your company. This course introduces end-user focused, straightforward, non-technical security awareness topics.
The course is particularly suited to micro (0-9 employees) and small (10-49 employees) SMEs. Some medium (50-249 employees) SMEs will benefit from parts of the course. Most examples and many references in the course are UK sourced.
Individuals, families, small businesses and large organisations share many information security threats. How SMEs should prepare for and respond to these threats differs from the other categories of user. Defensive techniques and tips offered in this course are UK SME oriented.
Key information security awareness topics are presented in a straightforward, accessible and practical manner.
At the end of each topic, use the workbooks to determine further security awareness actions.
Course content and overview
Actionable end-user security awareness training is structured around five key, standalone topics
You are a target,Social engineering,Dangerous email and links,Social media issues,Password risks.
This course comprises of 33 lectures and around 2 hours of lecture content. Each topic divides into several short lectures. Lectures typically last 4-8 minutes. Following each topic, are practice activities and resources: e.g. a downloadable lecture pdf, an online quiz providing immediate feedback, a downloadable workbook and a topic bibliography.
A course completion certificate is also available.
Course topics
You are a target
This topic considers the value of personal or company information and how it is sold on darknet markets. It introduces identity theft, highlighting the type of people deliberately targeted. Corporate identity fraud and basic protection approaches are addressed. Common workplace information security threats, as identified by a UK government survey, are introduced.
Social engineering
This topic introduces social engineering is and explains its popularity amongst attackers. Three main malicious social engineering techniques are introduced. Mainly UK social engineering examples are given. Defensive techniques against social engineering attacks are outlined.
Dangerous email and links
This topic considers email attachment dangers. The reasons attackers favour email are given. Email protection steps are provided. Hyperlinks and their dangers are explained. How to distinguish between real and fake email is explored. Scams targeting UK SMEs and protection advice are introduced. A specific attack type - spear phishing - is also considered.
Social media issues
This topic introduces workplace social media. SME social media concerns are outlined. Key social media dangers including identity theft, social engineering attacks, malware infection, plus employee and employer risks are discussed. Social media advice for UK SME employees and employers is provided.
Password risks
This topic considers key password issues including the 'worst' passwords, too many passwords, forgotten passwords and main types of password attack. Technical security controls for passwords and their limitations are outlined. The contrast between how users manage passwords and how they should manage their passwords is explored. Poor password hygiene practice is demonstrated. Good practice password hygiene is explained. Two-factor authentication is outlined. SME password security - managing multiple logins and passwords plus security tips for passwords are introduced.
Overview
Section 1: Introduction
Lecture 1 Introduction
Section 2: You are a target
Lecture 2 Introduction
Lecture 3 The stolen information market
Lecture 4 Identity theft
Lecture 5 SME information security threats
Lecture 6 Practical implications
Lecture 7 Summary and conclusions
Section 3: Social engineering
Lecture 8 Introduction
Lecture 9 What is social engineering?
Lecture 10 Social engineering examples
Lecture 11 Defending yourself
Lecture 12 Practical implications
Lecture 13 Summary and conclusions
Section 4: Dangerous email and links
Lecture 14 Introduction
Lecture 15 Email attachments
Lecture 16 Hyperlinks
Lecture 17 Common scams
Lecture 18 Spear phishing
Lecture 19 Practical implications
Lecture 20 Summary and conclusions
Section 5: Social media security issues
Lecture 21 Introduction
Lecture 22 Social media dangers
Lecture 23 Workplace social media protection
Lecture 24 Practical implications
Lecture 25 Summary and conclusions
Section 6: Password risks
Lecture 26 Introduction
Lecture 27 Password issues
Lecture 28 Managing passwords
Lecture 29 Password hygiene
Lecture 30 SME password security
Lecture 31 Practical implications
Lecture 32 Summary and conclusions
Section 7: Course summary and conclusions
Lecture 33 Course summary and conclusions
This course is designed for:,UK-based SME employers and employees, especially those working with office computing or mobile applications including browsers, email, word processors and spreadsheets.,Computing and business students interested in UK small business.,This course is not designed for:,UK SME employees not using computers, mobile devices or accessing the internet.,People without a UK SME interest or awareness.,This is a non-technical course focussed on small business security awareness. Except for evaluation purposes, this course is not appropriate for.,Information security professionals.,Technical IT staff.,Government or large organisation staff.

[Bild: 66a0331ae6e9a2a0c11ea4bfb54d6454.jpeg]


rapidgator.net:
Zitat:https://rapidgator.net/file/241cebc971b3...1.rar.html
https://rapidgator.net/file/bf6344082421...2.rar.html

uploadgig.com:
Zitat:https://uploadgig.com/file/download/821E....part1.rar
https://uploadgig.com/file/download/74c2....part2.rar

1dl.net:
Zitat:https://1dl.net/7pajd2ggwiis/ctwok.Infor...1.rar.html
https://1dl.net/puc4p3t0dzr3/ctwok.Infor...2.rar.html

nitroflare.com:
Zitat:https://nitroflare.com/view/E83EC429AB72....part1.rar
https://nitroflare.com/view/BCF0DE27E557....part2.rar
Zitieren


Möglicherweise verwandte Themen…
Thema Verfasser Antworten Ansichten Letzter Beitrag
  Certified Information Systems Auditor : CISA Panter 0 75 15.10.2024, 02:58
Letzter Beitrag: Panter
  How To Make A To Z Diorama And Material Information Panter 0 131 20.05.2024, 23:11
Letzter Beitrag: Panter
  Intangible Assets for Living with Higher Awareness Panter 0 117 18.03.2024, 00:59
Letzter Beitrag: Panter
  EI: Awareness of Self and others: Awaken to LOVE Panter 0 145 15.11.2023, 02:40
Letzter Beitrag: Panter
  Security Operations During Covid-19 (Pandemic Security) + Panter 0 160 25.12.2022, 20:35
Letzter Beitrag: Panter
  The Best Information For Getting And Acing Any Job Interview Panter 0 165 16.12.2022, 01:47
Letzter Beitrag: Panter

Gehe zu:


Benutzer, die gerade dieses Thema anschauen: 1 Gast/Gäste
Expand chat