End User Security Awareness

This e-learning course is designed with a singular focus: to enhance your digital security skills. Through comprehensive modules and interactive content, it aims to provide you with the knowledge and tools needed to protect yourself and your organization from cyber threats.

  • The End User Security Awareness course aims to equip individuals with essential cybersecurity knowledge, addressing common threats and best practices to enhance personal and organizational security.

  • Expect 12 comprehensive modules covering key topics such as data threats, malware, network security, and safe online behaviors, each reinforced with instructional videos and interactive quizzes to ensure a thorough understanding of each subject.

  • Participants will gain practical skills to recognize and respond to security threats, improve their digital hygiene, and contribute to a safer online environment for themselves and their organizations.

  • This course is ideal for employees, students, and anyone looking to improve their cybersecurity knowledge and practices, providing valuable insights to protect personal and professional digital environments.

Course curriculum

  • 2

    Data Threats

    • Defining Assets, Cybercrime and Hacker Types

    • Cracking, Force Majeure and Directional Threats

    • Quiz

  • 3

    Value of Information

    • Protecting Personal and Corporate Information from Unauthorized Access

    • CIA and the Corporate Security Policy

    • Quiz

  • 4

    Personal Security

    • Social Engineering Attack

    • Identity Theft

    • Quiz

  • 5

    File Security

    • Office Macros and Secure File Access

    • File Integrity and Confidentiality

    • Quiz

  • 6

    Malware Explained

    • Malware Types, Concealment and Actions

    • Quiz

  • 7

    Malware Protection

    • Anti-Malware Detection Mechanisms and Zero-day Attacks

    • Quiz

  • 8

    Network Security

    • Understanding Cybersecurity Keywords

    • Quiz

  • 9

    Access Controls

    • Authentication, Authorization and Accounting Controls

    • Implementing Permissions and Encryption for Network Access

    • Quiz

  • 10

    Email Security

    • Email Protocols, Attacks and Security

    • Quiz

  • 11

    Web Browsing Security

    • Web Attacks, Security and Privacy

    • Quiz

  • 12

    Social Networking Security

    • Information Leaks and Alternate Data Streams

    • Quiz

  • 13

    Data Management Security

    • Data Physical Security, Encryption and Restore versus Destruction

    • Quiz