Overview
IT Security Awareness for Employees and Individuals - The pragmatic complete Guide to Internet and Computer Security: This course educates your employees on cyber security fundamentals to build a strong cyber security mindset.
Course Content (SCORM)
- Introduction to cyber security for everybody
- Learn how the Internet works and attackers use simple technologies to trick you
- Safe online practices
- Understand the Golden Rules for security – what you have to do
- Recognize common attack schemes
- Technical rules and practical behavioral guidelines
Material SCORM Demo Offline Demo Also on Udemy
Requirements
- None, just be interested in your IT / Computer / Internet Security!
Summary
At the workplace, with clients, or in the home office: Am I really secure? What I can do for IT security as an employee and individual.
Anyone who works with computers or mobile digital devices should understand the basics of the internet, to be able to behave correctly. This course explains the background to how the internet works and which schemes attackers use to trick users.
The courses describes technical countermeasures as well as the correct user behavior plus guides users to recognize common attacking schemes.
How do Cyber criminals think? What are the dangers? What do I have to watch out for? Are cookies bad?
The e-learning course will answer these questions and more:
- Introduction & Motivation
- What actually is "Security"? - Trying to understand In-/Security
- Internet Basics: The Internet...and the Cloud
- Basic Attacking Scheme
- Users as the weak point: Recognizing Attack Schemes & Phishing (Part 1)
- Users as the weak point: Recognizing Attack Schemes & Phishing (Part 2)
- Users as the weak point: Recognizing Attack Schemes & Phishing (Part 3)
- Example: The ideal (Banking-)Trojan
- Technical Security: Hacking
- E-Mail Security
- Insert: Online Shopping
- Insert: The 'better' (more secure) Operating system?
- Insert: 'Hacking' outside of PCs and mobile Devices
- Insert: Quishing – Phishing using QR Codes
- Insert: Disposing, Passing on, Selling Devices
- Authentication & Passwords
- Backup - Do we need that?
- The Golden Security Rules
Instructor Frank Hissen, Computer Scientist and Security Expert, teaches IT security for over 20 years and works for companies of all sizes as IT Security Consultant and Software Engineer.
Last Update
11/2024
Languages/Subtitles
- English
- Arabic (العربية)
- Chinese (中文)
- German (Deutsch)
- Spanish (Español)
- French (Français)
- Hindi (हिन्दी)
- Indonesian (Bahasa Indonesia)
- Japanese (日本語)
- Korean (한국어)
- Polish (Polski)
- Portuguese (Português)
- Romanian (Română)
- Russian (Русский)
- Thai (ไทย)
- Turkish (Türkçe)
- Vietnamese (Tiếng Việt)
We are happy to create additional subtitles mostly free of charge! Just contact us.
Course materials
Video content (132min), mobile-optimized/responsive; Course Assessment
Watch Intro
Single Course Pricing
Our flexible pricing model ensures cost-effective e-learning for businesses of all sizes. All licenses are lifetime/pay once licenses (no subscriptions!). See License Agreement.
License Tier | Users | Tier Price per User |
---|---|---|
Small Business T.A | 10-50 | 25 € |
Small Business T.B | 51-100 | 22 € |
Medium Business | 101-500 | 17 € |
Large Business | 501-1000 | 11 € |
Corporate | 1001-5000 | 6 € |
Enterprise | 5000+ | Custom Pricing |
Custom pricing available for Enterprises with additional services like dedicated support. Contact us for a personalized quote. Get in touch for offer, payment options, hosting options and further questions: