End User Security Awareness | 1 Hour Course Overview:
Looking to implement this class to your entire company? Get started with a Free Cybrary Team:
Gain confidence and competence in security best practices in this brief, one hour security awareness training course.
Security awareness training is a buzz word that is sweeping all organizations across all industries right now. Making sure that each and every employee within an organization has the competence to identify threats, avoid mistakes and make the right moves once threats are identified, is critical to the company’s security practice. Cybrary’s free End User Security Awareness training course will help you to understand spam, malware, ransomware, phishing and social engineering. You will complete this course with the confidence to identify and handle threats as they appear.
By completing this security awareness course, you will become well prepared to execute data security best practices, each and every day in your job. Given the impact that today’s cyber security threat environment can have on any organization, these best practices are an essential element to all stakeholders from the mail room to the board room.
Before you Begin:
Please be aware that you should be taking this course using either Google Chrome or a recent edition of Internet Explorer. IE is the preferred browser.
Get started learning security awareness, for free!
Other end users in your organization may also benefit from:
Create a Cybrary Team to:
Learn more about Cybrary Teams
Module 1 PowerPoint notes & PDF version
Module 2 PowerPoint notes & PDF version
Module 3 PowerPoint notes & PDF version
Module 4 PowerPoint notes & PDF version
Module 5 PowerPoint notes & PDF version
Module 6 PowerPoint notes & PDF version
Module 7 PowerPoint notes & PDF version
Module 8 PowerPoint notes & PDF version
Module 9 PowerPoint notes & PDF version
Lecture Course Page
Module 1 – What is Cyber Security
Module 2 – Personally Identifiable Information
Module 3 – Social Engineering
Module 4 – Emails, Links, and Attachments
Module 5 – Online Security Basics
Module 6 – Computer Best Practices
Module 7 – Network Security
Module 8 – Physical Security
Module 9 – Mobile Devices
Module 10 – What Happens Next?