It helps employees identify threats and avoid costly mistakes. This course teaches practical, everyday cyber safety skills.
Course Curriculum
| Introduction | |||
| Introduction | 00:01:00 | ||
| Module 01: Cyber Threat Fundamentals | |||
| 1.1. Cyber Threat Fundamentals | 00:01:00 | ||
| 1.1.1. What is Cybersecurity and Why It Matters | 00:01:00 | ||
| 1.1.2. Definitions Threats, Vulnerabilities, Risks, and Exploits | 00:01:00 | ||
| 1.1.3. Common Cyber Threats Malware, Phishing, Ransomware | 00:01:00 | ||
| 1.1.4. Insider Threats and Their Impact | 00:01:00 | ||
| 1.1.5. Understanding IPS, IDS, and Firewalls | 00:01:00 | ||
| 1.1.6. Case Studies Real U.S. Cyber Incidents | 00:01:00 | ||
| Quiz – Section 01 | 00:10:00 | ||
| Module 02: Phishing and Social Engineering Tactics | |||
| 2.1. Phishing and Social Engineering Tactics | 00:01:00 | ||
| 2.1.1. Types of Phishing Standard, Spear Phishing, Smishing, W-2 Phishing | 00:01:00 | ||
| 2.1.2. Whaling and CEO Fraud Explained | 00:01:00 | ||
| 2.1.3. Social Engineering Techniques Pretexting, Baiting, Tailgating | 00:01:00 | ||
| 2.1.4. VOIP and Communication-Based Attacks | 00:01:00 | ||
| 2.1.5. Simulation Activity Identifying Legitimate vs. Fake Websites | 00:01:00 | ||
| 2.1.6. Reporting Suspicious Activity | 00:01:00 | ||
| Quiz – Section 2 – CAE | 00:10:00 | ||
| Module 03: Secure Authentication and Access Control | |||
| 3.1. Secure Authentication and Access Control | 00:01:00 | ||
| 3.1.1. Password Management and Common Risks | 00:01:00 | ||
| 3.1.2. Password Guidelines and Best Practices (NIST-Aligned) | 00:01:00 | ||
| 3.1.3. Two-Factor (2FA) and Multi-Factor Authentication (MFA) | 00:01:00 | ||
| 3.1.4. Using Password Managers Securely | 00:01:00 | ||
| 3.1.5. Real-World Consequences of Weak Authentication | 00:01:00 | ||
| Quiz – Section 3- CAE | 00:10:00 | ||
| Module 04: Device, Network & Internet Security | |||
| 4.1. Device, Network & Internet Security | 00:01:00 | ||
| 4.1.1. Secure Internet Usage and Safe Browsing Habits | 00:01:00 | ||
| 4.1.2. Internet Security Basics HTTPS, Pop-Ups, Suspicious Links | 00:01:00 | ||
| 4.1.3. Cloud Security Awareness and Safe File Sharing | 00:01:00 | ||
| 4.1.4. Email Security Attachments, Embedded Links, Red Flags | 00:01:00 | ||
| 4.1.5. Physical Security Workstation Setup, Clean Desk Policy, Secure Access | 00:01:00 | ||
| Quiz – Section 4 -CAE | 00:10:00 | ||
| Module 05: Data Privacy, Protection & Policy Compliance | |||
| 5.1. Data Privacy, Protection & Policy Compliance | 00:01:00 | ||
| 5.1.1. What is Sensitive Data PII, PHI, Financial Information | 00:01:00 | ||
| 5.1.2. Overview of U.S. Data Privacy Laws HIPAA, CCPA, FERPA, GLBA | 00:01:00 | ||
| 5.1.3. Safe Data Handling Storage, Transfer, Disposal | 00:01:00 | ||
| 5.1.4. Organizational Policies Compliance and Acceptable Use | 00:01:00 | ||
| 5.1.5. Social Media Risks and Oversharing | 00:01:00 | ||
| 5.1.6. BYOD Policies and Mobile Device Security | 00:01:00 | ||
| Quiz – Section 5- CAE | 00:10:00 | ||
| Module 06: Incident Response and Real-World Awareness | |||
| 6.1. Incident Response and Real-World Awareness | 00:01:00 | ||
| 6.1.1. What to Report Breaches, Phishing, LostStolen Devices | 00:01:00 | ||
| 6.1.2. How to Report Incidents Internally | 00:01:00 | ||
| 6.1.3. Role-Based Risks HR, Finance, Executives, IT | 00:01:00 | ||
| 6.1.4. Importance of Timely Response and Escalation | 00:01:00 | ||
| 6.1.5. Optional Simulation Exercise PhishingEmail Incident Response | 00:01:00 | ||
| Quiz – Section 6- CAE | 00:10:00 | ||
| Conclusion | |||
| Conclusion | 00:01:00 | ||
| Final Quiz – CAE | |||
| Final Quiz – CAE | 00:10:00 | ||
| Order Your Certificate | |||
| Order Your Certificate | 00:00:00 | ||



All Courses for £49

