Course Content
Fundamentals of cyber security
You don't currently have access to this content
3 Topics
What is Cyber-Security?
You don't currently have access to this content
Why is Cyber-Security important?
You don't currently have access to this content
The role of employees in Cyber-Security
You don't currently have access to this content
General risk posed by cyber or IT attacks
You don't currently have access to this content
3 Topics
Current threat situation and background
You don't currently have access to this content
Attacker motivation
You don't currently have access to this content
Consequences of a successful attack
You don't currently have access to this content
Phishing
You don't currently have access to this content
4 Topics
What is Phishing?
You don't currently have access to this content
Recognizing Phishing attacks
You don't currently have access to this content
How to protect yourself from Phishing
You don't currently have access to this content
The dangerous click game – A Phishing story
You don't currently have access to this content
Malware
You don't currently have access to this content
3 Topics
Types of Malware
You don't currently have access to this content
How Malware spreads
You don't currently have access to this content
Malware protection
You don't currently have access to this content
Password security
You don't currently have access to this content
4 Topics
Creating strong passwords
You don't currently have access to this content
Passwort-Management-Tools
You don't currently have access to this content
The myth of regular password changes
You don't currently have access to this content
MFA (multi-factor authentication)
You don't currently have access to this content
Safe in the company
You don't currently have access to this content
4 Topics
Safe workplace
You don't currently have access to this content
Safe in home office
You don't currently have access to this content
Internet & cloud services
You don't currently have access to this content
Dealing with social media
You don't currently have access to this content
Secure communication
You don't currently have access to this content
4 Topics
General dangers associated with emails
You don't currently have access to this content
Attachments and links in emails
You don't currently have access to this content
Dealing with suspicious emails
You don't currently have access to this content
3 seconds more email security
You don't currently have access to this content
Emergency measures
You don't currently have access to this content
2 Topics
What to do in the event of a security incident?
You don't currently have access to this content
Reporting security incidents
You don't currently have access to this content
