INTERMEDIATE CYBER AWARENESS SKILLS
COURSE AIMS
This hands-on short training course has been designed to give delegates, who hold some basic awareness a more solid understanding of both cyber awareness increasing their knowledge, security and compliance.
Types of non-genuine email
- Phishing
- Spear Phishing
- Whaling
Password Security:
- Personal Info
- Password Hygiene
- Password management
- Two-Factor Authentication (2FA/MFA)
- What not to do
Malware:
- Types of malware and malware info
- Targets (Windows, Android, iOS)
- Mobile phone/tablet ransomware/malware
- How do you get infected?
Device Security
- Leaving devices unattended, locking your screen.
- Do not leave your devices in the car / on display etc.
- Personal phones only allowed to connect to Guest network
- No personal Laptops/Tablet devices allowed to connect to HT network.
Data Security
- Secure data saving / network or mapped drives
- Local device security
- Security management USB storage devices
Public Wi-Fi
- Unsecure
- Checking processes and systems
- What not to use
Online safety:
- HTTPS
- Search engines
GDPR Awareness
COURSE AIMS
This hands-on short training course has been designed to give delegates, who hold some basic awareness a more solid understanding of both cyber awareness increasing their knowledge, security and compliance.
Types of non-genuine email
- Phishing
- Spear Phishing
- Whaling
Password Security:
- Personal Info
- Password Hygiene
- Password management
- Two-Factor Authentication (2FA/MFA)
- What not to do
Malware:
- Types of malware and malware info
- Targets (Windows, Android, iOS)
- Mobile phone/tablet ransomware/malware
- How do you get infected?
Device Security
- Leaving devices unattended, locking your screen.
- Do not leave your devices in the car / on display etc.
- Personal phones only allowed to connect to Guest network
- No personal Laptops/Tablet devices allowed to connect to HT network.
Data Security
- Secure data saving / network or mapped drives
- Local device security
- Security management USB storage devices
Public Wi-Fi
- Unsecure
- Checking processes and systems
- What not to use
Online safety:
- HTTPS
- Search engines
GDPR Awareness
- Data Processors and Data Controllers
- Secure storage of data and extra requirements for special category data
- Awareness of lawful basis for processing
- Data Retention
- Data Subject Access requests
- Data Breaches
- Individual rights of data subjects
- More information