Cyber Security Essentials: Stop. Think. Ask.™
Signature Course ID: 2638

Cyber Security Essentials: Stop. Think. Ask.™

Cybersecurity Situations & Awareness

Cybersecurity is the practice of protecting systems, networks, programs, devices and data from cyber-attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. By understanding terminology, possible targets and the consequences of cyber-attacks, we can all minimize the potential impacts, gain value in your cybersecurity efforts, and even prevent future attacks.

Buying Options

eLearning - Sollah Hosted $17.00 (Minimum 100 learners)

The course will be uploaded to TRAININGFLOW™. Course pricing is based on the total number of learners for the chosen license period (1-3 years). There are volume as well as multi-year discounts available.

eLearning - Client Hosted $15.00 (Minimum 100 learners)

The course will be packaged for use in YOUR OWN LMS. Course pricing is based on the total number of learners for the chosen license period (1-3 years). There are volume as well as multi-year discounts available.

Request a Quote

Please contact us using the form below. We'll answer your questions and provide a timely quote. Course pricing is based on the total number of learners for the chosen license period (1-3 years). There are volume as well as multi-year discounts available.

Additional Information

Regardless of written policies and procedures, people WILL open emails that look like they are from vendors or customers (only to unleash malware). People WILL share passwords to get a job done on time. People WILL send payment to criminals who use fake letterhead/spoofed (phishing) emails. It’s human nature… and it opens the organization to all sorts of trouble!

Trainer's Comments: The situations presented in this program (as well as the information the fraudster discusses between situations) supplement your company’s technology-facing approach to cybersecurity. They reinforce good habits by showing the true consequences of bad cybersecurity choices. This program provides an overview of the definitions, activities and actions often related to cybersecurity and the prevention of cyber-attacks, including: Promptly reporting potential breaches or suspicious emails; Verifying requests to transfer funds or provide personal identifiable information (PII); Staying alert to potential fraudulent email requests; Following all policies & procedures regarding cybersecurity; Remembering to STOP, THINK and ASK if something looks (or feels) suspicious.

More From the Series: Avoiding the Scam! Understanding Your Role in Cybersecurity™

Related Programs & Training Ideas

Categories & Details

Competencies

  • Developing High-Performing Work Habits
  • Exhibit Interpersonal Effectiveness
  • Managing Risk

Learning Objectives

  • Explain the role of cyber security in protecting our organization.
  • Understand several types of cyber-attacks and how to identify (and prevent) them.
  • Remember to STOP, THINK and ASK if something looks (or feels) suspicious.

Interactivity

  • Audible Narration
  • Linear Navigation
  • Integrated Video
  • Interactions and Activities
  • Pre-Assessment
  • Inline Quiz
  • Post-Assessment

Share This Page