padlock2

Cyber Awareness and Resilience

Cyber Awareness and Resilience - 11 Courses - Certified by the UK’s National Cyber Security Centre

Handling Data - 5mins

handling data
This activity covers the importance of data protection, explains the risks of transferring and storing unencrypted personal data and how to dispose of data once it’s no longer required. You will learn how to encrypt, and password protect an email attachment, identify the risks associated with transferring, storing and deleting unprotected personal data and outline what the Data Protection Act 2018 and EU GDPR states all individuals and organisations must do.

Information Security

Information Security
In today’s high technology environment, organisations are becoming more and more dependent on their information systems. The public is increasingly concerned about the proper use of information, particularly personal data. By the end of this course, you will be able to define information security and identify why it’s important, identify types of information that need to be secured, appreciate different threats in relation to information and distinguish between threats, comply with organisational procedures and best practice to maintain information security, appreciate your role in securing our information assets and identifying any suspicious activity and taking appropriate action.

Passwords and Authentication - 6mins

passwords authentication
Learn how to create strong passwords and how password managers can be used and what multi-factor authentication is. By the end of this activity, you will be able to confidently use the NCSC’s technique to create strong memorable passwords and understand what a password manager and multi-factor authentication is, and when to use it.

Protecting your Business from Cyber Attacks - 5mins

protecting business from cyber attacks
This activity explores specific risks, responsibilities and the processes required to enhance your organisational resilience to cyber-attacks. It enables you to recognise the importance of planning, applying critical steps to identify and manage supply chain risks and enhance organisational resilience against cyber-attacks.

Phishing - 6mins

phishing v2
Understand what phishing is, how cybercriminals use it to obtain personal data and how to spot and report it. It also outlines how to identify the common signs of a phishing attack and identify the techniques cybercriminals use to phish for information.

Malware attack - 5mins

Malware Attack
This activity explains what malware is, how cybercriminals use it to gain unauthorised access to personal information or systems, and how to spot and report it. It outlines how to identify the techniques used, recognise the risks and impact of a malware attack and how to prevent it and what steps to take in the event of becoming a victim of a malware attack.

Responding to a Cyber Attack - 5mins

responding to a cyber attack
This activity explains how to reduce the impact of cyber-attacks and restore lost data. You’ll learn how to take appropriate steps to mitigate damage, restore data following an attack, report incidents, review lessons learned and update an organisational plan.

Reporting Cybercrime - 5mins

reporting cybercrime
This learning explains what happens when you report a cybercrime, how to report it and who to report it to. It explains the importance and benefits of reporting cybercrimes and identify the most appropriate authority, team or organisation to report a cybercrime to.

Staying Safe Online - 5mins

staying safe online
This learning demonstrates how cybercriminals can exploit social media, the risks of unsecured networks and explains the steps you can take and things you can look out for to stay safe online. You’ll learn how to identify if a website is secure, understand the risks of using public Wi-Fi networks and what to use instead plus explain the importance of social media online privacy settings and how/when to update/change them.

Safe Device Use - 5mins

safe device use
This activity explores the possible risks when using devices and removable media and what measures you should take to protect sensitive information. It outlines how to recognise the techniques used to gain unauthorised access to data and devices, identify the risks of using personal devices and removable media, how to store, share and use information and storage devices securely and how to protect your devices from unauthorised access.

Whaling Attacks - 5mins

whaling attacks
This activity explains what a whaling attack is, how cybercriminals use it to gain access to personal data or systems, and how to spot and report it. You will understand why executives and their assistants can become victims of whaling attacks, identify the techniques used, recognise the risks, impact and how to spot the signs of whaling attempts, how to prevent it and what immediate actions to take in the event of becoming victim.

Can't see what you need?

All Microsoft Office Online Courses are based on a typical one day training course at a specific skill level and are included in our full online library. If you require a more tailored course to meet a particular learning need, get in touch.

All Personal Development Online Courses are 15 minute modules that complement our Bite Size methodology and work well together to create a great training plan.

Great deals for Corporate licences – give us a call.

bitsy

Sign up for our free weekly tip

Receive a free nugget of IT Learning every week! It will give you a good feel for how we write and design our lessons and you could learn something new every week too!