Skip to content

BankersHub, BOL Learning Connect, TRC Interactive, and Lorman are now part of Noggin Guru

  • Test

Skip to product information
1 of 1

Cyber Security Best Practices and Compliance for Employees

Cyber Security Best Practices and Compliance for Employees

This course aims to provide a comprehensive understanding of the risks associated with social engineering attacks on systems containing sensitive electronic data. It will cover various attack methods employed by hackers, shed light on how these attacks operate, and outline essential steps to safeguard data and systems.

Instructor:

Saeed Akbani

Standard Price:
Regular price $299.00
Sale price $299.00 Regular price
Sale Sold out
Included With Membership
View Membership Options
  • American Express
  • Discover
  • Mastercard
  • Visa
View full details

Understand the risks to your data through social engineering and email phishing attacks.

In today's digital age, strong cybersecurity extends beyond technology safeguards, recognizing the human factor as a critical link in the security chain. Despite increased investment in technology, hackers often exploit human errors through low-tech social engineering attacks, leading to significant data breaches and security incidents. This course aims to provide a comprehensive understanding of the risks associated with social engineering attacks on systems containing sensitive electronic data. It will cover various attack methods employed by hackers, shed light on how these attacks operate, and outline essential steps to safeguard data and systems. The prevalence of phishing emails is a common challenge, with scammers continually devising new strategies to bypass filters. Individuals receive an average of 3-5 phishing emails weekly, putting them at risk of engaging in actions that could have severe consequences. To address this, the course will focus on educating participants on how to identify phishing emails and offer practical tips to help them avoid falling victim to such scams. This knowledge is crucial for organizations of all sizes to mitigate risks and protect against potential security threats.

Agenda

Understand the Cyber Threat Landscape

  • Identify and Understand Social Engineering Techniques
  • Understand the Types of Human Error That Can Place an Organization at Risk

Understand Regulatory Risks Associated With Data Breach

  • Federal Law Reporting Requirements
  • State Law Reporting Requirements
  • Regulatory Enforcement Background

Understand Effective Measures That Can Be Taken to Mitigate the Effect of Human Error and Social Engineering Attacks

  • Training and Awareness Best Practices
  • Technology Best Practices

What Is Phishing and Why You Should Be Concerned

How Do You Become a Victim of Phishing

5 Ways to Identify Phishing and Avoid Becoming a Victim

Some Real-Life Examples

Phishing Simulations

Questions and Answers

Concluding Remarks

Back to top