€35.00
Employees, managers and directors should all have a good understanding of the threat posed by cyber-attacks and the importance of guarding against data breaches. This short course will explain why cyber attacks and data breaches happen and provide practical advice on how to set up effective defences. CPD & IIRSM – Duration 25 mins* – €35.00
Course | Module Number | Module Name | Pass % Required |
---|---|---|---|
Cyber Security | 1 | Cyber Security – An Overview | 70 |
Cyber Security | 2 | Combating Cyber Attacks | 70 |
Employees, managers and directors should all have a good understanding of the threat posed by cyber-attacks and the importance of guarding against data breaches.
This short course will explain why cyber attacks and data breaches happen and provide practical advice on how to set up effective defences.
First, the course will identify potential ‘cyber threat actors’ who initiate cybercrime, along with looking at the main motivations behind cyber-attacks on individuals and organisations.
On a more practical level, you’ll learn how to recognise and deal effectively with phishing attempts. The course will highlight the importance of keeping passwords secure and cover security for devices, such as smartphones, laptops, tablets or desktop computers.
You’ll learn how to report a suspected cyber attack, and what to do if you genuinely make a mistake. Finally, we’ll underline the importance of cooperation and show how working closely together helps overcome a wide range of cybersecurity issues.
Training staff in cyber security is vital to protect your business from these ever present online threats.
CPD approval means that this course can be used by those that need to prove they are continually developing themselves.
Online training is flexible, efficient and cost effective meaning the candidate can progress through the modules at their own pace and in their own time, so they can fit the training in around their work and personal life.
The course is aimed at employees at all levels of an organisation as it provides an overview of some of the most common cyber security threats encountered in business.