Description
Without an iota of doubt, the BFSI industry is the primary target for Cyber Criminals. A vulnerable employee, with weak Cybersecurity knowledge and poor Cybersecurity behaviour, accentuates the problem.
One of the vital solutions to alleviate this critical problem is high-quality training that goes beyond awareness. Hence, the training course focuses on developing positive and responsible Cybersecurity behaviour. These behaviours are inculcated through in-depth, experiential training using 3D risk simulations.
Course Overview
This Cybersecurity e-Learning course begins by covering the recent Cybercrimes targeting banks and financial institutions.
Following this, the course proceeds to re-create real-life information security scenarios related to BFSI environments to enable the learner to understand and solve information security risks in realistic scenarios. Further, the course covers essential Information Security practices both inside and outside the workplace.
The e-Learning course ends with a mandatory 10 question assessment that the learner must score a minimum of 80% to pass. Learners who fail will be guided to retake the assessment.
What will you learn?
Threat Landscape and Introduction to Information Security
The current state of Cyber Security and recent cyber-attacks
1. Dark Tequila
2. T-Mobile
3. Air Canada
4. Uber Hack
Cyber-attacks against high-value organisations
1. Russia Bank
2. Taiwanese Bank
The value of our Information
Why should the information be protected?
What is Information Security?
1. What is Information Security?The CIA triad (Confidentiality, Integrity, Availability)
Data Handling
1. Labelling
2. Accessing
3. Storing
4. Transferring
5. Disposing
Practising Information Security
Workspace Security
1. 3D interactive simulation
2. Clear desk and clear screen practises
Password Security
1. 3D interactive simulation
2. Internet Security guidelines
Internet Security
1. 3D interactive simulation
2. Internet Security guidelines
Email Security
1. 3D interactive simulation
2. Email Security guidelines
3. Various email attacks (Phishing, ransomware, Spam, Spoofing)
4. Examples of Email Frauds (Internet banking fraud, Online shopping scams, Tax return fraud)
Physical Security
1. 3D interactive simulation
2. Physical Security guidelines
Social Engineering
1. Various Social Engineering Tactics (Phishing, Spear Phishing, SMiShing, Vishing, Baiting)
2. Social engineering guidelines
Mobile Device Security
1. 3D interactive simulation
2. Mobile Device Risks (Falling for scams, Wireless networks, Installing untrustworthy applications, Loss of device and data theft)
3. Mobile Device Security guidelines
Specifications
Learning time
15-20 minutes
Language
English
Target audience
End-User
Web format
HTML5
Device compatibility
Mobile and PC
Package format
SCORM 1.2
Narration
Human voice**
Assessment
Mandatory, 80% to pass***
Customization
Branding, translation and voice narration on request***