End-User Cybersecurity training for Banking, Financial Services & Insurance (BFSI) Industry

View Free Demo

Description

Without an iota of doubt, the BFSI industry is the primary target for Cyber Criminals. A vulnerable employee, with weak Cybersecurity knowledge and poor Cybersecurity behaviour, accentuates the problem.

One of the vital solutions to alleviate this critical problem is high-quality training that goes beyond awareness. Hence, the training course focuses on developing positive and responsible Cybersecurity behaviour. These behaviours are inculcated through in-depth, experiential training using 3D risk simulations.

Course Overview

This Cybersecurity e-Learning course begins by covering the recent Cybercrimes targeting banks and financial institutions.

Following this, the course proceeds to re-create real-life information security scenarios related to BFSI environments to enable the learner to understand and solve information security risks in realistic scenarios. Further, the course covers essential Information Security practices both inside and outside the workplace.

The e-Learning course ends with a mandatory 10 question assessment that the learner must score a minimum of 80% to pass. Learners who fail will be guided to retake the assessment.

What will you learn?

Threat Landscape and Introduction to Information Security

The current state of Cyber Security

A few recent cyber attacks

  • Dark Tequila
  • T-Mobile
  • Air Canada
  • Uber Hack
    Cyber attacks against high-value organisations
  • Russia Bank
  • Taiwanese Bank

The value of our Information

Why should the information be protected?

What is Information Security?

  • The CIA triad (Confidentiality, Integrity, Availability)

Data Handling

  • Labelling
  • Accessing
  • Storing
  • Transferring
  • Disposing

Practising Information Security

Workspace Security

  • 3D interactive simulation
  • Clear desk and clear screen practises

Password Security

  • 3D interactive simulation
  • Examples of weak passwords
  • Password Security guidelines

Internet Security

  • 3D interactive simulation
  • Internet Security guidelines

Email Security

  • 3D interactive simulation
  • Email Security guidelines
  • Various email attacks (Phishing, ransomware, Spam, Spoofing)
  • Examples of Email Frauds (Internet banking fraud, Online shopping scams, Tax return fraud)

Physical Security

  • 3D interactive simulation
  • Physical Security guidelines

Social Engineering

  • Various Social Engineering Tactics (Phishing, Spear Phishing, SMiShing, Vishing, Baiting)
  • Social engineering guidelines

Mobile Device Security

  • 3D interactive simulation
  • Mobile Device Risks (Falling for scams, Wireless networks, Installing untrustworthy applications, Loss of device and data theft)
  • Mobile Device Security guidelines

Reporting Security Incidents

What is an Information Security Incident?

Examples of Information Security incident

Reporting Information Security Incidents

Summary and assessment

  • Summary
  • Cybersecurity assessment

We’re delighted to provide course customisation and Language translations. Please feel free to contact the sales team for your requirement.

View all Courses

Specifications

Learning time

15-25 minutes

Language

English*

Target audience

End User

Web format

HTML5

Device compatibility

Mobile and PC

Package format

SCORM 1.2

Narration

Human voice**

Assessment

Mandatory, 80% to pass***

*Other language translations are available on request

**Added on client request

***Assessment scores are reported by the course to the Learning Management System. Reports are generated by the Learning Management System.

View all Courses

All courses include

SCORM/ AICC or Tin Can

e-Learning courses are SCORM 1.2 compliant by default. SCORM 2004, AICC and TinCan formats are available on request.

Assessments & feedback

All e-Learning content is integrated with assessments on PASS/FAIL thresholds.

High quality human voice narration

High quality voice narration in UK English is integrated with all courses.

Learning by doing

3D enabled, interactive, engaging e-Learning courses focusing on “learning and doing“.

Language translation

The content you wish to purchase can be translated into the language of your choice upon request.

Essential customisation

Add Company logo & Information Security department contact details in the content you purchase.