Information Security and Cyber Risk Awareness
This is a tailored course designed to equip your team with essential knowledge to safeguard sensitive business data and foster a security-conscious organizational culture.
About this course
This course empowers organizations to strengthen their frontline defense against cyber threats through extensive training in information security and cyber risk awareness. The participants will gain the knowledge needed to identify potential threats, protect sensitive data, and respond adeptly to security incidents.
Section 1: Cyber Threat Landscape for Software Professionals
In this course section, we prioritize a hands-on approach by examining real-life cyber security incidents, moving beyond theoretical concepts. This equips participants to apply this practical knowledge directly in their everyday work, enabling them to proactively develop strategies to avoid similar incidents. Furthermore, the course delves into incidents that have affected different stakeholders, improving the workforce’s grasp of information security risks.
Section 2: Elements of Information Security for Software Professionals
This section explores the foundational aspects of information security, highlighting the importance of managing information effectively.
Section 3: Common Cyberattacks and Prevention
This section delves into the most prevalent forms of cyber threats and offers optimal strategies for its mitigation.
Phishing and Its Variations
Section 4: Practicing Information Security at Work
This section lists nine practical challenges inspired by real life scenarios and equips professionals with effective strategies for their everyday tasks.
Secure Access to Facilities
Safe Remote Working
Securing Access Credentials
Safe Internet Browsing
Safe usage of email and collaboration platforms
Safe Social Media Usage
Safe Usage of AI Applications
Safe Usage of Information Storage and Transfer
Section 5: Reporting Security Incidents
This section consists of examples of security incidents and steps on how to report them.
Overview of Information Security Incidents
Examples of Information Security Incidents
Reporting Security Incidents
Section 6: Summary and Assessment
In this section, we provide a summary of the key takeaways from the course. Additionally, we offer an end-of-course assessment to evaluate participants’ comprehension and knowledge retention.
Customize this Course
Discover the wide range of customization options available for this course, allowing you to tailor the training to your specific needs and preferences.Book a Demo
Feature your logo
Add information classification
Add incident reporting information
Translate the course (optional)
You may also like
Enhance data scientists’ cybersecurity awareness for safeguarding sensitive information
Encourage employee awareness to secure data in adherence to Information Security standards and the Philippines Data Privacy Act.
Boost employee cybersecurity skills through gamified risk simulations.