Social Engineering & Phishing Part II - Advanced

Course ID: CS00104

Objective

Hackers call data centers and pretend to be customers who have lost their passwords or show up at a site and simply wait for someone to hold a door open for them. Hackers have been known to create phony websites, sweepstakes, or questionnaires that ask users to enter a password. Phishing is a technique used to obtain sensitive information by impersonating oneself as a trustworthy entity in an electronic communication. 

In Part II of Phishing Awareness, you will learn about different types of phishing attacks, techniques in discovering attacks, characteristics of phishing emails, etc. providing employees with very deep knowledge in responding to the growing amount of phishing emails. The course is designed for the organizations that need to comply with the regulatory requirements, support phishing awareness campaigns, and educate employees about the impact of social engineering attacks, especially those having exposure to private data, financial data, highly sensitive, and confidential data. 

In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
Price: $31.98 $74.99
Add to Cart For Corporate
  • Category: Cybersecurity
  • Duration: 60 Mins
  • CPE: 1 HR
  • Course Type: e-Learning

What you will learn:

    • Learn about Ten Different Types of Phishing Attacks
    • Understand the Characteristics of Phishing Emails
    • Understand Common Methods of Phishing Attacks
    • Learn about Escalation and Containment
    • Learn about Eradication and Rebuilding
    • Learn about Recovery and Aftermath

Advanced Persistent Threat or Intrusion

  • Course ID: ADVANCp6H2
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 9 mins
Course Details

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Advanced Persistent Threat
    Phases of an Advanced Persistent Threat
    Reconnaissance and Initial Access
    Expand Access
    Data Capture/Exfiltration or Manipulation
    Track-Covering and Exit
    The suggested e-Learning courses that would reduce the insurance cost

Anti Money Laundering (AML) Awareness

  • Course ID: CO00103
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

  • What it is and how does it work?
  • Why people and organizations launder money?
  • How money laundering works: basic process
  • Legal consequences for money laundering, including state and federal (U.S.) penalties
  • Applicable laws and regulation
  • Insider trading

Architectural Solutions

  • Course ID: ARCHITvD8Q
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 9 mins
Course Details

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    Securing ICS Infrastructure - Defense in Depth
    Next-Gen Tools and Techniques
    Zero Trust

Asset Management

  • Course ID: FCOO102
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 9 mins
Course Details

What you will learn:

  • What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Asset Management?
    Asset Management and Cybersecurity
    Recommendations for Asset Management
    Case Study - Application/Program Vulnerabilities 

Backup and Recovery

  • Course ID: FCOO104
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 9 mins
Course Details

What you will learn:

  • What you will learn:
    The training promotes the objective of informed management for better decision-making. Traning provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is a disaster?
    What is Disaster Recovery?
    Backup and Recovery
    Protecting Backup Data

Breach Management

  • Course ID: FCOO105
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 9 mins
Course Details

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is the importance of a breach notification?
    What is a data breach?
    In what circumstances would notification of a data breach be required and to whom?
    Suggested e-Learning courses to enhance the knowledge
    (Note - The suggested e-Learning program is a two-part series.)

Breach Notification Part I - Awareness

  • Course ID: CS00301
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

  • What is the importance of a breach notification?
  • What is a data breach?
  • In what circumstances would notification of a data breach be required and to whom?
  • When and how should notification of a data breach be provided?
  • Framework for Effective Data Breach Notification Legislation
  • Timing of Notification to Affected Individuals
  • Post Data Breach Immediate Action Items
  • Breach Notification to Authorities

Breach Notification Part II - Advanced

  • Course ID: CS00302
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

  • Breach Management
  • Effective Breach Response
  • Data Breach Checklist
  • Breach Notification Notice Content
  • Notification Timelines
  • Lifecycle of a Data Breach
  • Public Relations Strategy

Bring Your Own Device

  • Course ID: FCOO106
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 9 mins
Course Details

What you will learn:

  1. What you will learn:
    The training promotes the objective of informed management for better decision-making. Training provides management and employees with a basic understanding of underlying concepts and recommendations for managing challenges.  Each section informed you about additional training requirements and recommended courses. In the next 10 minutes, you will learn:

    What is Bring Your Own Device (BYOD)?
    What are the BYOD challenges?
    How can you secure your BYOD environment?
    Examples of BYOD device hack
    Suggested e-Learning courses to enhance the knowledge
    (Note - The suggested e-Learning program is a two-part series.)

Business Continuity & Disaster Recovery (BCP / DR) Part I - Awareness

  • Course ID: DR00101
  • CPE: 1 HR
  • Course Type: e-Learning
  • Duration: 60 mins
Course Details

What you will learn:

  • Disaster
  • Business Continuity and Disaster Recovery
  • Use Cases
  • Risks Covered by DR
  • Driving Factors
  • Challenges in Developing DR Plan
  • Technical Challenges
  • Key Factors in DR Plan
Need us to design a course for you? Contact Now
Copyrights © 2020 All Rights Reserved by SecuRetain.