Cyber Security

Course Titles and Descriptions

Anatomy of a URL: How to Identify Web Links

The Uniform Resource Locator (URL) simplifies how we navigate the ever-expanding Internet, but most users don’t realize how links work or the complex work that URLs handle, and cyber criminals use that lack of knowledge to their advantage. This module is an introductory overview of cyber security measures related to safe Web browsing for new employees during onboarding or as a refresher course for those without a cyber security background. You will learn how to recognize the different components of a URL and how to tell if a URL has been shortened. You will also learn how to determine whether a link is safe or malicious.

Creating and Using Passwords

Many organizations require passwords to access computers at work, banking and financial information, even cell phones. Yet, research shows that too many people use weak, unsecure passwords to protect personal or work data. This module is an introductory overview of how to create and manage passwords for new employees during onboarding or as a refresher course for those without a cyber security background. You will learn to recognize the importance of creating and using passwords and common password best practices.

E-mail Security: Recognizing a Cyber Attack

E-mail is all but required for normal business operations, and it’s easy for cyber criminals to use as a vector of attack. But what does an e-mail attack look like, and how do you avoid it? This module is an introductory overview of cyber security best practices relating to e-mail security for new employees during onboarding or as a refresher course for those without a cyber security background. You will learn how to recognize an e-mail-based phishing attempt and learn some of the tactics cyber criminals use to get a victim’s personal information. It then presents some e-mail best practices.

Mobile Device Best Practices

Mobile devices have had a large impact on how people do business, and more employees now expect to incorporate mobility into their work lives. However, the convenience and speed of mobility come with the increased risk of data theft or loss. This module is intended as an introductory overview of cyber security best practices for mobile device use for new employees during onboarding or as a refresher course for those without a cyber security background. You will learn about the practice of setting up and using authentication on your mobile devices along with other best practices to protect the data on your mobile device.

Protecting and Securing Your Data

Cyber criminals increasingly take advantage of security gaps in the network hardware used to connect to outside networks, like the Internet. There are ways to protect these networks from cyber threats. This module is an introductory overview of network security basics and using antivirus and malware protection for new employees during onboarding or as a refresher course for those without a cyber security background. You will learn about best practices for changing default administrative accounts on network hardware, securing trusted networks, installing antivirus and malware removal software, and using separate log-ins for different accounts.

Safe Web Browsing: Identifying Malicious Web Pages

Cyber criminals use several tactics to fool a user to believe he or she is on a safe webpage. All it takes is a couple of substituted, flipped, or extra letters. They count on their victims to be careless, in a hurry, or not know what a URL should look like. This module is an introductory overview of cyber security best practices for distinguishing safe vs. malicious webpages for new employees during onboarding or as a refresher course for those without a cyber security background. You will learn how to recognize the indicators of a malicious webpage, and the module highlights some of the methods cyber criminals use to fool users into thinking it is safe to share their data.

Types of Cyber Threats

Viruses, Malware, Distributed Denial of Service (DDoS) attacks: These threats, along with other types of Advanced Persistent Threats (APTs), are increasingly discussed in the news as cyber crimes, which have increased in frequency. These threats evolve almost as rapidly as the defenses against them. Cyber criminals entice their victims to click on a link to a website or download a file that has been maliciously altered. This module provides an introductory overview of various cyber threats directed at new employees during onboarding or as a refresher course for those without a cyber security background. By the end of the session, you will learn about several tactics that cyber criminals use to commit their crimes and methods they use to deliver malicious software.

What is Cyber Security

Organizations increasingly rely on connected devices such as computers, network servers, and mobile devices to conduct business, but a majority of workers lack even basic cyber security awareness. This module is an introductory overview of cyber security for new employees during onboarding and a refresher course for those without an information technology (IT) background. By the end of this module, you will have a basic understanding of the history of cyber crime, who is responsible for committing cyber crimes, why cyber crimes are committed, what cyber criminals are after, and likely targets of cyber attack.