Save hundreds of hours in developing training materials. Download our proven content used by trainers in 164 countries worldwide.
Facilitate perfect workshops everytime with high-quality training material with all the training components you need.
Focus your attention on the training and we'll take care of the materials.
Course description
Cybersecurity 1: Fundamentals for Employees explores the world of cybercrime. This one-day course will ensure that staff gain an appreciation of company-wide measures to protect against cyberattacks and their own role in the success of these defense measures.
Most importantly, it will help staff recognize phishing attacks and understand what steps to take to mitigate the effect when a cyberattack has been successful. It emphasizes the importance of practicing safe social media behavior to prevent cyber criminals from mining sensitive personal and company data.
Each participant leaves with their own personal cybersecurity plan that prepares them to enter the fight against cybercrime.
Course outline
Session One: Course Overview
Course Overview
Learning Objectives
Pre-Assignment
Pre-Course Assessment
Session Two: The State of Cybercrime
History of Cybercrime
Recalling Cybercrimes
Historical Examples of Cybercrime
Cost of Cybercrime
Session Three: Types of Cyberattacks
Types of Attacks
Session Four: Role of Human Error
The Role of Human Error
Opening Email
Session Five: What Can a Company Do?
Company-wide Defenses
Other Company-wide Defenses
Focus on Social Media
Create a Social Media Policy
Session Six: Best Practices for Remote or Travelling Employees
Out of Office Protections
Session Seven: Scenarios
Scenario: Malware
Scenario: Potential Data Breach
Session Eight: Cyberattacks on Individuals
Cyberattacks to Obtain Sensitive Information
Malware (Malicious Software)
Social Media
Social Media Scams
Session Nine: Recognizing Phishing Attacks
The Giveaway Clues to Phishing Attacks
Spot the Clue
Phishing Emails
Session Ten: What Can a Person Do?
Supporting Company Efforts
Social Media
Focus on Spear Phishing
How to Protect the Organization
Social Media Safety
Session Eleven: Creating a Personal Cybersecurity Plan
Cybersecurity Starts with You!
Personal Action Plan
Course Summary
Recommended Reading List
Post-Course Assessment
Pre- and Post-Course Assessment Answer Key
Pre-Course Assessment
Post-Course Assessment
Assignment Answer Key
Session Three: Types of Cyberattacks
Session Four: Role of Human Error
Session Five: What Can a Company Do?
Session Six: Best Practices for Remote or Travelling Employees
Session Seven: Scenarios
Session Eight: Cyberattacks on Individuals
Session Nine: Recognizing Phishing Attacks
Spot the Clue
What you get
Velsoft Instructor Guides are the core of each training course. Our Instructor Guides lay out the training in simple, easy-to-follow instructions. You can also customize the Instructor Guides in order to personalize your training.
Each Instructor Guide - for each course - is paired with a Student Manual that you can present to your participants. This customizable Student Manual gives each participant the student version of the course you will be teaching.
Whether or not you choose to introduce exercises into your training is up to you as the facilitator. In case you want to do this Velsoft offers you an Exercise Workbook (also customizable) that is specific to the course you are offering.
Each Velsoft courseware title comes with a Lab Workbook loaded with activities and exercises to practice and reinforce the learners' understanding of the course objectives. Pre-made Sample Exercise Files are provided for use with the Lab Workbook so that you, as the trainer, do not have to prepare activity working files.
Courseware from Velsoft is designed to give you everything you need for use in the classroom or workshop. This includes the PowerPoint versions of all the courses, prepared for you in advanced.
Quick Reference Guides are a favorite tool for trainers to provide to their learners. Each Quest Reference Guide summarizes the most important elements in each courseware title down to two pages.
Easily make any changes to the material you like. Simply open in MS Word or Google Docs and localize the content to meet your training needs.
Print only what you need, when you need it. Print as many copies at your location as you like - forever. This includes editing and printing.
Train as many people at your location as you like - forever. There is no per-user pricing or limit on the number of people that can be trained.
This course comes with a perpetual license which means once you purchase it you never have to pay anything ever again.
Courseware you can customize.
Available as an eLearning Course
eLearning you can customize.
Courseware you can customize.
By Velsoft
August Only
Courseware you can customize.