Cybersecurity and Data Protection - E-learning Package
The Mandatory Training Group
Delivery Method: eLearning
Cybersecurity and Data Protection - Online Training Package - CPDUK Accredited.
Welcome to The Mandatory Training Group's online Cybersecurity and Data Protection training package. All our online training courses, programmes and qualifications are accredited by the CPD Certification Service (CPDUK).
This online Cybersecurity and Data Protection training package teaches you how your company may be vulnerable to data thieves and what you can do to protect it. You will also learn about the importance of strong passwords, how to keep data and mobile phones safe, and how to prevent viruses and malware from destroying your company devices, all in this course.
Course Content
This online Cybersecurity and Data Protection training package includes the following module:
The Power of a Strong Password training module
Unit 1: The pitfalls of a weak password
Unit 2: Why you need to protect any data you access
Unit 3: How to set a strong password
The Danger of Viruses & Malware training module
Unit 1: Why people create viruses
Unit 2: Common computer viruses and how they work
Unit 3: What malware is
Keeping your Data Safe training module
Unit 1: Why it’s important to look after data
Unit 2: The consequences of poor data storage
Unit 3: How to keep data safe
Keeping Your Mobile Safe training module
Unit 1: Why keeping your phone safe is so important
Unit 2: The potential consequences of losing your work mobile
Unit 3: Practical methods to minimise the risk of theft, loss, and damage
The Risks of Ransomware training module
Unit 1: What ransomware is
Unit 2: The consequences of not protecting data
Unit 3: How to protect yourself from ransomware attacks
Network Security and Cloud Computing training module
Unit 1: What is the importance of securing your network and cloud services
Unit 2: How to identify the risks of inadequate network and cloud security
Unit 3: How to improve protection and prevent threats
Phishing & Anti-Spam training module
Unit 1: How to recognise a phishing attack, for example, an email or cell phone message
Unit 2: How anti-spam software works to prevent email spamming
Unit 3: How to protect yourself and avoid becoming a victim of phishing
Understanding Social Engineering training module
Unit 1: What are the dangers of social engineering, and how it works
Unit 2: How to recognise the different types of social engineering attacks
Unit 3: How to avoid becoming a victim of social engineering
Internet of Things Attacks training module
Unit 1: How the Internet of Things works
Unit 2: What are the security risks associated with the IoT
Unit 3: How to protect yourself and avoid an IoT attack on your devices
Security & Compliance Audits training module
Unit 1: What are the differences between security and compliance
Unit 2: What is the importance of audits and why these must be carried out
Unit 3: How to prepare for and conduct effective audits
Identity Theft training module
Unit 1: What are the different types of identity theft, and how they occur
Unit 2: What are the effects and what to do if you are a victim
Unit 3: How to prevent and reduce the risk of your identity being stolen
Understanding GDPR training module
Unit 1: How the GDPR applies to you
Unit 2: What the 7 principles of the GDPR are
Unit 3: How to apply the GDPR to spot data breaches
Understanding Data Protection training module
Unit 1: What some of the differences in data protection laws worldwide are
Unit 2: How data can be used
Unit 3: How to apply data protection techniques
Data Breaches training module
Unit 1: How data breaches can be prevented
Unit 2: What the consequences of data breaches are
Unit 3: How to apply solutions to prevent data breaches
PCI DSS (Payment Card Compliance) training module
Unit 1: What the requirements for PCI compliance are
Unit 2: The benefits of PCI compliance and the impacts of noncompliance
Unit 3: How to complete a security audit of your network
Information Security training module
Unit 1: What the 3 pillars of information security are
Unit 2: What the impacts of poor information security are
Unit 3: How to apply information security successfully.
Who is the course for?
This online Cybersecurity and Data Protection training package is suitable for:
Anyone who wants to keep their precious files, emails, accounts and personal information out of the hands of the bad guys
Anyone who would love to gain a practical skill set in mitigating the risk from malware, Trojans, hackers, tracker, cybercriminals and all online threats
Beginners and intermediate Internet users who are interested in security, safety, and privacy
Those who want privacy and anonymity online from hackers, corporations and governments.
Course aims
This Cybersecurity and Data Protection e-learning package aims to:
Assist you realise the nature and extent of data insecurity in the face of malware. used in internet attacks through social engineering Ransomware and phishing.
Realise the importance of strong passwords for network security.
The Power of a Strong Password training module.
Appreciate the need for Security & Compliance Audits training for compliance with GDPR compliance.
Learning objectives
On completion of this Cybersecurity and Data Protection eLearning package, the learner will be able to:
Explain the importance of looking after one’s data
Discuss the consequences of poor data storage
State the potential consequences of losing your mobile work
Explain the importance of securing your network and cloud services
Recognise the dangers of social engineering and how it works
Point out the differences between security and compliance
Discuss the importance of compliance audits and why these must be carried out
Explain how to prevent and reduce the risk of your identity being stolen
Identify the GDPR that applies to you
Identify how to apply data protection techniques
Discuss the consequences of data breaches
Explain the benefits of PCI compliance and the impacts of noncompliance.
Learning outcomes
The learning outcomes of this online Cybersecurity and Data Protection training package are to:
Explain the need to protect any data you create or access
State reasons why people create viruses
Name common computer viruses and how they work
Find out how to protect data from ransomware attacks
Identify the risks of inadequate network and cloud security
Explain how to protect yourself from becoming a victim of phishing
Recognise the different types of social engineering attacks
Know the different types of identity theft and how they occur
Apply solutions to avoid data breaches
Summarise the requirements for PCI compliance
State how to complete a security audit of your network
Explore the 3 pillars of information security.
Cybersecurity and Data Protection - Online Training Package - CPDUK Accredited.