Certificate In Digital Security Awareness Training Online Course

the Fundamental course on the cyber security awareness


NOW ONLY

US$99

Save US$500 (83%)
OFF RRP US$599
Get Info Pack

Learn the Fundamental course on the cyber security awareness

The Digital Security Awareness Training for Business and Home Users is a fundamental course on the cyber security awareness that is required to protect the personal data from being exposed to hackers in this age of excessive digitization. The course is designed to give all home users and business professionals the knowledge and tools to protect themselves and their sensitive information from security attacks. It covers many simple ways to prevent security breaches and protect valuable data.

This course is a very useful course for those individuals who are involved more-and-more in the technology-driven internet-of-things applications and devices. The one aspect that needs to be taken care of while using the digital applications and gadgets is the data security. The course addresses this aspect to cover all the necessary details that enable the business professionals and individuals to protect their sensitive information from unauthorized access and hacking.

Course Fast Facts:

  1. Learn the fundamentals of Digital Security Awareness Training
  2. Comprehensive 12 module Accredited Certificate In Digital Security Awareness Training Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Digital Security Awareness Training experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Course Introduction

  • Course Introduction 
  • Instructor Introduction 

Module 00 - Course Overview

  • Course Overview 
  • What is Security Awareness? 
  • Security Domains
  • What is Security?
  • Are You at Risk? 
  • So What About You? 
  • What are the Goals of this Course? 
  • What Will We Cover? 
  • Surprise! 
  • Is it Too Late? 
  • Module Review 

Module 01 - Types of Security Threats

  • Types of Security Threats 
  • Your Computer 
  • Your Internet 
  • Yourself 
  • Your Words 
  • Your E-mail 
  • Your Home 
  • Your Files 
  • Module Review 

Module 02 - Social Engineering

  • Social Engineering 
  • What is Social Engineering? 
  • Social Engineering Defense 
  • Manipulation 
  • Why Does it Work? 
  • Fooling People 
  • What Else Can Be Done? 
  • Personal Precautions 
  • Module Review 

Module 03 - Identity Theft

  • Identity Theft 
  • What is Identity Theft? Part1 
  • What is Identity Theft? Part2 
  • How Does it Happen? Part1 
  • How Does it Happen? Part2 
  • How to Defend Yourself Part1 
  • How to Defend Yourself Part2
  • How to Defend Yourself Part3 
  • What Criminals Do with Your Information Part1 
  • What Criminals Do with Your Information Part2 
  • What Criminals Do with Your Information Part3 
  • What Criminals Do with Your Information Part4 
  • How Can You Tell if You’re a Victim? 
  • Actions to Take if You are a Victim 
  • Contact Information Part1 
  • Contact Information Part2 
  • Module Review 

Module 04 - Data Classification

  • Data Classification 
  • Policies for Data Sharing 
  • Least Privilege 
  • How to Classify Part1 
  • How to Classify Part2 
  • How to Classify Part3 
  • How to Classify Part4 
  • How to Classify Part5 
  • How to Classify Part6
  • How to Classify Part7 
  • Types of Classifications
  • Jurisdictional Issues 
  • Your Involvement 
  • What Could Happen? 
  • What Type of Policies? 
  • How to Destroy Data Part1 
  • How to Destroy Data Part2 
  • Module Review 

Module 05 - Protecting Your Digital Information

  • Protecting Your Digital Information 
  • Why Do a Backup?
  • Types of Backups 
  • What to Backup Part1 
  • What to Backup Part2 
  • What to Backup Part3 
  • Where to Store Backups Part1 
  • Where to Store Backups Part2 
  • How to Perform Backups 
  • Demo - Backups 
  • Backup Utilities Part1 
  • Backup Utilities Part2
  • Backup Management Practices 
  • Passwords
  • Demo - Password Management 
  • Password Management Part1 
  • Password Management Part2 
  • Password Management Part3 
  • Password Management Part4 
  • AAA 
  • Module Review 

Module 06 - Malware

  • Malware
  • Basic Definitions 
  • What to Look For 
  • How You Can Get Infected Part1 
  • How You Can Get Infected Part2 
  • Software Detection 
  • Hardware Detection 
  • Cloud Detection
  • Know the Extensions 
  • Demo - Knowing Your Extensions 
  • Your Defenses
  • Module Review

Module 07 - Security from End -to -End

  • Security from End -to -End 
  • Physical Security Part1 
  •  Physical Security Part1 
  • Home/Workstation Security Part1
  • Home/Workstation Security Part2 
  • Encryption 
  • Demo - EFS 
  • Hand Held Electronics 
  • Workstation Software 
  • Updating the OS and Software 
  • Secure E -mail Use Part1
  • Secure E -mail Use Part2 
  • E -mail Encryption Part1 
  • E -mail Encryption Part2 
  • E -mail Hazards 
  • How to Stop SPAM 
  • E-mail Attachments 
  • Other E -mail Warnings 
  • What if You Get Malware from E -mail? 
  • How to Avoid SPAM
  • Secure Web Browsing Part1 
  • Secure Web Browsing Part2 
  • Secure Web Browsing Part3 
  • Secure Web Browsing Part4 
  • Demo - Secure Web Browsing 
  • Secure Instant Messaging / Social Sites 
  • Module Review 

Module 08 - Piracy

  • Piracy 
  • What is Intellectual Property
  • Copyrights 
  • Software Piracy Part1 
  • Software Piracy Part2
  • Types of Piracy Part1 
  • Types of Piracy Part2 
  • Risks Part1 
  • Risks Part2 
  • Module Review 

Module 09 - Security Policies

  • Security Policies 
  • Security Policies Part2 
  • Security Policies Part3 
  • Why are Policies Important Part1 
  • Why are Policies Important Part2 
  • Defining an Incident 
  • Response Teams Part1 
  • Response Teams Part2 
  • Response Checklist Part1 
  • Response Checklist Part2 
  • Module Review 

Module 10 - Moving Forward

  • Moving Forward 
  • Education and Awareness Part1 
  • Education and Awareness Part2
  • Individuals 
  • Organizations 
  • Know the Principles of Security Domains 
  • Module Review 
  • Course Closure

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

About this Course

Learn the Fundamental course on the cyber security awareness

The Digital Security Awareness Training for Business and Home Users is a fundamental course on the cyber security awareness that is required to protect the personal data from being exposed to hackers in this age of excessive digitization. The course is designed to give all home users and business professionals the knowledge and tools to protect themselves and their sensitive information from security attacks. It covers many simple ways to prevent security breaches and protect valuable data.

This course is a very useful course for those individuals who are involved more-and-more in the technology-driven internet-of-things applications and devices. The one aspect that needs to be taken care of while using the digital applications and gadgets is the data security. The course addresses this aspect to cover all the necessary details that enable the business professionals and individuals to protect their sensitive information from unauthorized access and hacking.

Course Fast Facts:

  1. Learn the fundamentals of Digital Security Awareness Training
  2. Comprehensive 12 module Accredited Certificate In Digital Security Awareness Training Online Course
  3. Study along with simple instructions & demonstrations
  4. Written and developed by leading Digital Security Awareness Training experts
  5. Receive one-on-one online help & support
  6. Unlimited, lifetime access to online course
  7. Certificate of completion
  8. Study at your own pace with no rigid class timetables, 24/7 from any computer or smart device

Course Delivery

Courses are accessed online  by any device including PC, tablet or Smart Phone. Upon purchase an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. 

Recognition & Accreditation

All students who complete this course, receive a certificate of completion and will be issued a certificate via email.

Course Introduction

  • Course Introduction 
  • Instructor Introduction 

Module 00 - Course Overview

  • Course Overview 
  • What is Security Awareness? 
  • Security Domains
  • What is Security?
  • Are You at Risk? 
  • So What About You? 
  • What are the Goals of this Course? 
  • What Will We Cover? 
  • Surprise! 
  • Is it Too Late? 
  • Module Review 

Module 01 - Types of Security Threats

  • Types of Security Threats 
  • Your Computer 
  • Your Internet 
  • Yourself 
  • Your Words 
  • Your E-mail 
  • Your Home 
  • Your Files 
  • Module Review 

Module 02 - Social Engineering

  • Social Engineering 
  • What is Social Engineering? 
  • Social Engineering Defense 
  • Manipulation 
  • Why Does it Work? 
  • Fooling People 
  • What Else Can Be Done? 
  • Personal Precautions 
  • Module Review 

Module 03 - Identity Theft

  • Identity Theft 
  • What is Identity Theft? Part1 
  • What is Identity Theft? Part2 
  • How Does it Happen? Part1 
  • How Does it Happen? Part2 
  • How to Defend Yourself Part1 
  • How to Defend Yourself Part2
  • How to Defend Yourself Part3 
  • What Criminals Do with Your Information Part1 
  • What Criminals Do with Your Information Part2 
  • What Criminals Do with Your Information Part3 
  • What Criminals Do with Your Information Part4 
  • How Can You Tell if You’re a Victim? 
  • Actions to Take if You are a Victim 
  • Contact Information Part1 
  • Contact Information Part2 
  • Module Review 

Module 04 - Data Classification

  • Data Classification 
  • Policies for Data Sharing 
  • Least Privilege 
  • How to Classify Part1 
  • How to Classify Part2 
  • How to Classify Part3 
  • How to Classify Part4 
  • How to Classify Part5 
  • How to Classify Part6
  • How to Classify Part7 
  • Types of Classifications
  • Jurisdictional Issues 
  • Your Involvement 
  • What Could Happen? 
  • What Type of Policies? 
  • How to Destroy Data Part1 
  • How to Destroy Data Part2 
  • Module Review 

Module 05 - Protecting Your Digital Information

  • Protecting Your Digital Information 
  • Why Do a Backup?
  • Types of Backups 
  • What to Backup Part1 
  • What to Backup Part2 
  • What to Backup Part3 
  • Where to Store Backups Part1 
  • Where to Store Backups Part2 
  • How to Perform Backups 
  • Demo - Backups 
  • Backup Utilities Part1 
  • Backup Utilities Part2
  • Backup Management Practices 
  • Passwords
  • Demo - Password Management 
  • Password Management Part1 
  • Password Management Part2 
  • Password Management Part3 
  • Password Management Part4 
  • AAA 
  • Module Review 

Module 06 - Malware

  • Malware
  • Basic Definitions 
  • What to Look For 
  • How You Can Get Infected Part1 
  • How You Can Get Infected Part2 
  • Software Detection 
  • Hardware Detection 
  • Cloud Detection
  • Know the Extensions 
  • Demo - Knowing Your Extensions 
  • Your Defenses
  • Module Review

Module 07 - Security from End -to -End

  • Security from End -to -End 
  • Physical Security Part1 
  •  Physical Security Part1 
  • Home/Workstation Security Part1
  • Home/Workstation Security Part2 
  • Encryption 
  • Demo - EFS 
  • Hand Held Electronics 
  • Workstation Software 
  • Updating the OS and Software 
  • Secure E -mail Use Part1
  • Secure E -mail Use Part2 
  • E -mail Encryption Part1 
  • E -mail Encryption Part2 
  • E -mail Hazards 
  • How to Stop SPAM 
  • E-mail Attachments 
  • Other E -mail Warnings 
  • What if You Get Malware from E -mail? 
  • How to Avoid SPAM
  • Secure Web Browsing Part1 
  • Secure Web Browsing Part2 
  • Secure Web Browsing Part3 
  • Secure Web Browsing Part4 
  • Demo - Secure Web Browsing 
  • Secure Instant Messaging / Social Sites 
  • Module Review 

Module 08 - Piracy

  • Piracy 
  • What is Intellectual Property
  • Copyrights 
  • Software Piracy Part1 
  • Software Piracy Part2
  • Types of Piracy Part1 
  • Types of Piracy Part2 
  • Risks Part1 
  • Risks Part2 
  • Module Review 

Module 09 - Security Policies

  • Security Policies 
  • Security Policies Part2 
  • Security Policies Part3 
  • Why are Policies Important Part1 
  • Why are Policies Important Part2 
  • Defining an Incident 
  • Response Teams Part1 
  • Response Teams Part2 
  • Response Checklist Part1 
  • Response Checklist Part2 
  • Module Review 

Module 10 - Moving Forward

  • Moving Forward 
  • Education and Awareness Part1 
  • Education and Awareness Part2
  • Individuals 
  • Organizations 
  • Know the Principles of Security Domains 
  • Module Review 
  • Course Closure

Entry requirements

Students must have basic literacy and numeracy skills.

Minimum education

Open entry. Previous schooling and academic achievements are not required for entry into this course.

Computer requirements

Students will need access to a computer and the internet. 

Minimum specifications for the computer are:

Windows:

  • Microsoft Windows XP, or later
  • Modern and up to date Browser (Internet Explorer 8 or later, Firefox, Chrome, Safari)

MAC/iOS

  • OSX/iOS 6 or later
  • Modern and up to date Browser (Firefox, Chrome, Safari)

All systems

  • Internet bandwidth of 1Mb or faster
  • Flash player or a browser with HTML5 video capabilities(Currently Internet Explorer 9, Firefox, Chrome, Safari)

Students will also need access the following applications:

Adobe Acrobat Reader

We provide a 7 Day Money Back Refund on all Courses

Now Only US$99 Save US$500 (83%)
OFF RRP US$599
Delivery Method Online
Get Info Pack

Special Offer

 

Receive The Personal Success Training Program FREE, When You Purchase This Course - Limited Time Remaining!  (Value $600)

 

The Personal Success Training Program Helps You Stay Focused To Achieve Your Goals!
Benefits:
  • How to layout a Success Plan.
  • Get where you want to be in life.
  • How to unclutter your mind to succeed.
  • Achieve your dreams using your imagination.
  • How to have faith in yourself.
Features:
  • 12 month online access,  24/7 anywhere.
  • Complement your individual course purchase.
  • Internationally recognized by the IAOTS.
  • Thousands of positive reviews.
  • Limited Time Offer - Ends Soon.
 

Share this course

Course Summary

Course ID No.: 009SRDSAT
Delivery Mode: Online
Course Access: Unlimited lifetime
Tutor Support: Yes
Time required: Study at your own pace
Course Duration: Hours
Assessments: Yes
Qualification: Certificate of Completion

Popular Courses and Bundles