0
Content Provider

TOP ACADEMY SDN. BHD.

Trainer Name

Top Glove Corporation

Skill Area

Digital Technologies and Digital Transformation

Reviews

0 (0 Rating)

Course Requirements

There are no prerequisites to take this course.

Course Description

This series of E Learning focuses on cybersecurity in a workplace, threats of cybersecurity and what are the ways to avoid potential risk of cybersecurity breach if it happens.

Course Outcomes

Learners will be aware of potential cybersecurity threats not just in their workplace but also in other place they go in their daily life.

Course Curriculum

1 Remote Working
Preview 20 Min

A remote work environment can raise the risk of a data breach or other cyber attack for several reasons, according to multiple security experts. Remote work, particularly remote work at scale, significantly increases the potential attack surface that must be protected.


1 Social Engineering Attack
Preview 20 Min

No matter how strong your password or security setup is, hackers and scammers know there’s one vulnerability they can always exploit: You. Social engineering attacks use the “human loophole” to get around cybersecurity roadblocks. Instead of hacking your accounts to steal your identity, they hack you by using phishing attacks, imposter frauds, and other scams.


1 AI Powered Cybersecurity
Preview 20 Min

Artificial Intelligence (AI) is finding its way into cybersecurity as its use grows more widespread. Automated detection and response to attacks, network efficiency, and vulnerability detection are ways AI may be utilized to improve cybersecurity. The impact of AI on cybersecurity and how it may help your business stay secure online will be discussed in this module.


1 Supply Chain Attack
Preview 10 Min

A supply chain attack is a highly effective way of breaching security by injecting malicious libraries or components into a product without the developer, manufacturer or end-client realizing it. It’s an effective way to steal sensitive data, gain access to highly sensitive environments, or gain remote control over specific systems.


1 Deceptive Phishing
Preview 15 Min

Although many tech-savvy people think they can spot a malicious email, phishing attacks are becoming more sophisticated every day. According to Verizon nearly one-third of all data breaches involved some type of phishing attack. Deceptive phishing, or email phishing, is the most common type of phishing attack and has been used for decades. A fraudulent, well-crafted and manipulative message is sent to impersonate legitimate organizations.


1 Pirated Software
Preview 15 Min

Everyone has tipped their toes into the pirated software world at least once in their life. The idea of getting free software appeals to a wide range of consumers who are usually uneducated about the dangers associated with them. As the cost of software rises, many consumers opt to install bootleg or pirated versions. We'll explain the risks you can face if you use illegal copies.


1 Identity Theft
Preview 15 Min

There's no way to inoculate yourself against identity theft completely. But if you're diligent in learning how your information can be at risk and what fraudsters can do with it, you'll be better equipped to protect your data and act quickly if someone does manage to steal it. Identity theft is a broad term that applies anytime someone steals your personal information, such as your Social Security number, and uses it to create a new account, make a purchase or commit other fraud.


1 Security Risk of Public WiFi
Preview 15 Min

Today public Wi-Fi is almost everywhere in common places such as coffee shops, libraries, airports, hotels and even random retail outlets. While convenient to use, there are hidden security risks and dangers you should know about where it provide an easy way for identity thieves and cybercriminals to monitor what you’re doing online and to steal your passwords, your personal information , or both.


1 What are Internet Scams?
Preview 15 Min

Internet scams are constantly evolving. The FBI documented a record of more than $10.2 billion in losses due to internet crimes in 2022. Right now, con artists around the world are likely targeting a computer or mobile device near you. Here's a look at the most common internet scams and what you can do to safeguard your personal information and wallet.


1 Mobile Security
Preview 15 Min

Viruses, spyware, and other malware can affect more than just desktop computers and laptops. Mobile devices are vulnerable as well. As the threat landscape continues to evolve, it’s important that we not only understand these risks—but how we can protect ourselves against them.


1 Spear Phishing
Preview 15 Min

Phishing attacks are a persistent threat in a highly digital world, one that is an ongoing concern for both individuals and organizations. Spear phishing attacks are a subset of these types of cybercrimes that are of particular concern. But what exactly is spear phishing and is it possible to prevent these attacks?


1 Shoulder Surfing
Preview 15 Min

The next time you’re in a public place and glued to your smartphone or tablet — whether it’s at the gym, a coffee house, the airport, or just a park bench— know that someone might be peering over your shoulder to see what you’re doing. The snooper could just be curious, or they could be trying to capture your login information so they can use it to access your accounts impersonating you later on.


Trainer

Trainer Name

Top Glove Corporation

0 Rating
0 Reviews

Learner Feedback

Cybersecurity Awareness E Learning Series

0

Course Rating
0.00%
0.00%
0.00%
0.00%
0.00%

No Review found

Log In or Sign Up as learner to post a review

Shopping Cart

Loading...