edts-cyber-1.png

Security Awareness/Privacy Training

Arming your team to defend against threats.

Online Training Available Now!

Toll-Free 

855.411.EDTS (3387)


Augusta, GA

706.722.6604


Greenville, SC

864.250.9112


Columbia, SC

803.250.4656


Asheville, NC

828.318.0916

Security-Icon.png

Course Overview

These highly interactive, scenario-based modules are designed for general staff in roles such as human resources, legal, marketing, financial, sales, operations and customer service. This training is designed to teach employees:

  • The value of different types of information
  • The scope, nature, and origin of the diverse risks to such information
  • The proper behavior to proactively protect this information in their everyday work

Each EDTS Cyber module combines instructions with a suite of complementary communication materials designed to enhance the learning process.

This includes:

icon-1-1.png

Malware
Awareness

  • Understand the goals of malware
  • Identify the many types of malware
  • Recognize how to prevent malware infection, both at work, and at home
icon-2-1.png

Social
Engineering

  • Identify the many forms of social engineering and potential impacts
  • Identify techniques used by social engineers
  • Understand how to establish validity of requests, in order to perform daily business functions in light of the threat of social engineers
icon-3-1.png

Password
Security

  • Recognize the risks surrounding password security
  • Identify safeguards used to protect passwords
  • Summarize techniques used by attackers in obtaining passwords
  • Learn to create and remember strong passwords, eliminating the need to turn to insecure practices
icon-4.png

Physical
Security

  • Learn accepted practices for minimizing breaches
  • Gain ability to identify different types of data that may be exposed via hardware theft
icon-5.png

Mobile Device
Security

  • Learn about the risks of mobile device data leaks or lost devices
  • Investigate the challenges that arise when the line of what is corporate and what is personal is blurred
  • Look at mobile device security from a number of modern platforms
icon-6.png

Email Security
& Phising
Awareness

  • Recognize a malicious email before it can become a threat
  • Understand the various ways in which attackers try to trick and entice users to trigger malicious events through email
  • Learn best practices to properly handle and avoid phishing attacks
  • Recognize the appropriate time to use email to send to specific types of information
icon-7.png

Travel
Security

  • Understand the risks associated with transporting sensitive data and the importance of maintaining personal security while traveling
  • Receive guidance on how to travel safely with sensitive information and when to leave it at home

COURSE DETAILS:

Target Learners

This series of interactive modules is appropriate for all employees who have access to an organization’s computer system and information.

Prerequisites
There are no prerequisites required to take this training course.

 

Length
Each module is roughly 10 - 15 minutes in duration.

Delivery
SCORM 1.2-compliant course can be integrated into a client’s Learning Management System or it can be delivered as an on-demand service through our online education portal.