One of Singapore’s FIRST fully online cyber awareness training courses!
Educate yourself or your employee to strengthen your overall cyber defenses!
Equip yourself with essential cyber security knowledge and gain awareness of cyber threats and internet risk prevention. Know what to do, how to respond, how to prevent, and how to spot cyber threats when you see one!
Features
- Interactive content and modules
- Accessible on mobile, tablet, and PCs
- Knowledge assessments
- Unlimited access to content anytime, anywhere!
Course Modules
EXECUTIVE
- Introduction to Cyber Risk
- Information Security
- Managing Risk
- Cyber Risk Management Framework
- Cyber Incident Case Studies
- Vendor Risk Management
- Cyber Insurance
- Leading a Security Awareness Culture
CYBER SAFETY AT HOME
- The Home Threat
- Securing Your Home
- Cloud Storage
SOCIAL MEDIA SAFETY
- The Risky Business of Social Networking
- Social Media Safe Practices
INFORMATION SECURITY
- Personal Information Protection
- Corporate Information Protection
BUSINESS EMAIL COMPROMISE
- Spotting BEC Attacks
- Best Practices to Follow
CYBER SAFE TRAVEL
- Travel Security
- Public Wireless Networks
- Cyber Savvy Travel
- Cloud Storage
MOBILE DEVICES SECURITY
- Importance of Mobile Device Security
- Malware on Mobile Devices
- Protect Your Devices
- Protecting a Misplaced Device
PHISHING
- How to identify phishing emails
- Dangerous links & attachments
- Handling malicious emails
GDPR/ HIPAA/ POPI Act
SAFE WEB BROWSING
- Safe Web Browsing
- Understanding URLs
- Malicious Links
- Web Page Security
- Practice Safe Browsing
CYBER THREATS
- Types of Cyber Threats
- Why you are a target
- What is targeted
- Most Common Data Breaches
PASSWORDS
- Password Attacks
- Creating Strong Passwords
- Creating Strong PINs
- Keeping Passwords Safe
- Password Managers
- Multi-Factor Authentication
INSIDER THREAT
- Malicious Insider Threat
- Unintentional Insider Threat
SOCIAL ENGINEERING
- What is Social Engineering
- The Mind Games of Social Engineering
- Types of Social Engineering Scams
- Avoiding Social Engineering Attacks
MALWARE
- Types of Malware
- Ransomware
- Mitigating Malware
PHYSICAL SECURITY
- Why Physical Security is Important
- Types of Physical Security Attacks
- Clean Desk
- Physical Security Best Practices
INCIDENT RESPONSE
- Recognising Malware Infection
- Malware Attack: Immediate Actions to Take (Work & Personal Devices)
- Online Account Breach: Immediate actions to take
- Identity Theft: Immediate actions to take
What Others Are Saying…
“I found the course very useful because I am somebody who is not very good at IT and don’t know much about computers. ”
– Karen, Finance
“An interactive and fun approach to educate employees on cyber security. This course is easy to understand and helpful for my employees.”
– Kevin, Director
“Initially, I thought it would be teaching me what I already knew. But I did gain more useful knowledge and tips after this training.”
– Valerie, Manager