‹
›
dev
Global Hub for Vocational Education Training!
ViVET for Business
Teaching at ViVET
Languages
Log In
Register
Peoples College
ViVET for Business
Teaching at ViVET
Languages
Log In
Register
Videos
Courses
Training
Topics
Your search is running...
course
Home
Workspace
course
Course: Cybersecurity Concepts
< Back to training structure
Course infos
Course: Cybersecurity Concepts
❤
★
Login and Start
Short description
This course is the 1st one of "cybersecurity basics" training. It highlights the assets of citizens and SME that are harder to identify: their information and personal data.
It also explains the most common threats to those important assets.
Finally it describes some Methodologies and tools to protect them.
It will take about 13h to follow this course, and there are expected about 12h of additional practice to review the concepts explained in the videos.
Structure
About the course
Step 1.1: Distinguish between data and information (15min)
Step 1.2: Understand the terms cybercrime and hacking (10min)
Step 1.3: Threats recognition (60min)
Step 1.4: Threats in extraordinary circumstances (30min)
Step 1.5: Cloud environment and cybercrime (30min)
Step 1.6: SME: Common Threads (67min)
Knowledge Check
Evaluation of course quality
Step 2.1: Information Security basics (20min)
Step 2.1.1: SME: Information Security main factors (5min)
Step 2.1.2 SME: How to identify important information (5min)
Step 2.2: Protecting personal information (30min)
Step 2.2.1: SME - GDPR - Introduction and basics (15min)
Step 2.2.2: SME - Information cycle (5min)
Step 2.3: Protecting workplace information (30min)
Step 2.4: Identify, retention and control principles (70min)
Step 2.5: GDPR - Privacy, retention and control principles (40min)
Step 2.6: Policies and Procedures for ICT (30min)
Step 2.7 SME: Security Policies Template (50min)
Knowledge Check
Step 3.1: Social engineering basics (1h30min)
Step 3.1.1: SME - How can social Engineering affect SME ? (75min)
Step 3.1.2: SME - Most famous SE attacks (15min)
Step 3.2: Social engineering methods (20min)
Step 3.2.1: SME - How should SME react? (5min)
Step 3.3: Identity theft definition and implications (25min)
Step 3.4: Identity theft methods (20min)
Knowledge Check
Step 4.1: Unauthorized access prevention (45min)
Step 4.1.1: SME - Physical and IT Security Convergence (40min)
Step 4.2: One-time password definition and use (20min)
Step 4.3: Purpose of a network account (20min)
Step 4.4: Network account access and protocols (20min)
Step 4.5: Common biometric security techniques (90min)
Step 4.6: Good password policies (15min)
Step: 4.7: Functions and limitations of password manager software (40min)
Knowledge Check
About the author
Pablo López-Aguilar
About the institute
APWG.EU - Barcelona, Spain
Login and Start
For the full functionality of this site it is necessary to enable JavaScript. Here are the instructions on how to enable JavaScript in your web browser.