Learning Platform for Skills and Careers
Videos, Courses, Trainings and Topics

Co-funded by the
Erasmus+ Programme
of the European Union

Your search is running...

This course is the 1st one of "cybersecurity basics" training. It highlights the assets of citizens and SME that are harder to identify: their information and personal data. 
It also explains the most common threats to those important assets.
Finally it describes some Methodologies and tools to protect them.
It will take about 13h to follow this course, and there are expected about 12h of additional practice to review the concepts explained in the videos.

  • Step 1.1: Distinguish between data and information (15min)
    Start
  • Step 1.2: Understand the terms cybercrime and hacking (10min)
    Start
  • Step 1.3: Threats recognition (60min)
    Start
  • Step 1.4: Threats in extraordinary circumstances (30min) 
    Start
  • Step 1.5: Cloud environment and cybercrime  (30min)
    Start
  • Step 1.6: SME: Common Threads (67min)
    Start
  • Step 2.1: Information Security basics (20min)
    Start
  • Step 2.1.1: SME: Information Security main factors  (5min)
    Start
  • Step 2.1.2 SME: How to identify important information (5min)
    Start
  • Step 2.2: Protecting personal information (30min)
    Start
  • Step 2.2.1: SME - GDPR - Introduction and basics (15min)
    Start
  • Step 2.2.2: SME - Information cycle (5min)
    Start
  • Step 2.3: Protecting workplace information (30min)
    Start
  • Step 2.4: Identify, retention and control principles (70min)
    Start
  • Step 2.5: GDPR - Privacy, retention and control principles (40min)
    Start
  • Step 2.6: Policies and Procedures for ICT (30min)
    Start
  • Step 2.7 SME: Security Policies Template (50min)
    Start
  • Step 3.1: Social engineering basics (1h30min)
    Start
  • Step 3.1.1: SME - How can social Engineering affect SME ? (75min)
    Start
  • Step 3.1.2: SME - Most famous SE attacks (15min)
    Start
  • Step 3.2: Social engineering methods (20min)
    Start
  • Step 3.2.1: SME - How should SME react? (5min)
    Start
  • Step 3.3: Identity theft definition and implications (25min)
    Start
  • Step 3.4: Identity theft methods (20min) 
    Start
  • Step 4.1: Unauthorized access prevention (45min)
    Start
  • Step 4.1.1: SME - Physical and IT Security Convergence (40min)
    Start
  • Step 4.2: One-time password definition and use (20min)
    Start
  • Step 4.3: Purpose of a network account (20min)
    Start
  • Step 4.4: Network account access and protocols (20min)
    Start
  • Step 4.5: Common biometric security techniques (90min)
    Start
  • Step 4.6: Good password policies (15min)
    Start
  • Step: 4.7: Functions and limitations of password manager software (40min)
    Start