Cyber Security Essentials for all Employees eLearning Bundle Course

“People

Course Details:

Length: 39 Courses

Price: $750/person (USD)

Access Length: 6 months

Bulk Pricing: 10+ Contact Us

Course Features:

Instant Access After Purchase

Lecture by Recorded Video

Stop and Start as Needed

Certificate of Completion

Software Lab Included: No

Delivery Method:

 Self-Paced Online

Individuals & Groups
@ Your Location


 

Course Overview

Cyber Security Essentials for all Employees: Comprehensive Training in Phishing, Malware, Password, and Social Engineering Defense

The Cyber Security Essentials for all Employees eLearning Bundle consists of Video Lectures grouped in 7 topics:

  • CYBER SECURITY OVERVIEW
  • STAYING SAFE ONLINE
  • PHISHING
  • PASSWORDS
  • VIRUSES AND MALWARE
  • SPECIAL TOPICS IN CYBER SECURITY
  • SOCIAL ENGINEERING

The Cyber Security Essentials for all Employees master bundle is a comprehensive, seven-section training program designed to transform every employee into a proactive first line of defense against the most critical digital threats. Recognizing that over 90% of security breaches involve human error, this course provides the foundational security awareness and practical skills necessary to protect organizational data and devices in today's highly connected world.

This bundle delivers mastery across the most vital cyber defense domains:
  • Foundational Cyber Security: Establish essential Cyber Security Overview knowledge, learning to characterize the current risk environment, define security threats like malware and viruses, and understand best practices for securing data and mobile devices.
  • Online & Remote Safety: Develop proactive habits for Staying Safe Online, covering network practices, securing company email, and maximizing privacy. Gain expertise in Remote Working Security, addressing the unique risks of working from home and utilizing emerging technology like Generative AI securely.
  • Threat Mitigation Mastery: Become an expert in identifying and mitigating the single largest threat: Phishing. Learn to recognize malicious emails, implement anti-phishing essentials, and know the correct steps to take if compromised.
  • Password & Social Engineering Defense: Transform your approach to Passwords, mastering personal recall systems and techniques to create unhackable credentials. Learn to spot and avoid the psychological manipulation tactics of Social Engineering and cunning scams designed to trick employees into revealing confidential information.

By completing this training, you will significantly reduce your organization's risk exposure, ensuring compliance with Data Privacy Essentials (including GDPR), and empowering every team member to become a resilient, informed digital defender.

Protect your organization from the inside out. Enroll now to master Cyber Security Essentials and become a strong link in the security chain!

Also Included - 4 Courses: An Essential Career Skills Pack with 4 courses in key areas for career management and growth, including Time Management, Digital Skills, Creativity and Soft Skills.

 


Course Notes

Important Lab Environment Information: This is a LECTURE ONLY eLearning course. If you wish to practice with hands-on activities, you will need to have access to the software required for this course.
Bundle Objectives
  • Characterize the current cyber risk environment and identify common digital threats.
  • Implement good security habits to become the organization's effective first line of defense.
  • Define, identify, and securely classify various types of data and mobile devices.
  • Gain a comprehensive understanding of real online threats, including hackers, ransomware, and social media risks.
  • Master anti-phishing essentials and techniques to immediately recognize and mitigate the serious threat of phishing attacks.
  • Apply best practices for creating and managing strong, unhackable passwords using a personal recall system.
  • Understand the various types of malware and viruses, and learn how to prevent their installation.
  • Recognize the common warning signs of a device infection and the correct steps to take if compromised.
  • Identify and avoid the malicious deception tactics used in Social Engineering scams (e.g., pretexting).
  • Implement strategies for Remote Working Security to minimize risks associated with working from home.
  • Follow best practices for using Generative AI Securely to mitigate data exposure risks.
  • Master Data Privacy Essentials, including the definition of private data and awareness of regulations like GDPR.

Target Audience

This course is suitable for:

  • All Employees: Required training for every staff member in an organization, regardless of department or technical role, who handles company data or uses company devices.
  • Remote and Hybrid Workers: Employees who need specific guidance on securing their home networks and personal devices used for work.
  • Contractors and Temporary Staff: External personnel requiring a foundational understanding of corporate security policy and best practices.
  • Human Resources and Compliance Teams: Staff responsible for rolling out and managing mandatory security awareness training programs.

Key Features
  • Audio Narration
  • Video
  • Inline Activities
  • Quizzes
  • Exercises
  • Supplemental Resources
  • Assessment
Languages
  • Audio/Video/Course Text: American English.
  • Subtitles (Closed Caption): N/A.
Course Duration
  • Cyber Security Essentials: 10 hr 22 min
  • Essential Career Skills Pack: 2 hr 23 min

 


eLearning Training Delivery Method

Learn at Your Own Pace

This self-paced online course lets you learn independently at your own pace through Certstaffix Training's easy-to-use platform.

How It Works

  • A Learn at your own pace - Start and stop as it is convenient for you. Pick up where you left off.
  • Lecture utilizing video and recorded screenshots
  • 6-month subscription length
  • Instant Access After Purchase

Have more than 10 students needing this course? Contact Us for bulk pricing.

 


Course Topics

CYBER SECURITY OVERVIEW

Section Duration - 5 Courses, 2 hr 52 min

This essential introductory section establishes the foundational knowledge and security awareness necessary for all employees to protect organizational data and devices in our highly connected world. Learners will characterize the current cyber risk environment, gaining the ability to identify, understand, and prevent common threats, including malware, phishing, and social engineering scams like pretexting. Over 90% of security breaches can be mitigated by simple security awareness, and this course provides the basic, good habits required to become an effective first line of defense.

You will learn practical skills to protect devices from harmful viruses, create strong, unhackable passwords, and follow secure network practices whether working from the office or a remote location. The modules define how to classify and secure various types of data and mobile devices, empowering you to implement effective security measures and proactively reduce the risks of both physical and digital threats to your organization.


Courses in this Section:

Understanding Cyber Security
Course Duration - 10 min

Advances in technology have changed the way we live, and the way we do business. Our world is more connected than ever before. This brings huge opportunities and benefits, but it also brings risks. This course can help to understand these risks.

Course Objectives:
  • Protect devices from harmful viruses, malware, and hacking
  • Create strong passwords that can’t be hacked
  • Identify practical tips on keeping your devices clean



Cyber Security for the End User: Beginner
Course Duration - 22 min

By some estimates, over 90% of security breaches can be prevented by simple security awareness. This course is designed for everyday computer users and will help identify and prevent common cyber threats through awareness and the development of basic good habits. Please note this course is a basic understanding of Cyber Security as it is our beginner course. A newer and updated Intermediate course is offered if desired. Email info@intellezy.com with proof of completion of the course to obtain your certificate.

Course Objectives:
  • Identify common cyber threats
  • Build awareness of good cyber habits



Cybersecurity Basics
Course Duration - 30 min

With growing threats to electronic systems and programs, networks and servers, computers, mobile devices, and data, it is imperative that employees understand and use best security practices. This training describes common attack methods and provides recommendations to thwart them. It defines how to protect data, including while working away from our facilities.

Course Objectives:
  • Characterize the current cyber risk environment
  • Recognize common threats to systems and data including phishing, malware and insider threats
  • Identify measures to reduce risks of physical and cyber threats
  • Describe risks and mitigation strategies for working from home or public places, if approved to do so



Security Awareness Essentials Challenge for Education
Course Duration - 30 min

Despite the best efforts of organizations worldwide, cybercrime is rising rapidly, and it is expected to cost organizations a stunning amount in 2019: $2 trillion. This is because human error continues to be the biggest threat to information security. This course aims to mitigate human error by teaching how to classify data, secure mobile devices, secure remote and home offices, avoid social engineering scams like pretexting and phishing, and create strong passwords. The course engages users by describing real-life security challenges and asking them to choose the best course of action for each challenge

Course Objectives:
  • Create strong passwords
  • Classify data
  • Protect mobile data
  • Follow secure network practices
  • Avoid social engineering scams such as pretexting and phishing



Cyber Security Awareness
Course Duration - 1 hr 20 min

Cyber Security Awareness Training is an 80-minute course designed to provide you with the knowledge and skills necessary to defend against cyber threats. As cybersecurity becomes increasingly important, understanding how to protect sensitive information and prevent attacks is critical. This course covers the fundamentals of cybersecurity, including recognizing and responding to security threats, using best practices to secure your digital environments, and implementing effective security measures. This course is suitable for you if you use digital devices and the Internet, whether for personal use or in an organizational context. You are interested in improving your understanding of cybersecurity to protect yourself and your organization from digital threats. You want to implement practical cybersecurity measures and take a proactive stance against potential cyber attacks.

Course Objectives:
  • Identify various cyber threats and understand the mechanisms behind phishing, malware, and social engineering attacks
  • Implement strategies to prevent cyber-attacks and use tools to enhance your digital security
  • Recognize the signs of a compromised system and learn how to respond quickly and effectively
  • Use password management tools and strong authentication methods to protect your digital identity
  • Apply safe practices when browsing the Internet and handling personal and organizational information


 


 

STAYING SAFE ONLINE

Section Duration - 5 Courses, 1hr 25 min

This critical section is dedicated to cultivating proactive online safety habits, transforming employees from passive internet users into informed digital defenders capable of protecting sensitive data. Learners will gain a comprehensive understanding of the real and serious online threats they face, including hackers, phishers, ransomware, and social engineering scams, and will learn to identify the critical vulnerabilities associated with accessing the internet for work.

The modules provide essential best practices for maximizing privacy and online behavior, covering topics such as creating and updating secure passwords, following safe network practices, and securing both company email and remote work setups. Furthermore, you will receive clear guidance on navigating the risks of social media in the workplace and be equipped with the knowledge of what steps to take immediately if you suspect a cybersecurity incident or feel worried about your online security.


Courses in this Section:

Privacy and Online Behavior: How to Protect Yourself
Course Duration - 10 min

Our data has never been a more valuable commodity. Advertisers and others track us as we use the internet, but it’s difficult to know who has our information and what it’s being used for. Adopting a few simple habits can help you protect your privacy and prevent you from falling victim to social engineering scams such as phishing.

Course Objectives:
  • Follow best practices to protect your privacy while online
  • Identify critical vulnerabilities while accessing the Internet with unsecured devices
  • Create and update secure passwords
  • Identify the risks associated with accessing social sites in the workplace



Cyber Security: Risks and Social Media
Course Duration - 10 min

This course discusses how social media affects you and your employer. You will also learn why your employer is concerned about social media in the workplace and receive recommendations to follow to protect yourself and your employer.

Course Objectives:
  • Explain why companies are concerned about social media in the workplace
  • Follow best practices when using social media at work
  • Determine how to protect yourself and your organization while online
  • Identify the risks of social media in the workplace



Staying Safe Online (Global)
Course Duration - 15 min

Remember Tron? The light-bikes, the incredible outfits and the amazing 1980s CGI? Everyone wanted to play in a virtual world like that. They quickly realised though, that the consequences of losing in the world of Tron could be just as bad as in the real one. The parallels don’t end here though.

When you go online, you’re entering a virtual world. But the risks you face there are just as real and just as dangerous as the ones you face in real life. There are online predators, hackers, phishers, and criminal gangs, all waiting for an opportunity to strike. At best, you might lose money. At worst, you might lose your entire identity or be subjected to mental or even physical abuse.

It’s vitally important that you stay in control of your personal data whilst on the internet. It affects everyone from the basic computer user to anyone who ventures onto the World Wide Web. Whether in your job or at home, you’ll spend at least some work or leisure time online. This course will help you to stay safe in the virtual world.

Course Objectives:
  • Identify online threats
  • Stay safe online
  • Improve computer security



Information Security: Staying Safe Online
Course Duration - 20 min

Learn how to keep your equipment and data secure while using the internet for work. we'll cover every aspect of online work, from using a company email address to working remotely, providing essential tips and strategies to help you to combat the associated risks.

Course Objectives:
  • Identify the risks associated with working online
  • Recognise phishing and malware attacks
  • Practise strong email and password security
  • Stay safe while using the internet to work remotely
  • Determine what to do if you are worried about your online security



Cybersecurity: Staying Safe Online
Course Duration - 30 min

Most workplaces require us to be online, so we need to be aware of cybersecurity incidents and what to do if we come across one. This course discusses the various online risks and how to protect yourself and your organization from them.

Course Objectives:
  • Define social engineering
  • Explain phishing and ransomware
  • Identify online payment scams
  • Protect yourself from each of these cyberattacks


 


 

PHISHING

Section Duration - 6 Courses, 1 hr 28 min

Phishing remains the single largest threat in cyber security, as an estimated 90% of successful cyberattacks begin with a malicious email. This section is specifically designed to equip all employees with the knowledge and practical skills to expertly analyze, identify, and mitigate the serious risk of falling victim to phishing attacks and online fraud. You will gain a clear definition of phishing, explore why people tend to open malicious emails, and learn the potential costly consequences for both individuals and the organization, including malware and identity theft.

The modules define and distinguish between the various and increasingly sophisticated types of phishing techniques currently in use, enabling you to **recognize phishing emails** and scams immediately. Crucially, you will learn and implement **anti-phishing essentials** and spam-reducing measures to guard your inbox, along with the correct steps to take if you accidentally engage with a suspicious link to protect your accounts effectively.


Courses in this Section:

Phishing Attack
Course Duration - 6 min

Email is an essential communication tool, but it can create security risks. This is a short, interactive, multi-media module that employs problem-based learning through an animated simulation of a real-life scenario. Follow Matt as he receives what appears to be a great offer from an acquaintance via his work email. A final quiz is included.

Course Objectives:
  • Recognize the warning signs that a phishing attack is taking place through emails
  • Demonstrate the process to report any concerns



Cybersecurity: 08. Email Phishing
Course Duration - 10 min

The Cybersecurity: 08. Email Phishing course is designed to help you and your employees analyze, identify, and mitigate the risk of email phishing. In this course, you will learn how to recognize email phishing, how to reduce the risk of receiving spam in your inbox, and what to do if you’ve clicked a suspicious link. Knowing this will help you better protect yourself from malware, identity theft and more. The eighth course in a 15-part series on cybersecurity, this lesson defines the most common types of phishing and explores why we tend to open malicious emails.

Course Objectives:
  • Analyze emails to identify email phishing scams
  • Implement spam-reducing measures to guard your inbox from email phishing
  • Protect your accounts after engaging with a spam email



Phishing (Global)
Course Duration - 15 min

Ever heard of Phishing? We're not talking about an angler baiting their rod and casting to see what they can hook. Oh, hang on. We sort of are. Phishing is a type of cyber attack that criminals might use to get something from you. Personal information, money directly or something else entirely. They lure you in and hope you bite. Alright, it's a lazy analogy, but it's an appropriate one. Phishing techniques are becoming more sophisticated, and if you don't know how to protect yourself, you too could become another victim of this fast-growing weapon in a cybercriminal's armoury.

Course Objectives:
  • Recognise common types of phishing attacks
  • Demonstrate how to protect from phishing attacks
  • Explain the consequences of a phishing attack



Cyber Security: Phishing Prevention
Course Duration - 7 min

Phishing is one of the most dangerous and common cyber security risks today. This module takes a close look at the different types of phishing and provides tips to help you avoid being caught out.

Course Objectives:
  • Explain the different types of phishing
  • Determine how to defend yourself from phishing attacks



Information Security: Phishing
Course Duration - 20 min

Understand how phishing works, and learn how to avoid it. Phishing—a form of online fraud carried out mostly via email—can sometimes be costly to victims. This course equips you to recognise and combat phishing attempts.

Course Objectives:
  • Define phishing
  • Identify the risks phishing can pose to individuals and organisations
  • Recognise phishing emails
  • Determine what to do when you identify a phishing email
  • Make sure you don't fall for a phishing attempt



Anti-Phishing Essentials
Course Duration - 30 min

Over the years, phishing has become the biggest threat to cybersecurity worldwide. It’s estimated that more than 90% of successful cyberattacks start with a phishing email. So, it’s no surprise that cybercriminals send millions of phishing messages every day. In this course, you will learn how phishing works, what forms it can take, and most importantly, how you can avoid becoming a victim.

Course Objectives:
  • Recognize potential phishing attacks
  • Identify various types of phishing attacts
  • Determine how to avoid the various types of phishing attacks


 


 

PASSWORDS

Section Duration - 4 Courses, 49 min

Since a password is the primary barrier between cybercriminals and your private information, this vital section focuses on implementing the best practices for password security to protect all online activity. Learners will transform their approach to creating credentials, moving away from vulnerable practices to master a personal recall system for generating unique yet memorable passwords for every site.

The curriculum provides a clear explanation of why using weak or reused passwords is dangerous and discusses the consequences of a security breach. You will learn key strategies to create passwords that are nearly impossible for hackers to guess, including leveraging special characters and numbers, and you'll discover the three ways that hackers attack. Finally, you will be equipped with essential tips and strategies to minimize the risk of password theft and be prepared with the steps to take if you suspect your password has been compromised.


Courses in this Section:

Professional Productivity: Creating Passwords
Course Duration - 7 min

If you have trouble remembering a multitude of different passwords, then our Professional Productivity: Creating Passwords course will show you how to create a personal recall system. Since it's recommended that you don't use the same password for different sites, and you shouldn't record passwords on paper, you'll learn a simple trick for creating a unique yet memorable password for every site you use. You'll also learn how to create passwords that are nearly impossible for hackers to guess. This brief and helpful video course is part of our larger series on Professional Productivity. It comes with a short recall exam and a downloadable course summary for future reference.

Course Objectives:
  • Design a password creation plan
  • Create passwords that are easy to remember but difficult for hackers to guess



Cybersecurity: 02. Passwords
Course Duration - 12 min

This elearning course, Cybersecurity: 02. Passwords, offers advice on creating passwords that are unique, creative, and difficult to guess – because nobody wants their accounts hacked and their personal information used without their consent. In this short video, we discuss the consequences of a weak password, and provide useful tips on how to create a password that is more complex. The second course in a wider series on cybersecurity, this brief and engaging video contains steps you can implement today for better online security.

Course Objectives:
  • Set unique, creative yet consistent passwords for every site
  • Create a more complex password using special characters and numbers



Using a Strong Password (Global)
Course Duration - 15 min

We all love the films about hacking. Like when a detective is trying to get into a secret computer and manages to crack the code just before the criminal comes through the door. These films are thrilling because they seem inaccessible. But did you know, hacking isn’t just to do with glamorous cases like taking over government schemes or robbing banks? The most common hacking happens to ordinary people with any online account. And the only thing standing between a criminal and your private information is a password. So you need to make it count.

Course Objectives:
  • Identify the three ways that hackers attack
  • Recognise why you should protect yourself using a strong password
  • Set a strong password



Information Security: Passwords
Course Duration - 15 min

Learn to manage your passwords safely. Unless you know how to create and maintain secure passwords, none of your online activity is truly secure.

Course Objectives:
  • Explain why password security is more important than you think
  • Choose a secure password
  • Follow tips and strategies to minimise the risk of password theft and hacking
  • Determine what to do if you suspect your password has been breached


 


 

VIRUSES AND MALWARE

Section Duration - 4 Courses, 56 min

This crucial section focuses entirely on combating Viruses and Malware to safeguard your personal data and your company's private information from malicious attacks. Learners will gain a thorough definition of what malware and viruses are, exploring their various types and understanding how and why cybercriminals create and install them on devices. You will learn to recognize the common warning signs of an infection and define the serious consequences of a successful attack, including financial and personal loss.

The curriculum provides actionable steps to effectively prevent and avoid attacks, teaching you to leverage anti-virus software and exercise caution when dealing with common sources of malicious software. Furthermore, you will be equipped with practical knowledge on protecting mobile devices, practicing responsible data storage, and knowing precisely what to do if your device or computer has been successfully compromised or infected, transforming you into a resilient digital defender.


Courses in this Section:

Cybersecurity: 05. Malware
Course Duration - 9 min

In the Cybersecurity: 05. Malware elearning course, we define malware and note its various types, discuss how and why cybercriminals install malware on your devices, and talk about some of the warning signs of malware. We also discuss steps you can take to protect yourself and your devices from a malicious attack. This knowledge will better safeguard your personal information and your company's private information. This course is part of our Cybersecurity series, designed to help you recognize and protect yourself from online security threats. The course contains a short and engaging video, as well as downloadable student materials and a quick quiz to test your knowledge.

Course Objectives:
  • Recognize the warning signs of malware
  • Determine what to do if your devices become infected
  • Leverage anti-virus software to help protect your devices from malware



Protecting Your Mobile Devices: 02. Malware
Course Duration - 12 min

Learn about the dangers of malware and discover simple steps you can take to protect your personal data from falling into the wrong hands in this elearning course, Malware. In this course, we'll provide practical tips for storing and backing up the contents of your phone in case of loss. We will also cover the best ways to keep your sensitive information secure, including using special security software. Part of the series called Protecting Your Mobile Devices, this course includes a video lesson, downloadable student materials and a short online quiz to check your comprehension.

Course Objectives:
  • Protect personal data on your mobile device by using responsible storage practices
  • Use available features and software to prevent sensitive information from being hacked
  • Exercise caution when dealing with common sources of malicious software



Viruses & Malware (Global)
Course Duration - 15 min

Ah, The Matrix. Cutting edge cinema. It hasn’t aged well though, has it? Modern technology has already caught up to the dystopian future it portrayed, right? Thing is, as the technology has grown, so has our need to massively UP our cybersecurity game. Just like in the movies, bad guys have the means to take control of our tech, and they won’t hesitate to do so. You simply MUST play your part and stand up to them, because if you don’t, you or your company will feel the effects. If bad guys take over your computer, you’re at risk of financial or personal loss. The overall consequences can be even worse, and simple steps can be taken to avoid them. Learning about viruses and malware is learning to know your enemy. It’s time to protect the tech!

Course Objectives:
  • Recognise why people create viruses
  • Identify common viruses and how they work
  • Define malware



Information Security: Malware and Viruses
Course Duration - 20 min

Understand how malware and viruses work, and learn how to keep yourself safe. Malware—or “malicious software”—and computer viruses can sometimes cause serious problems for victims.

Course Objectives:
  • Define what malware is and what viruses are
  • Recognise a potential malware or virus attack
  • Prevent and avoid attacks
  • Identify if your computer has been attacked
  • Determine what to do if you have been successfully attacked


 


 

SPECIAL TOPICS IN CYBER SECURITY

Section Duration - 7 Courses, 2 hr 14 min

This advanced section addresses critical, specialized areas of cyber security that are essential for protecting modern, distributed workforces and evolving technologies. Learners will gain expertise in securing their work against unique threats like spoofing attacks, identifying how fraudsters impersonate entities to steal money or data, and mastering the rules to completely avoid falling victim to these sophisticated scams. The modules also focus intensely on remote working security, guiding employees through the specific risks associated with working from home, such as increased vulnerability to hacking, malware, and data theft, and providing strategies to minimize risk.

A significant portion of the course is dedicated to navigating the security challenges posed by emerging technology, including following best practices for using Generative AI securely to mitigate data exposure risks and understanding the security implications of the Internet of Things (IoT). Finally, you will receive a comprehensive grounding in Data Privacy Essentials, learning to define, identify, and protect private data across all three common categories, and recognizing key regulations like GDPR and US/international privacy laws.


Courses in this Section:

Cyber Essentials Principles: Using Generative AI Securely
Course Duration - 7 min

The popularity of generative AI tools, such as ChatGPT, has exploded worldwide - and understandably so. AI chatbots can be very useful for improving productivity and efficiency. However, using AI is not risk-free, and there are best practices that must be followed. This course covers the uses of AI, the risks of using them, and how to use them securely.

Course Objectives:
  • Describe generative AI and how they are used
  • Identify the risks associated with using AI
  • Determine how data can be exopsed through generative AI applications
  • Explain why hallucinations are a problem
  • Follow best practices using AI securely



Remote Teams: Digital Security While Working From Home
Course Duration - 10 min

Working from home exposes employees—and the organisations they work for—to a range of cybersecurity risks. Remote workers are frequently targeted by phishing attacks and email fraud, and they are often more vulnerable to hacking, malware and viruses, and data theft. Meanwhile, the digital tools and systems on which remote teams depend create yet more openings for cyber-attack. These attacks can be costly for target organisations, and may entail severe reputational damage. This course equips remote workers to recognise and combat digital security risks. The 3-minute animation—with rich, learning-focused visual content and lively audio narration—provides information and strategies which can significantly reduce the risk of a remote employee falling victim to a cyberattack.

Course Objectives:
  • Define cybercrime
  • Spot phishing and email fraud
  • Prevent malware attacks
  • Follow key strategies for password hygiene



The Internet of Things
Course Duration - 10 min

What do the following have in common? Toasters, kettles, refrigerators…well, they’re all found in the kitchen, that’s true. But they are all commonly becoming part of the Internet of Things (IoT). To put it simply, these devices and thousands of others are being fitted with sensors that allow them to talk to each other. Why? Actually, there are loads of benefits. Want a cuppa? Turn on the kettle from your smartphone. Connect your fridge to your shopping list and auto-order milk when you’re getting low. All these features have their uses, but BEWARE! They can also be exploited by cybercriminals… As technology gets smarter, so do hackers, and so must we. With products joining the IoT at a rapid rate, data is constantly being collected. That data can be exploited by those criminals for their own purposes, so all of us should be aware of how to protect ourselves and our belongings. It’s extremely useful stuff to know.

Course Objectives:
  • Define the Internet of Things (IoT)
  • Identify uses for the IoT
  • Implement security measures to protect yourself



Spoofing Attacks (Global)
Course Duration - 15 min

If you thought that spoofing was just imitating something for fun, then think again. Scammers use ‘spoofing’ techniques to pretend to be someone or something that they aren’t. Why? To get access to your money or data, or to gain access to your device or your employer’s system. Nothing fun about that. Spoofing can mean that you get tricked into clicking on malicious links or downloading malicious software. Falling for these nasty tricks or always believing that emails and texts are genuine puts you or your company at risk of loss. There are lots of ways that a fraudster might try to spoof attack you, but they all rely on one essential element to be successful – the naivety and trusting nature of their would-be victims. But there are steps you can take to defend yourself. This course is gonna teach you the rules to help you not just survive but completely avoid a spoof attack.

Course Objectives:
  • Recognise the types of spoofing
  • Explain how spoofing attacks work
  • Demonstrate how to detect and protect against spoofing attacks



Information Security: Remote Working
Course Duration - 20min

Learn how to keep your equipment and data secure while working remotely. This course walks you through the risks of working remotely, from equipment theft to hacking and beyond, and shows you strategies for staying safe.

Course Objectives:
  • Identify the security risks associated with remote working
  • Minimise risk while working remotely or supervising remote workers
  • Prevent security breaches while working remotely or supervising remote workers
  • Determine what to consider if your security is compromised while working remotely or supervising remote workers



Data Privacy Essentials
Course Duration - 30 min

Everybody handles some private data at work. But how do you know what constitutes private data? This course answers that question and more. It outlines the importance of protecting private data in the workplace, including the three common categories of protected information. The course covers US privacy laws and overview of individual state laws, GDPR,and laws from around the world. The users are able to select the inividual states and countries that apply to them. Users will learn best practices for protecting personal and corporate data throughout the day, as well as gain a better understanding of their personal responsibility for protecting the data of other employees and customers.

Course Objectives:
  • Define what private data is
  • Identify private data
  • Classify private information
  • Protect private data
  • Recognize privacy laws and regulations
  • Recall US and state privacy laws
  • Recall international (by country) privacy laws and regulations



Cyber Security for the End User: Identifying and Preventing Advanced Threats
Course Duration - 42 min

With the increase use in technology comes efficiency but also a greater risk of crime. Proper cyber security awareness can help minimize or prevent you from being a victim of a cyber criminal. This course is designed for everyday computer users and takes a deeper look at types of cybersecurity attacks and best practices to prevent them. Email info@intellezy.com with proof of completion of the course to obtain your certificate.

Course Objectives:
  • Identify and prevent advanced threats as well as build cyber security awareness


 


 

SOCIAL ENGINEERING

Section Duration - 4 Courses, 38 min

This crucial section focuses on mitigating the single biggest vulnerability in any organization's defense: the human element. Social engineering is the malicious practice of deception used by cyber-criminals to manipulate employees into revealing confidential or personal information for fraudulent purposes. Through engaging game-based modules and real-life case studies, learners will gain the essential skills to spot and avoid these cunning scams, recognizing that an employee's trusting nature can be a valuable target for unsavory types.

You will learn to define social engineering, explain the common types of social engineers, and describe popular techniques and tactics they use, such as posing as legitimate organizations to request money or data via email, phone, or text. The goal is to transform every employee into a strong link by teaching them to question all suspicious behaviors and take effective preventative measures, thereby ensuring they do not get fooled into handing over precious details about themselves or their organization.


Courses in this Section:

Cyber Showdown: Avoiding Phishing Attacks
Course Duration - 5 min

Trivia game that provides users the opportunity to demonstrate their knowlwedge of phishing scams.

Course Objectives:
  • Describe common Characteristics of phishing attacks



Slay the Scam
Course Duration - 7 min

Whether by email, phone call, or text message, crafty criminals can pose as legitimate organizations attempting to get your money. This game introduces users to common scams involving gift cards, back taxes, elections, fake IT support, etc. - all while they rake in points to get a high score!

Course Objectives:
  • Avoid phishing scams



Cybersecurity: 11. Social Engineering
Course Duration - 11 min

Our Cybersecurity: 11. Social Engineering course dives into the malicious practice of social engineering – the use of deception to manipulate individuals into revealing confidential or personal information for fraudulent purposes. In this course, we discuss the ways in which criminals use social engineering, provide real life examples through case studies, and teach you how you can take steps to protect yourself from this type of threat. This course is part of our Cybersecurity series, designed to help you recognize cybersecurity threats and understand how to better protect yourself and your company from them. Our Social Engineering course is delivered through a short video and downloadable student materials.

Course Objectives:
  • Recognize the signs of social engineering
  • Protect yourself and your company by being more aware of your surroundings
  • Question all suspicious behaviors and activities



Social Engineering
Course Duration - 15 min

Employees are the weakest link in an organization’s cybersecurity. And cyber-criminals know this. Don’t be fooled into handing over precious details about yourself or your organization. This course can help! Learn about the (many) techniques hackers use to gather information and who these unsavory types may be. Learn how to avoid falling victim to a social engineering attack.

Course Objectives:
  • Define what social engineering is
  • Explain common types of social engineers
  • Describe popular social engineering techniques and tactics, and how they're used
  • Help your organisation take effective preventative measures


 


 


Essential Career Skills Pack


Productivity and Time Management

Course Duration - 30 min

It seems that there is never enough time in the day. But, since we all get the same 24 hours, why is it that some people achieve so much more with their time than others? This course will explain how to plan and prioritize tasks, so that we can make the most of the limited time we have. By using the time-management techniques in this course, you can improve your ability to function more effectively – even when time is tight and pressures are high. So, by the end of the course you will have the knowledge, skills and confidence to be an effective manager of your time.

Course Objectives:
Course Objectives:
  • Set your priorities to better manage your time
  • Improve your productivity by sharpening your focus and multitasking effectively
Detailed Course Outline:
Detailed Course Outline:
  • Productiity & Time Management
  • Prioritization
  • Getting Things Done
  • Procrastination
  • Multitasking & Focus
  • Summary


 

Basic Digital Skills

Course Duration - 13 min

With the rise of digital transformation and technology, having a basic digital literacy is essential for all types of jobs, regardless of the industry. To stay competitive and be successful in the workplace, enhancing your digital skills should be a top priority.

Course Objectives:
Course Objectives:
  • Recall the essential digital skills framework
  • Elaborate on the toolkit of essential digital skills
  • Identify how to develop or improve your digital skills
Detailed Course Outline:
Detailed Course Outline:
  • The Essential Digital Skills Framework
  • The Toolkit of Essential Digital Skills
  • Developing Digital Skills
  • Summary


 

4 Ways to Boost Creativity

Course Duration - 30 min

The digital economy is opening up ways for everyone to be creative. It doesn’t just mean being artistic – it’s more about ideas, solutions, alternatives, incremental improvements. Peter Quarry and Eve Ash discuss ways that mental capacity can be developed, perspectives changed, group power leveraged and making things actually happen.

Course Objectives:
Course Objectives:
  • Define creativity
  • Think outside the box
  • Develop the right mental attitude
  • Leverage the power of groups
  • Ensure managers make it happen
Detailed Course Outline:
Detailed Course Outline:
  • What is Creativity at Work?
  • Learn to Think Outside the box
  • Develop the Right Mental Capacity
  • Laverage the Power of Groups
  • Ensure Managers Make It Happen
  • Summary


 

The 11 Essential Career Soft Skills

Course Duration - 1 hr 10 min

Soft Skills are the traits, characteristics, habits, and skills needed to survive and thrive in the modern work world. Soft skills aren't usually taught in school, but you will learn them all here in this course. Are you someone that other people in your organization and industry like to work with, collaborate with and partner with? Are you seen as a valuable asset to any new project that comes along?

This soft skills training course will teach you how to develop the skills that can make the difference between a lackluster career that tops out at middle management versus one that lands you in the executive suite. Or to wherever you define career success. So many soft skills seem like common sense at first glance, but they are not commonly applied by most workers. This soft skills training course will give you an edge over your competitors. It will also make your job, your career and your life more rewarding and enjoyable.

Course Objectives:
Course Objectives:
  • Understand how to be a great communicator
  • Become a stronger listene
  • Appear professional to co-workers and bosses of all ages
  • Avoid common career blunders that often end careers
  • Manage expectations for bosses and colleagues
  • Position yourself for promotions
  • Make technology your asset, even if you are afraid of technology
  • Avoid the Not My Job Syndrome
  • Develop EQ to Match Your IQ
  • Develop leadership qualities
Detailed Course Outline:
Detailed Course Outline:
  • Introduction
  • The Soft Tech Savvy Way to Always Be Essential
  • Not My Job, And I Am Happy to Do It
  • You Can Become a Master Communicator
  • Feedback Video for The 11 Essential Career Soft Skills
  • Become a Leader Without the Title or Formal Authority
  • Your EQ Will Beat a Higher IQ
  • Building Your Winning Team
  • Make Every One of Your Seconds Count
  • Unleash Your Inner Anthony Robbins
  • Avoid Being Uncool
  • Clothes Can Still Make or Break Your Career
  • Conclusion The 11 Essential Career Soft Skills
  • Extra: Developing Your Career Secret Sauce

 



 


Related Cyber Security Information:

How Much Do Cyber Security Training Courses Cost?

Public instructor-led Cyber Security course prices start at $2,195 per student. Group training discounts are available.

Self-Paced Cyber Security eLearning courses cost $300 at the starting point per student. Group purchase discounts are available.

What Is a Systems Engineer, and How Do I Get Online Training?

A: A systems engineer can be responsible for the design, implementation, and maintenance of technical infrastructure systems. These can include systems like networks or those used for the deployment of software. Systems engineers are considered senior professionals and can be expected to have highly refined technical skills, the particulars of which can vary between professional duties. Along with extensive technical knowledge, systems engineers also need to have good communication and project management skills because of the collaborative nature of their jobs. Online courses can often help systems engineers hone their professional skills.

More Information on What a Systems Engineer Is and How to Get Online Training

Why Invest in Cybersecurity Employee Training?

A: Training your employees on cybersecurity concepts and practices can protect your company and consumers' data, help you maintain public trust, and keep your business compliant with industry regulations. Good courses will often cover traditional online threats and attacks and address modern considerations like remote work and the digital environments that it creates, such as the cloud and wireless networks. They'll also cover popular cybersecurity topics like human error, social engineering, and device loss. To ensure that employees' cybersecurity skills remain sharp, sign them up for training classes regularly.

More Information on Cybersecurity Employee Training

How Are CompTIA Certifications Valuable?

A: CompTIA certifications are some of the most valuable certifications in the information technology (IT) industry because they are well-known and widely respected and can immediately convey technological proficiency to employers. Earning an entry-level CompTIA certification, such as CompTIA A+, can set employees on track to learning other skills and obtaining specialized credentials in areas like infrastructure, cybersecurity, and data analytics. A basic CompTIA A+ certification can open doors to several different professional positions. CompTIA certification-holders also typically enjoy pay increases after they obtain their credentials.

More Information on How CompTIA Certifications Are Valuable

Where Should I Get Cybersecurity Training?

A: Individuals who are new to the discipline of cybersecurity have a number of training options available to them, ranging from free courses to college degrees. When choosing the right course for your needs, it's important to consider the rules and regulations that your employer needs to follow. For example, students who want to work for government agencies should look for courses approved by their agencies. But in general, hands-on, instructor-led courses will provide the best training solutions.

More Information on How to Train for Cybersecurity Jobs

What training do you need for cyber security?

A: There is no one-size-fits-all answer to this question, as the training you'll need for a career in cyber security will depend on your specific goals and interests. However, there are some general principles you can keep in mind as you consider what type of training to pursue.

First, it's important to have a strong foundation in computer science and programming. This will give you the ability to understand how systems work and how to find and exploit vulnerabilities.

Second, you should be familiar with common security tools and technologies. This knowledge will help you design and implement effective security solutions.

Finally, it's also beneficial to have experience with risk management and incident response. This expertise will come in handy when assessing and responding to security threats.

With these considerations in mind, you can start to research specific training programs that will help you reach your goals in cyber security. There are many excellent resources available, so take your time and find the right fit for you.

Is cyber security training hard?

A: No, cyber security training is not hard. In fact, many experts believe that it is becoming increasingly important for everyone to be aware of the basics of cyber security. As the world becomes more reliant on technology, the potential for cyberattacks increases. That's why it's so important for individuals and businesses to invest in cyber security training.

There are a variety of online and offline resources available to help you learn about cyber security. Many colleges and universities now offer courses in this subject, and there are numerous professional development Cyber Security courses available as well. Even if you don't have a lot of technical knowledge, you can still benefit from learning about the basics of cyber security. By taking the time to learn about this topic, you'll be better prepared to protect yourself and your business from potential threats.

Which course is best for cyber security?

A: Certstaffix Training offers a variety of courses that can help you learn more about cyber security. If you're just getting started in the field, our Cyber Security Awareness course is a great place to start. This course will give you an overview of the basics of cyber security for end users and those just starting out in the Cyber Security area.

If you're looking for more advanced training, our CompTIA Security+ course is perfect for you. This course covers more advanced topics, such as ethical hacking and penetration testing. You'll learn how to identify vulnerabilities in systems and how to exploit them.

No matter what your level of expertise, Certstaffix Training has a Cyber Security course that's right for you.

What are the top Cyber Security skills?

A: As the world increasingly relies on technology, the importance of cyber security grows. Cyber security professionals work to protect computer systems and networks from unauthorized access or damage.

There are many different skills that are important for a successful career in cyber security. Here are some of the most important:

Top Cyber Security Skills

1. Technical skills – A good cyber security professional must have strong technical skills. They must be able to understand how computer systems work and identify vulnerabilities. They also need to be able to use tools to protect systems and investigate incidents.

2. analytical skills – being able to think logically and solve problems is essential for a career in cyber security. Professionals need to be able to analyze information and make decisions quickly.

3. Communication skills – Cyber security professionals need to be able to communicate effectively. They need to be able to explain technical concepts to non-technical people. They also need to be able to work well in a team.

4. Organizational skills – Good organizational skills are important for cyber security professionals. They often have to manage multiple tasks and projects at the same time.

5. Flexibility – The world of cyber security is constantly changing. Professionals need to be able to adapt to new technologies and threats.

These are just some of the skills that are important for a career in cyber security. If you have these skills, you may have what it takes to succeed in this field.

Where Can I Learn More About Cyber Security?

Cyber Security Blogs

Cyber Security User Groups

Cyber Security Online Forums

Explore Cyber Security Training Classes Near Me:

Certstaffix Training provides Cyber Security classes near me or online, depending on the number of students involved. We offer online courses for individual learners, as well as in person classes at your office for corporate groups. Our trainers are highly experienced professionals with the expertise necessary to help you gain a thorough understanding of Cyber Security concepts and tools. With our courses available online for individuals or in person for corporate groups, it's easy to develop your Cyber Security skills. Start learning today and see how Certstaffix Training can help you reach your goals.







Registration:

Have a Group?
Request Private Training


Online Class

Self-Paced eLearning

Start your training today!