SANS Security Awareness Suite

$55.00

Pricing(Required)
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is hidden when viewing the form
This field is for validation purposes and should be left unchanged.

  • $55.00
  • $0.00
  • Total $55.00

SKU: 11031 Category: Tag:

Description

This suite is comprised of 14 learning modules that together provide each individual with the training needed to be compliant with overall security awareness standards.

Produced by the SANS Institute

Courses*

*Only available as a suite. Durations are approximate.

  • You are the Shield (1 minute)
    This introductory module explains how cyber attackers are focusing on human risk to gain access to data and information by bypassing technology’s defenses. Learners are encouraged to build a strong cyber shield and strengthen their cyber-detection skills at work and at home.
  • Social Engineering (4 minutes)
    This module explains and illustrates different types of social engineering attacks and how people can detect and defend against them. This module lays the foundation for secure behaviors that learners can use in the event of an attack.
  • Malware (4 minutes)
    This module defines malware and provides examples of commonly used malware. This module also focuses on key methods attackers use to deploy malware and how each of us can defend against them.
  • Email and Phishing (4 minutes)
    This module explains key methods cyber attackers use to get people to click on the bait in an email message. It also identifies the primary clues that each person can use to detect phishing and reviews additional safe email behaviors.
  • Browsing Safely (4 minutes)
    Browsers, as well as their add-ons, plug-ins and extensions, are common targets for cyber attacks. This module covers key security behaviors such as safe browsing, recognizing signs of a compromised browser or device, managing updates and logging off websites.
  • Social Networks (4 minutes)
    This module focuses on avoiding oversharing, recognizing that privacy protection controls can change and understanding that once online, information is outside of your control. The module identifies steps that each person can take to remove inappropriate content and how to recognize when social network profiles or posts could be the focus of an attack.
  • Mobile Devices (2 minutes)
    Mobile devices today have the same functionality, complexity and risks as a computer but with the additional risks of being mobile and easy to steal. In this module, key security behaviors are reviewed with a focus on choosing safe apps, keeping them updated and avoiding excessive permissions.
  • Passwords (2 minutes)
    This module follows the National Institute of Standards and Technology’s (NIST) recommendations for strong passwords. It also covers the use of passphrases, the importance of layered security with two-step verification and key password security behaviors that each person should employ to protect information.
  • Targeted Attacks (2 minutes)
    Targeted attacks, such as spear phishing and CEO fraud, involve research on the target before the attack is launched. This module provides real-world examples of how a targeted attack works and how everyone in an organization can protect and defend against them.
  • Data Security (3 minutes)
    Safe data-handling practices are critical. As the foundation of most of the compliance videos, this module describes ways to securely store or process sensitive information, restrictions on sharing information, ways to manage data retention, why it is important to follow data policies, and how to destroy data securely.
  • Hacked (2 minutes)
    A security incident or compromise can occur even with security controls and security awareness training in place. This module focuses on the common warning signs used to identify and report an incident, regardless of the cyber attack employed.
  • Working Remotely (3 minutes)
    Being able to securely work remotely is more important than ever. In this module, we review how employees can use secure network connections, manage device security and follow workplace policies to keep themselves and your organization safe.
  • Cloud Services (2 minutes)
    Cloud services enable data storage and sharing and authorized use must occur safely and securely. This module explains these risks to employees and shows them how to safely use authorized cloud providers in your organization.
  • Conclusion Video (1 minutes)
    This module recaps key security awareness behaviors across the Essential Training lessons.
0
    0
    Your Cart
    Your cart is emptyReturn to Shop