FREE attendance to the Cybersecurity Awareness for Users training

This Eccentrix solution offers 20 free participations in the Cybersecurity Awareness for Users (CS8525) training.

This is a complementary two-hour course covering the essentials of IT security, relevant for any user of the organization’s computer systems.

This offer is cumulative – by registering participants for eligible training courses, the final number of participants in this complementary course can become significant. For example, two registrations for an eligible course give the opportunity to train 40 participants on the essentials of IT security in the workplace.

What is the Cybersecurity Awareness for Users (CS8525) training?

This training is designed for all personnel in an organization, providing essential knowledge and skills to become a proactive defender against cyber threats.

It can be a key component of a broader organizational strategy to raise awareness about cybersecurity issues and how to prevent cyberattacks, particularly those involving social engineering.

The course curriculum consists of nine modules covering the most important aspects of data protection and information security.

Why should you invest your time in this course?

Cybercriminals are constantly developing new ways to exploit vulnerabilities and target unsuspecting individuals. By increasing your cybersecurity awareness, you can not only protect your personal data but also help safeguard your organization and its valuable assets from potential cyberattacks.

What can you expect from this course?

Throughout the interactive modules, you will explore real-world case studies and practical scenarios simulating cyber threats. This approach will allow you to effectively apply your new knowledge in your daily online interactions, both at work and in your personal life.

Which trainings include this benefit?

Training plan

  • The need to secure data
  • The threats
  • Vulnerabilities
  • The attacks
  • Exploits
  • Countermeasures
  • Techniques in social engineering
  • Phishing
  • By call, by text message, by physical presence
  • Detection tools
  • Example of a phishing website
  • Example of phishing emails
  • How to detect phishing?
  • Demonstration: Detecting Phishing
  • Difficulty erasing your data on the web
  • Targeted browsing advertisements
  • The security of cookies
  • Filtering of inappropriate content
  • Disclosure of data on social networks
  • The use of private browsing
  • Best practices and user behavior
  • Application of company policies
  • Demo: Start Private Browsing
  • Password policies in corporate environments
  • Password too weak
  • Password too strong
  • The use of a password to access several distinct services
  • Multi-factor authentication (MFA)
  • Examples of complex passwords
  • Demonstration: Is my password secure?
  • Demonstration: Changing a password
  • Access to your mailbox
  • Transmission of emails in clear text
  • Eavesdropping/network interception
  • Secure tunnels
  • The vulnerabilities of failing systems
  • User behavior
  • Types of malicious software
  • Example of ransomware
  • Example of fake security software
  • Security with anti-virus
  • Software updates
  • Good practices
  • Demonstration: How do I update my system?
  • Mobility is everywhere
  • The growing popularity of mobile devices
  • Mobile device security issues
  • Wireless network security
  • Home, work and public networks
  • VPNs for secure remote access
  • Demonstration: Explore available wireless networks
  • Your information is everywhere
  • Where is it stored?
  • How secure is it?
  • Can your information be stolen?

How to use this benefit?

This solution is included automatically when you register for an eligible main course. Therefore, no additional action is required on your part. Once the main course is completed, participants will receive an email with an invitation to register participants for the proposed dates. Finally, all registered individuals will receive a formal event invitation seven days before the start.

Are you looking for a solution allowing unlimited trainings from our confirmed training calendar?

Inquire about this Eccentrix Solution

Fill out the form with your essential contact information, and one of our expert representatives will contact you to discuss the possibilities of acquiring this Eccentrix solution for your organization.

Our website uses cookies to personalize your browsing experience. By clicking ‘I accept,’ you consent to the use of cookies.