Cybersafe
How Weak is Your HR Department?
AVOID INSIDER THREATS, PREVENT ADVERSE EVENTS
HR departments are often the target for phishing attacks seeking Personal Identifying Information (PII).
Consider:
- The amount of sensitive data HR sends via email.
- Use of files and applications with highly sensitive data.
- Posting and sharing PII data in the cloud.
- Reliance on third-party vendors and contractors.
- Use of mobile devices.
- Undefined categories or classifications of PII.
- Inadequate security and acceptable use policies.
- Course Details
- Course Breakdown
- Course Benefits
- Cybersafe Dates
Course Details
HR professionals are immersed in a course that takes them through the essentials of identifying the need to improve organizational security and safely protect themselves. CyberSAFE builds on an understanding of how we interact with computers, mobile devices, networks, and the Internet. The course is delivered in a collaborative environment where open discussions are encouraged.
Recertification Credit Hours Awarded:
1.00 HR (General)
The use of this seal confirms that this activity has met HR Certification Institutes (HRCI) criteria for recertification credit pre-approval.
Duration
3.5 hours (inclusive of the time required to complete the Certified CyberSAFE credential process).
Training
The CyberSAFE Readiness training enables consultants, members, and employees of any organization to identify many of the common risks associated with using conventional end-user technology. Delivered in a half-day (3.5 hours) or less, Cyber- SAFE also prepares learners to earn their Certified CyberSAFE credential.
CERTIFY YOUR ENTIRE ORGANIZATION
CONTACT US FOR PRICING
Lesson 1.
Identifying the Need for Security
- Topic A: Identify Security Compliance Requirements
- Topic B: Recognize Social Engineering
Lesson 2.
Securing Devices
- Topic A: Maintain Physical Security of Devices
- Topic B: Use Passwords for Security
- Topic C: Protect Your Data
- Topic D: Identify and Mitigate Malware
- Topic E: Use Wireless Devices Securely
Lesson 3.
Using the Internet Securely
- Topic A: Browse the Web Safely
- Topic B: Use Email Securely
- Topic C: Use Social Networking Securely
- Topic D: Use Cloud Services Securely
Certification Badge
CyberSAFE is accompanied by the Certified CyberSAFE credential process. This brief online credential covers 10 questions and is included as part of the course-ware.
Sana’ Rasul, ACC, PHR, SHRM-CP
Chief Girlfriend & CyberSAFE Instructor
Sana’ Rasul, Chief Girlfriend, has trained with industry leaders to bring you the most up to date cyber end-user education.
[ecs-list-events design=”compact” eventbg=”#ffffff” bgthumb=”#C0ECED” cat=”Cyber Safety” limit=”4″ thumb=”true” button=”Register Now”]
Corporate Benefit
CyberSAFE allows organizations to increase their security posture quickly and with minimal investment by ensuring that end-users are equipped with the knowledge necessary to be good stewards of their organizations’ data.
Course Candidates
This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.
Course Outcomes
Students will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect themselves and their organizations from those risks.
Training Credential
Each student will receive a certificate of success once they have completed the course.