fbpx

Cybersafe

How Weak is Your HR Department?

AVOID INSIDER THREATS, PREVENT ADVERSE EVENTS

HR departments are often the target for phishing attacks seeking Personal Identifying Information (PII).

Consider:

  • The amount of sensitive data HR sends via email.
  • Use of files and applications with highly sensitive data.
  • Posting and sharing PII data in the cloud.
  • Reliance on third-party vendors and contractors.
  • Use of mobile devices.
  • Undefined categories or classifications of PII.
  • Inadequate security and acceptable use policies.
  • Course Details
  • Course Breakdown
  • Course Benefits
  • Cybersafe Dates

Course Details

HR professionals are immersed in a course that takes them through the essentials of identifying the need to improve organizational security and safely protect themselves. CyberSAFE builds on an understanding of how we interact with computers, mobile devices, networks, and the Internet. The course is delivered in a collaborative environment where open discussions are encouraged.

Recertification Credit Hours Awarded:
 1.00 HR (General)

The use of this seal confirms that this activity has met HR Certification Institutes  (HRCI) criteria for recertification credit pre-approval.

Duration

3.5 hours (inclusive of the time required to complete the Certified CyberSAFE credential process).

Training

The CyberSAFE Readiness training enables consultants, members, and employees of any organization to identify many of the common risks associated with using conventional end-user technology. Delivered in a half-day (3.5 hours) or less, Cyber- SAFE also prepares learners to earn their Certified CyberSAFE credential.

CERTIFY YOUR ENTIRE ORGANIZATION
CONTACT US FOR PRICING

Lesson 1.

Identifying the Need for Security

  • Topic A: Identify Security Compliance Requirements
  • Topic B: Recognize Social Engineering

Lesson 2.

Securing Devices

  • Topic A: Maintain Physical Security of Devices
  • Topic B: Use Passwords for Security
  • Topic C: Protect Your Data
  • Topic D: Identify and Mitigate Malware
  • Topic E: Use Wireless Devices Securely

Lesson 3.

Using the Internet Securely

  • Topic A: Browse the Web Safely
  • Topic B: Use Email Securely
  • Topic C: Use Social Networking Securely
  • Topic D: Use Cloud Services Securely

Certification Badge

CyberSAFE is accompanied by the Certified CyberSAFE credential process. This brief online credential covers 10 questions and is included as part of the course-ware.

Sana’ Rasul, ACC, PHR, SHRM-CP 

Chief Girlfriend & CyberSAFE Instructor

Sana’ Rasul,  Chief Girlfriend, has trained with industry leaders to bring you the most up to date cyber end-user education.

[ecs-list-events design=”compact” eventbg=”#ffffff” bgthumb=”#C0ECED” cat=”Cyber Safety” limit=”4″ thumb=”true” button=”Register Now”]

Corporate Benefit

CyberSAFE allows organizations to increase their security posture quickly and with minimal investment by ensuring that end-users are equipped with the knowledge necessary to be good stewards of their organizations’ data.

Course Candidates

This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.

Course Outcomes

Students will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect themselves and their organizations from those risks.

Training Credential

Each student will receive a certificate of success once they have completed the course.

Scroll to Top
Share via
Copy link
Powered by Social Snap