Passwords and password management – Passwords are the keys to your sensitive data when using websites, email accounts and your computer itself (via User Accounts). This is designed to provide users with an understanding of the importance of strong passwords along with techniques to assist users in choosing and managing their passwords.
An introduction to hacking – This module introduces the basic technical concepts behind the various stages of a hacking attack, as well as some common tools and techniques used by hackers and security professionals alike.
Phishing attacks – This module takes a detailed look at what phishing is, why it poses a threat and how users can minimise their exposure to phishing attacks.
People risk/insider threat – This module looks at the weakest security link in any organisation – its people. Most organisations have good technology, but people often bypass controls or forget procedures. Guidance will be provided on how to help people do the right thing, and deterring or detecting malicious intent.
Social Engineering – This module looks at what social engineering is, who or what are social engineers, what they want, how they get it, and how to stop them
Safe internet use – While the internet offers us many benefits, this module is designed to highlight that there are a number of risks associated with going online – some general and some specific to the respective activities that you’re undertaking – including threats to the integrity of our identity, privacy and the security of our financial transactions.
Online and mobile banking – Online banking is becoming ever more popular and most importantly it’s convenient and reasonably safe – as long as you take reasonable precautions as detailed in this module.
Online shopping – This module identifies the steps that should be taken to make sure that you are shopping safely
Social networking – Social media has revolutionised the way we communicate with others. We can now talk one-to-one or to large groups of people at once from the convenience of our computer or mobile device. This module identifies the ways in which ID fraudsters harvest sensitive information from these services and provides best practices to mitigate them.
Using wireless networks – This module provides an overview of the insecure nature of wireless networks and how that risk can be mitigated.
Antivirus software and installing updates – This module explains why it is necessary to install antivirus software and patches.
Home and Mobile Working – This module explores the potential threats of working remotely and provides guidance and best practices.
Malware – This module explores, what is and are the types of malware and what should you do if you’re infected.
Removable Media – This module explores the benefits of limiting the use of removable media and producing policy to support this.