NICE Framework Mapping

Oversight and Governance (OG)
Overview

This course is designed to enhance cybersecurity awareness and knowledge among employees, equipping them with the skills to recognize and respond effectively to cyber threats. Through a series of interactive lessons, participants will learn to identify social engineering attacks, implement authentication and authorization best practices, handle data securely, and recognize potential vulnerabilities and incidents. Additionally, they will gain insights into the dangers of connecting to insecure networks and learn how to identify and report missing security updates on enterprise assets.

Prerequisites

Basic understanding of computer and internet usage
Familiarity with common cybersecurity concepts and terminology
Willingness to engage in active learning and participation

Schedule

1 hour

Outline

Lesson 1: Recognizing Social Engineering Attacks
Lesson 2: Authentication / Authorization Best Practices
Lesson 3: Data Handling Best Practices
Lesson 4: Causes of Unintentional Data Exposure
Lesson 5: Recognizing and Reporting Security Vulnerabilities and Incidents
Lesson 6: How to Identify and Report if Enterprise Assets are Missing Security Updates
Lesson 7: Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks

Sign Up Today

If you are interested in this training provide your information below.

* indicates required