NICE Framework Mapping
Oversight and Governance (OG)
Overview
This course is designed to enhance cybersecurity awareness and knowledge among employees, equipping them with the skills to recognize and respond effectively to cyber threats. Through a series of interactive lessons, participants will learn to identify social engineering attacks, implement authentication and authorization best practices, handle data securely, and recognize potential vulnerabilities and incidents. Additionally, they will gain insights into the dangers of connecting to insecure networks and learn how to identify and report missing security updates on enterprise assets.
Prerequisites
Basic understanding of computer and internet usage
Familiarity with common cybersecurity concepts and terminology
Willingness to engage in active learning and participation
Schedule
1 hour
Outline
Lesson 1: Recognizing Social Engineering Attacks
Lesson 2: Authentication / Authorization Best Practices
Lesson 3: Data Handling Best Practices
Lesson 4: Causes of Unintentional Data Exposure
Lesson 5: Recognizing and Reporting Security Vulnerabilities and Incidents
Lesson 6: How to Identify and Report if Enterprise Assets are Missing Security Updates
Lesson 7: Dangers of Connecting to and Transmitting Enterprise Data Over Insecure Networks
Sign Up Today
If you are interested in this training provide your information below.