What Is Cyber Security Awareness Certification Training?
Security awareness training teaches you to spot fakes, avoid risks online, and use good cyber-hygiene practices at work and at home to protect themselves and their organization’s assets from loss or harm. Criminals take advantage of your trust, panic, greed, fear, and human error.
Your employees are the weak point in your security infrastructure. Make them your strength with our Certified CyberSecurity Awareness Professional Certification training.
Students learn how hackers use social engineering tools like spoofing, Deceptive Phishing, W2 Phishing, Search Engine Phishing, Pharming, Spear Phishing, Whaling / CEO Fraud, Vishing, SMiSHing, Dropbox Phishing, Google Docs Phishing, Image Phishing, Piggybacking, Dumpster diving, Eavesdropping and many more. With different types of Malware like Computer viruses, Worms, Trojan horses, Ransomware, Spyware, Adware, Scareware, Keylogger, etc., you want to be aware of threats around you. The overall goal is to protect you from financial losses, identity theft, and damage to your reputation caused due to breaches of security by criminals.
The Texas Department of Information Resources (DIR) has approved a cybersecurity training program of CCAP for use by state and local government employees, in accordance with House Bill (HB) 3834.
In accordance with Section 2054.519, Texas Government Code, the Texas Department of Information Resources (DIR) has reviewed this cybersecurity training program and determined that it meets the required criteria. It is certified for state and local government employees. The certification is valid through August 31, 2022.
Why Companies & Individuals Need Cybersecurity Awareness Training?
FBI’s Internet Crime Complaint Center annual report says in 2019 US victims lost $3.5 billion, which does not include unreported losses. The benefits of investing in security awareness training outweigh the cost of a leak or breach. The following are some of the potential repercussions should your business fall victim to a cyber-attack:
- Loss of revenue
- Reputation damage
- Loss of clients
- Operational disruptions
- Intellectual property (IP) cyber theft
- Theft of personally identifiable information (PII)
- Compromised client data, sensitive business information, and equipment
This training is the first line of defense and can help the company prevent the above-mentioned problems.
Who should take this training?
Technology alone cannot protect you from cybercrime threats. Criminals tend to go where security is weakest. Humans are considered the weakest link in the chain. Humans are a link in the chain & the first line of defense.
This course is specifically designed for today’s computer users who a substantial portion of their time using the Internet extensively to work, study and play.
- Business owners
- Individuals applying for the first job in their life
With kids having access to the internet through cell phones, laptops, iPads & tablets at home, kids must take this training as criminals can use different techniques to hack into your home network, possibly leading to a breach.
Certified CyberSecurity Awareness Professional Course Objectives
The purpose of the CCAP certification program is to provide individuals with the essential knowledge and skills to protect their information assets. This class will immerse students in a learning environment where they will acquire a fundamental understanding of various computer and network security threats. Some examples include identity theft, online phishing scams, virus and backdoors, emails hoaxes, loss of confidential information, hacking attacks, and social engineering. More importantly, the skills learned from the class help students take the necessary steps to mitigate their security exposure.
After completing this training:
- Users will be aware of what “information security” means
- Users will be aware of the types of information (e.g. confidential, private, sensitive, etc.) they are responsible for safeguarding
- Users will be aware of the forms and locations of the information they are responsible for safeguarding
- Users will be aware of how to safeguard against unauthorized access to information, information systems, and secure facilities/locations.
- Users will be aware of how to safeguard against unauthorized use of information and information systems
- Users will be aware of best practices related to securely storing information
- Users will be aware of best practices related to securely disposing and sanitizing information and information systems.
- Users will be aware of the meaning of “threat” with regards to information security
- Users will be aware of common “threat actors” and their motivations.
- Users will be aware of the meaning of “risk” & “attack” with regards to information security
- Users will be aware of how to identify indicators for common attacks
- Users will be aware of how to respond to and report on common attacks or suspicious activity
What Does the Course Cover?
The course includes the following subject areas:
- Security Training and Its importance
- How does this training help?
- Breach Cost
- Bad Actors
- What is information security, risk, threats, attacks
- Information security: CIA
- Information security controls
Our Working Conditions
- Working Remotely
- Smart devices
- Threat Target – Humans
- Caller ID Spoofing
- One ring Phone scam
- IP Spoofing
- URL Spoofing
- Email address Spoofing
- IoT/Home Security
- Security While Traveling
Physical Security Concerns
- Dumpster Diving
- Portable Media Devices
- Email communications
- Phishing scams & Threats
- Deceptive Phishing
- Whaling / CEO Fraud
- W2 Phishing
- Search Engine Phishing
- Spear Phishing
- Dropbox Phishing
- Google Docs Phishing
- Image Phishing
- Protect against Identity Theft
- Examples of Social Engineering
- Personal Social Media
- Business Social Media
- Social Media & “BYOD”
- Computer viruses
- Trojan horses
- Signs of infection
- Password: Guidelines and Best Practices
- Two-factor Authentication
- Guidelines and Best Practices
- Is the link safe?
- Hover mouse before clicking
- Downloading safely
- VOIP Communications
- Advantages & disadvantages
- Phone scams
System and Device Security
- Operating System and Device Security
- Mobile devices
About the Exam
This course will prepare a candidate to sit for the CCAP Examination. Here is the essential information about the exam:
- Prerequisite: None
- Testing Center: Time-bound online tests can be taken from anywhere
- Number of Questions: 30
- Passing score: 80%
- Test duration: 30 Min
- Test Format: Multiple Choice
- Certificate Expiry: 2 Years
Training Options with Certification test
Slides with Audio: Yes
Avg Completion Time: 4 Hours / Course
Access: Online Access for 60 Days
Certificate of Completion: Yes
This format is a self-study environment that delivers the course content in a professionally narrated streaming format with self-paced slide information.
Virtual Classroom Live
If you are a group of more than 20 employees and want an instructor to provide this live online training through WebEx/Zoom then contact us for a quote.
To add CCAP certification credential to your LinkedIn profile, visit https://lnkd.in/binRJ4d&trk=email_url
If you have any questions, feel free to call us at 515-865-4591 or send us an email at Bob@hipaatraining.net