Course Preview

Cyber Security Trailer Ridge Video

Play

Cyber Security: Phishing Video

Play

At a Glance

Course length: 
11-30
Course type:
Full Length Course
Category: 
Information Security Training
Audience: 
Managers
Topic: 
Cyber Security
Format: 
Video

Developed in collaboration with Ridge Global, this second course in the cyber security series outlines unique responsibilities for managers and should be delivered to managers after they have completed the Protect and Prevent course. Designed to quickly elevate individual manager knowledge about what is expected of them, and how they can support your organizations efforts, this course combines powerful video-based scenarios with challenging interactivities and practical tips that will make your cyber security compliance efforts more effective.

Download the Cyber Security Training Course Overview datasheet here ›

Course Details

  • Manager
Manager

Designed to quickly elevate individual manager knowledge about what is expected of them and how they can support your organization’s efforts, this course combines powerful video-based scenarios with challenging interactivities that will make your cyber security compliance efforts more effective.

Key Concepts Covered in This Course:30 min

A manager’s role in helping build and sustain a cyber-secure environment

The importance of educating employees through their entire employment lifecycle

Working closely with HR and IT to ensure that access and electronic resources are properly handled

Managing third party relationships with network access and audits

Risks associated with disregarding or downplaying a situation that should be reported

The importance of reporting and benefits that flow from early reporting

Reinforce this topic with these two micro learning courses

Get two FREE micro learning courses with the purchase of this full length course. NAVEX Global suggests these courses that pair well:

Anytime Anywhere: Mobile Computing

Watch as an employee unwittingly exposes himself and his organization to a hacker. Addresses risks presented by public Wi-Fi networks, the importance of taking care to ensure that other people are not able to see your computer screen, the obligation to limit the exchange of confidential information over unsecured networks, and best practices that will improve mobile computing security.

More details

It's in the Cloud: Cyber Risks & Cloud Computing

Learners are tasked with evaluating a situation involving cloud-based computing. Covers what cloud-based computing is, how cloud-based computing can create risk for an organization, expectation to follow IT rules and policies regarding cloud computing, obligations to treat the organization’s confidential and proprietary information (regardless of form) with great care, and cloud computing best practices.

More details