Awareness

 
Free Cybersecurity Awareness Training


A collection of web-based Cybersecurity Awareness Training Courses from leading providers





Powered by 

http://www.cofense.com




CYBERSECURITY AWARENESS COURSES (Italian)



http://gdaverio.unaux.com/_awareness/CBT_Cybersecurity_Awareness_Italian_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Data_Protection_V4_Italian_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Insider_Threats_Italian_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Advanced_Spear_Phishing_Italian_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_BEC_Scams_Italian_V4_HTML5_VO/index_scorm.html

http://gdaverio.unaux.com/_awareness/CBT_Cloud_Computing_Italian_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Malicious_Links_Italian_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Malware_Italian_v4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Mobile_Devices_Italian_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Passwords_Italian_V4_HTML5_VO/index_scorm.html

http://gdaverio.unaux.com/_awareness/CBT_Physical_Security_Italian_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Ransomware_Italian_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Security_Outside_the_Office_Italian_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Social_Engineering_Italian_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Social_Networking_Italian_V4_HTML5_VO/index_scorm.html

http://gdaverio.unaux.com/_awareness/CBT_Spear_Phishing_Italian_v4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Surfing_the_Web_Italian_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_General_Phishing_Italian_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Internet_of_Things_V4_HTML5_Italian_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_GDPR_Italian_v2_HTML5_VO/index_scorm.html


Il modulo Spear phishing avanzato include argomenti come: identificare tre tipi di tecniche di spear phishing avanzato, identificare gli indicatori di un’e-mail di spear phishing avanzato e sapere cosa fare se si è l’obiettivo dell’attacco.

Il modulo Attacchi Business Email Compromise (BEC) include argomenti come: identificare gli attacchi BEC, distinguere tra i tre tipi di attacchi BEC principali e segnalare un attacco sospetto.

Il modulo Cloud Computing permetterà di distinguere il desktop dal cloud computing, identificare i vantaggi e gli svantaggi del cloud computing e infine descrivere numerose procedure consigliate per l’utilizzo sicuro del cloud.

La lezione è stata concepita con la finalità di aumentare la consapevolezza sui metodi per evitare le minacce online, sviluppate per colpire te o la nostra organizzazione, come identificare le minacce online comuni, comprendere i fattori di rischio per ciascun tipo di minaccia ed essere in grado di agire in modo tale da ridurre al minimo il rischio di un attacco.

Il modulo Protezione dei dati include argomenti come: le responsabilità degli utenti in merito alla privacy dei dati, gli standard di distruzione dei dati e i pericoli legati al lasciare in vista informazioni private e riservate.

Phishing genericoI moduli sul Phishing generico trattano i seguenti argomenti: differenze tra spam, phishing e spear phishing; cosa fare per ridurre al minimo il rischio di un attacco di phishing; come identificare gli indicatori di un messaggio e-mail di phishing.

Il modulo Minacce interne include argomenti come: il pericolo delle minacce interne, i tre tipi di minaccia interna e come agire in caso di attività sospette.

Internet delle coseNel modulo Internet delle cose (IoT) vengono trattati i seguenti argomenti: definizione del concetto di Internet delle cose, identificazione di vantaggi e svantaggi di questi dispositivi e procedure consigliate per utilizzare in modo sicuro questi dispositivi.

Il modulo Collegamenti pericolosi include argomenti come: motivi per cui i link possono essere pericolosi, come identificare i componenti di un link e scomporre le parti di un URL e capire come agire nel caso in cui si riceva un collegamento pericoloso.

Il modulo Malware include argomenti come: cos’è un malware, tipologie comuni di malware, come viene utilizzato un malware e il valore e le limitazioni dei software antivirus.

Il modulo Dispositivi mobili include argomenti come: modalità con cui vengono diffusi i malware sul dispositivo mobile, come proteggere il proprio dispositivo mobile, come agire in caso di perdita o furto del dispositivo.

Il modulo Password include argomenti come: i diversi attacchi cibernetici che possono compromettere la password, come creare una password efficace, come gestire le password e come l’autenticazione a più fattori consente di proteggere l’account.

Il modulo Sicurezza fisica include argomenti come: il pericolo del furto di dispositivi, perché si può essere vittima del furto di un dispositivo, cos’è la sicurezza fisica e le procedure per potenziare la sicurezza del proprio dispositivo.

Il modulo Ransomware include argomenti come: cos’è un ransomware e come viene trasmesso, l’effetto di un ransomware, come ridurre al minimo la minaccia di ransomware e come segnalare gli attacchi di ransomware.

Il modulo Sicurezza fuori dall’ufficio include argomenti come: i metodi di attacco che mettono a rischio le informazioni, i rischi legati all’uso di dispositivi mobili portatili, la differenza tra una rete pubblica e una rete sicura e come agire in caso di perdita o furto del dispositivo.

Il modulo Social Engineering include argomenti come: differenza tra un attacco tecnico e non tecnico, tipologie diverse di social engineering e come agire se si è colpiti da attacchi di social engineering.

Il modulo Social networking include argomenti quali: come possono essere utilizzate contro l’utente le informazioni pubblicate online, come le app possono rendere l’utente vulnerabile, cosa rende un sito un social network e infine come utilizzare le impostazioni di privacy.

Il modulo Spear phishing include argomenti come: perché lo spear phishing rappresenta una minaccia per la nostra organizzazione, i tre tipi di e-mail di spear phishing e le caratteristiche tipiche di un messaggio e-mail di spear phishing.

Il modulo Navigazione sul Web include argomenti come: navigare sul Web in modo sicuro, siti Web sicuri, come identificare ed evitare siti e collegamenti pericolosi.

Il modulo GDPR include le principali informative rivolte all'utente adibito al trattamento di dati rilevanti ai fini della normativa europea sul GDPR. 





CYBERSECURITY AWARENESS COURSES (English)



http://gdaverio.unaux.com/_awareness/CBT_Cybersecurity_Awareness_English_V4_HTML5/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Data_Protection_V4_English_HTML5/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Insider_Threats_English_V4_HTML5/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Advanced_Spear_Phishing_English_V4_HTML5/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_BEC_Scams_English_V4_HTML5_VO/index_scorm.html

http://gdaverio.unaux.com/_awareness/CBT_Cloud_Computing_English_HTML5/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Malicious_Links_English_V4_HTML5/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Malware_English_v4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Mobile_Devices_English_V4_HTML5/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Passwords_English_V4_HTML5/index_scorm.html

http://gdaverio.unaux.com/_awareness/CBT_Physical_Security_English_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Ransomware_English_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Security_Outside_the_Office_English_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Social_Engineering_English_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Social_Networking_English_V4_HTML5_VO/index_scorm.html

http://gdaverio.unaux.com/_awareness/CBT_Spear_Phishing_English_v4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Surfing_the_Web_English_V4_HTML5/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_General_Phishing_English_V4_HTML5_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_Internet_of_Things_V4_HTML5_English_VO/index_scorm.html     http://gdaverio.unaux.com/_awareness/CBT_GDPR_English_v2_HTML/index_scorm.html


The Advanced Spear Phishing module covers topics on: identifying three types of advanced spear phishing techniques, identifying indicators of an advanced spear phishing email, and understanding what to do if you are the target.

The Business Email Compromise (BEC) Scams module covers topics on: identifying BEC scams, differentiating between the three main types of BEC scams, and reporting a suspected attack.

The Cloud Computing module covers topics on: the difference between desktop and cloud computing, advantages and disadvantages of cloud computing, and best practices for using the cloud safely.

The Cybersecurity Awareness module covers topics on: how to avoid online threats, understanding risk factors for each type of threat, and minimizing risk of an attack.

The Data Protection module covers topics on: your responsibilities toward data privacy, data destruction standards, and dangers of leaving private/confidential information out in the open.

The General Phishing modules covers topics on: the differences between spam, phishing, and spear phishing; what you can do to minimize the risk of a phishing attack; and how to identify indicators of a phishing email.

The Insider Threats module covers topics on: danger insider threats pose, the three types of insider threats, and what to do if you observe suspicious activity.

The Internet of Things module covers topics on: the definition of Internet of Things, identifying the advantages and disadvantages of these devices, and describe best practices for using these devices safely.

The Malicious Links module covers topics on: why links can be dangerous, how to identify the components of a link and break down the parts of a URL, and what to do if you are targeted with a malicious link.

The Malware module covers topics on: what malware is, common varieties of malware, how malware is used, and the value and limitations of anti-virus software.


The Mobile Devices module covers topics on: how malware is delivered to your mobile device, ways to protect your device, and what to do if your device is lost or stolen.

The Passwords module covers topics on: the different cyber-attacks that put your password at risk, what constitutes a strong password, how to manage your passwords, and how multi-factor authentication keeps your account safer.

The Physical Security module covers topics on: the danger of theft of a device, why you might be a target for device theft, what is physical security, and steps that will enhance the security of your device.

The Ransomware module covers topics on: what ransomware is and how it is delivered, ransomware's effect, minimizing the threat of ransomware, and reporting ransomware attacks.

The Security Outside the Office module covers topics on: attack methods that put your information at risk, the risks of using a portable storage device, the difference between a public and a secure network, and what to do if your device is lost or stolen.

The Social Engineering module covers topics on: difference between a technical and non-technical attack, different types of social engineering, and what to do if you are the target of a social engineering scam.

The Social Networking module covers topics on: how information posted online can be used against you, how apps can make you vulnerable, what makes a site a social network, and how to utilize privacy settings.

The Spear Phishing module covers topics on: why spear phishing poses a threat to our organization, the three types of spear phishing emails, and the indicators of a spear phishing email.

The Surfing the Web module covers topics on: safe web surfing, secure websites, and how to identify and avoid malicious sites and links.

The GDPR module includes the main information addressed to the user involved in the processing of data relevant for the purposes of the European legislation on the GDPR.





CYBERSECURITY AWARENESS MICROCOURSES (English)


Be Careful With Information Microlearning
An overview of Information safety including the use of public networks, securely disposing of information, encrypting data, keeping personal and business information separate.

An overview of brand impersonation including popular narratives from online shopping, shared documents, social networking, shipping, and banking.

An overview of General Phishing including a short video and knowledge check.

An overview of Information Classifications including, confidential, restricted, internal, and public information.

An overview of Malware including spyware, ransomware, bots, rootkits, viruses, and more.

An overview of Mobile Device security including backups, keeping applications up to date, and using a VPN.

An overview of Passwords including the use of complex, random, unique passwords, as well as, changing passwords and use of multifactor authentication.

An overview of Phishing and Emotions including a short video and knowledge check.

An overview of Phishing including the use of security updates, scanned documents, urgent statements, unpaid invoices, and order confirmation emails.

An overview of Phishing versus Spear Phishing including a short video and knowledge check.

An overview of Ransomware including a short video and knowledge check.

An overview of Risk Management to identify, protect, detect, respond and recover from potential cyber or physical threats.

An overview of Social Engineering including pretexting, baiting, mind games, and quick tips.

An overview of vishing including pretexting, emotional appeals, priming the recipient, and what you can do to do to avoid the traps.

An overview of working outside the office including using a VPN, being aware of your surroundings, being prepared for a lost or stolen device, and locking your device.






CYBERSECURITY AWARENESS GAMES (English)



http://gdaverio.unaux.com/_awareness/Games/honeycomb_5_10_2018/index_scorm.html

Honey Comb Challenge
Test your knowledge by answering questions about cybersecurity and phishing topics. Start at the first cell on the left. Select adjoining cells to move across the board. If you answer incorrectly, you must start over. Once you make it to the right side of the board, you win the game.


http://gdaverio.unaux.com/_awareness/Games/Indicators_of_a_Phish_5_10_2018/index_scorm.html

Indicators of a Phish
Investigate the email and answer the prompts. If you score more than 80% you win the game.


http://gdaverio.unaux.com/_awareness/Games/Phishing_Category_Challenge_5_102018/index_scorm.html

Category Challenge
Test your knowledge by answering questions about passwords, malicious links, spear phishing, malware and social engineering. Collect enough points to win the game.


http://gdaverio.unaux.com/_awareness/Games/Resiliency_Quiz_Cofense_5_10_2018/index_scorm.html

Resiliency Quiz
Resilience is an indicator of how well recipients are conditioned to not interact with phishing emails.   Take this quiz to assess your awareness of habits that may make you vulnerable to targeted phishing or malware and learn tips to make you more resilient.


http://gdaverio.unaux.com/_awareness/Games/ToCatchAThreat_5_10_2018/index_scorm.html

To Catch a Threat
Taken from real phishing emails, click each indicator within the email and then report each phishing email using the Report Phishing button. Each email has 2-3 indicators displayed. Each correct response receives 5 points, you must score 50 points to win.





#cybersecurity #cyber #security #compliance #free #awareness #training #education