(In-Person Delivery) CyberSAFE (Exam CBS-510): Cyber Safety in the Age of AI

Description

Overview:

Every time you check email, log into a cloud app, or perform any number of job tasks using technology, you're a potential target for cyber threats—and a critical line of defense.

This course empowers everyday technology users like you with the awareness and habits needed to protect yourself and your organization from these threats. You'll learn how to recognize threats, avoid common traps, and use today's digital tools—including artificial intelligence (AI)—more safely.

Whether you're in the office, at home, or on the move, you'll walk away from this course with the confidence to use technology more securely. And, you'll have the knowledge and skills to contribute to a strong culture of cybersecurity wherever you work.

Course Objectives:

In this course, you will identify many of the common risks involved in using computing technology, as well as ways to use it safely, to protect yourself from those risks. You will:

  • Use technology, including generative artificial intelligence (AI), responsibly.
  • Resist social-engineering attacks.
  • Secure devices such as desktops, laptops, tablets, smartphones, and more.
  • Use the Internet securely.

Target Student:

This course is designed for all users of computers, mobile devices, networks, and the Internet, to enable them to use technology more securely and minimize digital risks, regardless of technical ability.

This course is also designed to assist students in preparing for the CertNexus® CyberSAFE® (Exam CBS-510): Cyber Safety in the Age of AI credential.

Prerequisites:

To ensure your success in this course, you should have experience with the basic use of computing technology, including desktop, laptop, or tablet computers; mobile phones; and basic Internet functions, such as web browsing and email.

Course Content

Lesson 1: Using Technology Responsibly

Topic A: Follow Compliance Requirements

- What Is Security Compliance?

- Security Policies

- Incident Reporting

- Protected Data Types

- Legal Compliance Requirements

- Industry Compliance Requirements

- Consequences for Non-Compliance

- Following Compliance Requirements

Topic B: Use Generative AI Safely

- What Is Artificial Intelligence (AI)?

- Generative AI

- Generative AI Prompting

- Agentic AI

- Confabulation/Hallucination

- AI-Powered Scams

- Misinformation and Misleading Content

- Ethical Risks of Generative AI

- Legal Risks of Generative AI

- Generative AI Tools

- Guidelines for Using Generative AI Safely

- Using Generative AI Safely

Lesson 2: Resisting Social-Engineering Attacks

Topic A: Identify Social-Engineering Attacks

- Social Engineering

- Goals of Social Engineering

- Attack Vectors for Social Engineering

- High-Value Targets for Social Engineering

- Types of Social-Engineering Attacks

- Identifying Social-Engineering Attacks

Topic B: Defend Against Social-Engineering Attacks

- Resources to Defend

- Guidelines for Defending Against Social-Engineering Attacks

- Defending Against Social-Engineering Attacks

Lesson 3: Securing Devices

Topic A: Maintain Physical Security of Devices

- Physical Security of Devices

- Organizational Requirements for Device Security

- Digital Presence

- Guidelines for Maintaining Physical Security of Devices

- Maintaining Physical Security of Devices

Topic B: Use Wireless Devices Securely

- Wireless Communications

- Wi-Fi Network Types

- Common Risks of Wireless Networks

- IoT and Smart-Device Considerations

- Guidelines for Using Wireless Devices Securely

- Using Wireless Devices Securely

Topic C: Use Secure Authentication Methods

- Authentication

- Something You Know: Passwords, PINs, and Patterns

- Something You Have: Physical Devices and Authentication Apps

- Something You Are: Biometrics

- Guidelines for Using Secure Authentication Methods

- Using Secure Authentication Methods

Topic D: Protect Data

- Data Protection

- Data Backup

- Mobile-Device Considerations

- Guidelines for Protecting Data

- Protecting Data

Topic E: Defend Against Malware

- Malware

- Types of Malware

- Sources of Malware

- Guidelines for Defending Against Malware

- Defending Against Malware

Lesson 4: Using the Internet Securely

Topic A: Use Email Securely

- Email Security

- Common Email Risks

- Email Attachments

- Common Phishing Techniques

- Guidelines for Using Email Securely

- Using Email Securely

Topic B: Browse the Web Safely

- URL Structure

- HTTP vs. HTTPS

- Suspicious URLs

- Guidelines for Browsing the Web Safely

- Browsing the Web Safely

Topic C: Use Social Networks Securely

- Social Networking

- Common Risks of Social Networks

- Guidelines for Using Social Networks Securely

- Using Social Networks Securely

Topic D: Use Cloud Services Securely

- Cloud Services

- Common Risks of Cloud Services

- Guidelines for Using Cloud Services Securely

- Using Cloud Services Securely

Topic E: Ensure the Security of Remote Work

- Virtual Private Networks (VPNs)

- Remote Management

- Collaboration Platforms

- Security of Home Networks

- Guidelines for Ensuring the Security of Remote Work

- Ensuring the Security of Remote Work

Similar courses

This is a mixed version class, appropriate for anyone using Excel 2016/2019/2021/2023, as well as Office 365 subscribers with automatic updates from Microsoft. Attention will be given to nuances between the program versions as applicable for the students in each class. For those using 2013 and earlier, please contact your Learning Consultant before enrolling in class.

More Information

This is a mixed version class, appropriate for anyone using Excel 2016/2019/2021/2023, as well as Office 365 subscribers with automatic updates from Microsoft. Attention will be given to nuances between the program versions as applicable for the students in each class. For those using 2013 and earlier, please contact your Learning Consultant before enrolling in class.

More Information

Microsoft 365 for the Web (with Teams, SharePoint, and OneDrive). This is the best starting point for understanding how these three Microsoft products work together for the best possible organizational collaboration.

More Information

This is a mixed version class, appropriate for anyone using Excel 2016/2019/2021/2023, as well as Office 365 subscribers with automatic updates from Microsoft. Attention will be given to nuances between the program versions as applicable for the students in each class. For those using 2013 and earlier, please contact your Learning Consultant before enrolling in class.

More Information

This is a mixed version class, appropriate for anyone using Excel 2016/2019/2021/2023, as well as Office 365 subscribers with automatic updates from Microsoft. Attention will be given to nuances between the program versions as applicable for the students in each class. For those using 2013 and earlier, please contact your Learning Consultant before enrolling in class.

More Information

CompTIA Security+ Certification Prep (Exam SY0-701)

More Information

This is a 10 day CompTIA Security+ course. The first day and a half will be spent reviewing networking fundamentals content, and the remaining eight and a half days are spent doing a deeper dive into Security+ than the average CompTIA Security+ available in today's market.

More Information

This class is a terrific "beginner" level class to help users become familiar with Office 365 web apps. Specifically, this course will help someone understand how to use Teams, OneDrive, and SharePoint in their workflows - as well as when to use each specific web app.

More Information

Certified Information Security Manager (CISM), Accelerated 3-Day Version

More Information

Certified Information Security Manager (CISM), Extended 5-Day Version

More Information

So what about all those "other" Office 365 web apps. Are you using them? This one day course gives an overview on Teams, Planner, Forms, Stream, Sway, and a preview of Power Automate.

More Information

So what about all those "other" Office 365 web apps. Are you using them? This one day course gives an overview on Teams, Planner, Forms, Stream, Sway, and a preview of Power Automate.

More Information