(In-Person Delivery) CyberSAFE (Exam CBS-510): Cyber Safety in the Age of AI
Description
Overview:
Every time you check email, log into a cloud app, or perform any number of job tasks using technology, you're a potential target for cyber threats—and a critical line of defense.
This course empowers everyday technology users like you with the awareness and habits needed to protect yourself and your organization from these threats. You'll learn how to recognize threats, avoid common traps, and use today's digital tools—including artificial intelligence (AI)—more safely.
Whether you're in the office, at home, or on the move, you'll walk away from this course with the confidence to use technology more securely. And, you'll have the knowledge and skills to contribute to a strong culture of cybersecurity wherever you work.
Course Objectives:
In this course, you will identify many of the common risks involved in using computing technology, as well as ways to use it safely, to protect yourself from those risks. You will:
- Use technology, including generative artificial intelligence (AI), responsibly.
- Resist social-engineering attacks.
- Secure devices such as desktops, laptops, tablets, smartphones, and more.
- Use the Internet securely.
Target Student:
This course is designed for all users of computers, mobile devices, networks, and the Internet, to enable them to use technology more securely and minimize digital risks, regardless of technical ability.
This course is also designed to assist students in preparing for the CertNexus® CyberSAFE® (Exam CBS-510): Cyber Safety in the Age of AI credential.
Prerequisites:
To ensure your success in this course, you should have experience with the basic use of computing technology, including desktop, laptop, or tablet computers; mobile phones; and basic Internet functions, such as web browsing and email.
Course Content
Lesson 1: Using Technology Responsibly
Topic A: Follow Compliance Requirements
- What Is Security Compliance?
- Security Policies
- Incident Reporting
- Protected Data Types
- Legal Compliance Requirements
- Industry Compliance Requirements
- Consequences for Non-Compliance
- Following Compliance Requirements
Topic B: Use Generative AI Safely
- What Is Artificial Intelligence (AI)?
- Generative AI
- Generative AI Prompting
- Agentic AI
- Confabulation/Hallucination
- AI-Powered Scams
- Misinformation and Misleading Content
- Ethical Risks of Generative AI
- Legal Risks of Generative AI
- Generative AI Tools
- Guidelines for Using Generative AI Safely
- Using Generative AI Safely
Lesson 2: Resisting Social-Engineering Attacks
Topic A: Identify Social-Engineering Attacks
- Social Engineering
- Goals of Social Engineering
- Attack Vectors for Social Engineering
- High-Value Targets for Social Engineering
- Types of Social-Engineering Attacks
- Identifying Social-Engineering Attacks
Topic B: Defend Against Social-Engineering Attacks
- Resources to Defend
- Guidelines for Defending Against Social-Engineering Attacks
- Defending Against Social-Engineering Attacks
Lesson 3: Securing Devices
Topic A: Maintain Physical Security of Devices
- Physical Security of Devices
- Organizational Requirements for Device Security
- Digital Presence
- Guidelines for Maintaining Physical Security of Devices
- Maintaining Physical Security of Devices
Topic B: Use Wireless Devices Securely
- Wireless Communications
- Wi-Fi Network Types
- Common Risks of Wireless Networks
- IoT and Smart-Device Considerations
- Guidelines for Using Wireless Devices Securely
- Using Wireless Devices Securely
Topic C: Use Secure Authentication Methods
- Authentication
- Something You Know: Passwords, PINs, and Patterns
- Something You Have: Physical Devices and Authentication Apps
- Something You Are: Biometrics
- Guidelines for Using Secure Authentication Methods
- Using Secure Authentication Methods
Topic D: Protect Data
- Data Protection
- Data Backup
- Mobile-Device Considerations
- Guidelines for Protecting Data
- Protecting Data
Topic E: Defend Against Malware
- Malware
- Types of Malware
- Sources of Malware
- Guidelines for Defending Against Malware
- Defending Against Malware
Lesson 4: Using the Internet Securely
Topic A: Use Email Securely
- Email Security
- Common Email Risks
- Email Attachments
- Common Phishing Techniques
- Guidelines for Using Email Securely
- Using Email Securely
Topic B: Browse the Web Safely
- URL Structure
- HTTP vs. HTTPS
- Suspicious URLs
- Guidelines for Browsing the Web Safely
- Browsing the Web Safely
Topic C: Use Social Networks Securely
- Social Networking
- Common Risks of Social Networks
- Guidelines for Using Social Networks Securely
- Using Social Networks Securely
Topic D: Use Cloud Services Securely
- Cloud Services
- Common Risks of Cloud Services
- Guidelines for Using Cloud Services Securely
- Using Cloud Services Securely
Topic E: Ensure the Security of Remote Work
- Virtual Private Networks (VPNs)
- Remote Management
- Collaboration Platforms
- Security of Home Networks
- Guidelines for Ensuring the Security of Remote Work
- Ensuring the Security of Remote Work