banner img

Cyber Etiquette: Journey to Safety

Title

Topic

Duration

Industry

Jurisdiction

Type

Description

Human error remains the most likely cause of cyber breaches, with phishing emails the no. 1 tactic used by attackers. In more sophisticated attacks, such as spear phishing attacks, emails will target individuals or organisations, being more personalised to include the victim or company's name. Such attacks can have a devastating impact, often resulting in sensitive information being compromised and financial repercussions. Through an interactive experience, learners will uncover a range of subjects including how scammers exploit oversharing on LinkedIn and how to set up secure accounts on popular services.

Course Objectives

  • How to keep you and your business safe online
  • What data scammers use to creating phishing and other attacks
  • Real-world impacts of cyber security breaches

Fill in your details below to instantly view the course for free.

This is a trial version of the course Cyber Etiquette: Journey to Safety Please note, we do not offer certificates for trial course completions.

By filling in this form you agree to share your information with VinciWorks. We take privacy seriously, click here to read our privacy notice.

Similar Courses

DORA: The Digital Operational Resilience Act

30 Minutes

NIS2: The EU's Cyber Security Directive

30 Minutes

Cyber Etiquette: Journey to Safety

10 Minutes

Cyber Security: Journey to Safety

30 Minutes

Cyber Risk: Journey to Safety

20 Minutes

Risk Management: Email@Risk HK

1 Hour

Cyber Security: Practical Applications (Hong Kong)

30 Minutes

Phishing in Action: An Interactive Knowledge Check

5 Minutes

Online Safety: Talking About Social Engineering

15 Minutes

Phishing Awareness: Talking about Digital Deception

15 Minutes

NIS2: An Implementation Guide

10 Minutes

Phishing Challenge: for the Financial Services Sector

5 Minutes

Cyber Security: Practical Applications for Students

20 Minutes

Cyber Security Adaptive

30 Minutes

Email@Risk (Law)

15 Minutes

Recognising Phishing Scams (Law)

10 Minutes

Password Safety (Law)

5 Minutes

Cyber Security: A Guide to Online Safety (Law)

30 Minutes

Recognising Phishing Scams (Higher Education)

5 Minutes

Cyber Security: A Student's Guide to Online Safety

30 Minutes

Social Media: Communicating Safely (Higher Education)

20 Minutes

Password Safety: A Guide for Faculty and Staff

5 Minutes

Setting a Secure Password

5 Minutes

Protecting Your Identity

5 Minutes

Understanding Social Engineering

5 Minutes

Phishing Awareness

5 Minutes

Consequences of Cybercrime

5 Minutes

Cyber Security: Phishing Knowledge Check

5 Minutes

Phishing Challenge 4.0

5 Minutes

Social Media: Communicating at Work

20 Minutes

Cyber Security: Passwords Knowledge Check

5 Minutes

Cyber Security: The Basics Knowledge Check

5 Minutes

Cyber Security: Social Engineering Knowledge Check

5 Minutes

Social Media Knowledge Check

5 Minutes

Phishing Challenge 2.0

5 Minutes

Phishing Challenge 3.0

5 Minutes

Cyber Knowledge Check

5 Minutes

Cyber Security: Practical Applications

20 Minutes

Phishing Challenge

5 Minutes

Ransomware

5 Minutes

Email@Risk

15 Minutes