Secura Bundle 4 - Access Control & Social Media

 

Objectives

1. E-learning module: Physical Security (10’)

After the training you will be able to answer the following questions:
  • What is physical security?
  • Why is physical security important?
  • How do you contribute to physical security yourself?

2. Security flash: Strong passwords (3’)

After the awareness video you will be able to answer the following questions:
  • What is a strong password?
  • How do you ensure that your password is easy to remember, but difficult to guess?

3. Microlearning: Use of passwords (3’)

After the training you will be able to answer the following questions:
  • How do you create passwords that are easy to remember?
  • How do you securely manage all your different passwords?

4. Microlearning: Internet of Things (IoT, 7’)

After the training you will be able to answer the following questions:
  • What is the IoT?
  • How do IoT devices infect company equipment?
  • What are the risks of the IoT?
  • How do you deal with the weak spots of the IoT?

5. Security flash: Access control (4’)

After the awareness video you will be able to answer the following questions:
  • What should you do with your access badge?
  • How do you deal with visitors?

6. E-learning module: Social engineering (7’)

After the training, you will be able to answer the following questions: 
  • What is social engineering?
  • Which characteristics does a social engineering attack have?
  • How do you protect yourself against a social engineering attack?

Who the course is for

All employees who require training on practical information security tips.

Course Contents

1. E-learning module: Physical Security (10’)

Physical security protects the people and properties of an organization, but also information. Besides technical security, information also needs physical security. The most important threats, against which physical security protects an organization, are intentional threats from people. Examples are theft and accidental access. In this training, you will learn which measures an organization can take to ensure physical security and what your role is in this.

2. Security flash: Strong passwords (3’)

We all know that we have to use strong passwords, because weak passwords are easy to guess. When a cybercriminal has got his hands on a password, he has access to confidential information. This awareness video teaches you how you can create strong passwords, what the dangers of a weak password are and how you manage your passwords in a secure way.

3. Microlearning: Use of passwords (3’)

The security policy starts with a good password. Strong passwords ensure that unauthorized people do not have access to sensitive information. This microlearning explains in a few minutes what the risks of using passwords are and how you create a strong, easy to remember password.

4. Microlearning: Internet of Things (IoT, 7’)

There are more and more 'smart' devices that form a network via the internet, such as smartwatches and external hard disks. Many of these devices are not properly secured. Hacked or infected 'smart' devices are a threat to company devices. It is often unclear which person within the organization is responsible for securing these 'smart' devices. In this micro-learning you learn how you, as an employee, can work as safely as possible with IoT devices.

5. Security flash: Access control (4’)

This video shows why access control is important for the protection of information. The use of an access pass enhances the security of a building because only people with a pass have direct access. It also provides insights into who is present in the building. In case of calamities, that is important information to have. Therefore, always immediately report the loss of a pass to the department or person responsible.

6. E-learning module: Social engineering (7’)

A social engineer manipulates the weakest link in information security: people. He tries to get access to information in various ways, so that he can change it or use it for criminal purposes. In this training, you learn how a social engineer operates and how you can recognize a social engineering attack.