Cybersecurity Essentials

4.6 out of 5 rating

Jump to dates


1 Days

6 CPD hours

This course is intended for

Cybersecurity Essentials provides foundational knowledge in cybersecurity and is recommended for all non-technical professionals who wish to develop an understanding of cyber safety.


After completing this course, students will be able to:
Identify and reduce human errors that put organizations at risk for a cyber-attacks.
Define Ransomware, Phishing, and Data Breaches to understand the differences.
Identify the motives of hackers.
Assess how data breaches occur.
Develop a plan on how to protect accounts and privacy.
Create a strong and secure password.
Work in a secure manner while using remote Wi-Fi access.
Safely use Virtual Private Networks (VPN).
Identify vulnerabilities in home networks to keep them secure.
Identity different social engineering techniques e.g. phishing, vishing.
Detect social engineering attempts and prevent potential breaches.
Prevent hackers from accessing a Mobile phone.


Cybersecurity Essentials was developed using unparalleled learning methodology that prepares cadets for the Israeli Cyber and Intelligence Unit. It is designed to tackle human error by helping develop an advanced understanding and skills to protect individuals and organizations against the most common cyber threats.

  • Introduction to the world of cybersecurity; basic terminology, and why cybersecurity is so important. Review of famous cyber-attacks.
  • One of the most common elements linking cyber-attacks is compromised or weak credentials. Learn different ways hackers can acquire passwords, and what to do when accounts have been compromised. How to prevent such attacks including best protection methods and password management and introduction to tools for testing and creating strong passwords.
  • Evaluate main risks that arise when using public and non-protected Wi-Fi networks. Differentiate between private and public Wi-Fi networks, define what a VPN is and how to use it, and how to browse safely in remote environments.
  • How hackers take advantage of ?human-based vulnerabilities?. Define social engineering and the different types of attacks that can leverage social engineering, such as phishing or vishing. Learn how to detect social engineering attempts and prevent future breaches.
  • Minimize the risk of an attack on mobile device and understand basic security principles for mobile applications. Learn how to protect photos, browsing history, text messages, and confidential business information such as emails, documents, access permission and more.
Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

What people say about us

Find out more about this course

Interested in alternative dates? Would like to book a private session of this course for your company? Or for any other queries please simply fill out the form below.