Our singular mission: To keep your enterprise safe.
Texcellent’s Cybersecurity Awareness Training course will equip your entire staff with the knowledge, skills and judgement to identify and avoid the wide variety of current and emerging threats to keep your corporate infrastructure and data safe. Our goal is to eliminate human error when using corporate computing resources.
The training educates information workers on password and device security, malware, spyware, virus threats, the use of two-factor authentication on email and social media accounts, phishing and social engineering attacks, social media security and social networking app security.
Who needs Cybersecurity Awareness Training?
In a nutshell: Every single employee that uses your company’s computing infrastructure!
The risks are everywhere: 11.5 million people worldwide are victims of cyber crimes, identity fraud and corporate espionage each year and that number is rising. The course has been specifically created with non-technical users in mind, to make complex information security best practices easy for everyone to understand and implement. After all, the best Cyber defense technologies like Firewalls and Anti-virus software are less than effective when the end users are not equipped with the right knowledge and skills to keep your company safe. Our training helps you to foster a security conscious culture within your company.
- Instruction by experienced instructors and industry experts.
- Course ware authored by leading security experts
- Hands-on exercises to reinforce concepts
- Periodic tests to confirm retention of concepts
- Certificate of completion
Practical skills you will learn:
Secure Access safeguards: Strong password guidelines. Choosing strong passwords that are easy to remember but tough to crack. Principles of information security (IS) including guidelines for strong passwords, safeguarding passwords from individuals, browsers and spyware. Benefits of two-factor authentication. Understand why accessing sites located at HTTPS web addresses versus those at HTTP addresses is safer.
Social Media Security: This module is designed to help employees protect themselves and the company data when they access the Internet and use social media on personal and employer-owned or maintained computers and mobile devices. Risks discussed include installing Social media networking apps that mine corporate address book, calendar and/or geo-location information. Risks of granting third-party apps and services access to your social networking accounts and location data. We also look at what type of information should never be shared publicly online, the most common way criminals obtain personally identifiable information and how to protect your employees and the company against identity theft.
Malware, Ransomware and Spyware: Explanation and case studies of the different attack methods commonly used individually and in combination with social engineering. How attackers use malicious software to disrupt/compromise your computer, mobile device or the entire corporate network to steal information.
Spam, Phishing and Spearphising: Techniques and exercises for recognizing and resisting phishing attempts of varying sophistication. How and where to report phishing attempts to local, State and Federal law enforcement authorities (FBI).
Social Engineering: Techniques for recognizing and resisting social engineering exploits that prey on human psychology. Exercises and checklist of actions to take when faced with Social Engineering attacks.
Email and messaging safety: Safety conscious best practices. Risks of granting third-party apps and services access to your mail and messaging accounts and vice versa.
Safe browsing practices: Best practices to safely browse the web. Understand how cookies work and benefits of incognito browsing. Use of VPN and encryption for extra safety and anonymity. Risks of browser plug-ins.
Mobile Device Security: Understand the implications of cross-application data sharing that includes contacts, calendar, call detail records, geolocation history, etc. Best practices to share minimal data between apps and the mobile OS.
Wifi Security: Best practices when using corporate and personal devices in shared public Wifi networks (Airports, hotels, restaurants, etc). Additional safeguards for international travelers.
Home Network Security: Best practices when using Corporate and personal devices while working from home.
Data security compliance requirements: Study of State, Federal and International compliance regulations when handling customer data (especially personally identifiable information) in a variety of industries (Healthcare, Financial services, education, retail, etc).
Case studies of Security breaches: Forensic, step by step study of factors leading up to the breach. Exercises to create check lists and procedures to safeguard against similar exploits.
Advanced Persistent Threat: The new reality of the Internet. Persistent nature of threats – constantly evolving and mutating. Lifelong learning and being vigilant.
Program Requirements and Enrollment Process:
a. Identify all the employees in your company that need the training.
b. Core Cybersecurity Awareness Training is 20 hours long and is delivered for four hours a day for one week (M-F). Additional modules covering advanced topics are available and may be taken depending on your company’s needs.
c. Flexible scheduling options are available. Training can either be done in the mornings (8 am to 12:00 noon) or in the afternoons (1pm to 5pm). We understand that it’s hard to take out employees for a whole day because of training, since work has to go on.
d. For optimal results, designate a training coordinator who will work with us to create trainee list, schedule the trainees, keep trainees informed of the training schedule and ensure that the training goals are met.
e. Trainees that miss training session(s) are required to take make-up sessions.
Live Online Training Highlights:
- Instructor-led, interactive training with hands-on exercises.
- Convenient timings – Training delivered in 4 hour blocks (mornings or afternoons)
Want to take this class? Let us know by clicking here.