Search our courses
Training

 

Regardless of your computer experience, this CyberSAFE training course which is accredited by CertNexus (the certification body) will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

 

This course will help you to:

  • Understand security compliance needs and requirements.
  • Recognize and avoid phishing and other social engineering.
  • Recognize and avoid viruses, ransomware, and other malware.
  • Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.

In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely.

 

Objectives:

In this course, you will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect yourself from those risks.

 

You will:

  • Identify the need for security.
  • Secure devices like desktops, laptops, smartphones, and more.
  • Use the Internet securely.

 

CyberSAFE

Course Code

GTCS

Duration

3 Hours eLearning

Course Fee

POA

Accreditation

Certified CyberSAFE Certificate

 

This course is designed for you to prepare for the Certified CyberSAFE credential which is accredited by CertNexus. You can obtain your Certified CyberSAFE certificate by completing the Certified CyberSAFE credential process on the CHOICE platform following the course presentation. This is an eLearning course with a certification exam at the end.

Target Audience

  • Take CyberSAFE Readiness Assessment
  • This CyberSAFE training course is designed for you as a non-technical end user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks. This course is also designed for you to prepare for the Certified CyberSAFE credential. You can obtain your Certified CyberSAFE certificate by completing the Certified CyberSAFE credential process on the CHOICE platform following the course presentation.

Attendee Requirements

  • To ensure your success in this course, you should have experience with the basic use of conventional end-user technology, including desktop, laptop, or tablet computers; mobile phones; and basic Internet functions, such as web browsing and email.

Ways to Attend this Course

Expand all

Course Description

 

Regardless of your computer experience, this CyberSAFE training course which is accredited by CertNexus (the certification body) will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them.

 

This course will help you to:

  • Understand security compliance needs and requirements.
  • Recognize and avoid phishing and other social engineering.
  • Recognize and avoid viruses, ransomware, and other malware.
  • Help ensure data security on computers, mobile devices, networks, the Internet, and in the cloud.

In this course, you will use discussions, case studies, and the experiences of your instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely.

 

Objectives:

In this course, you will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect yourself from those risks.

 

You will:

  • Identify the need for security.
  • Secure devices like desktops, laptops, smartphones, and more.
  • Use the Internet securely.

 

Course Outline

Lesson 1: Identifying the Need for Security

Topic A: Identify Security Compliance Requirements

Topic B: Recognize Social Engineering and Avoid Phishing and Other Attacks

Lesson 2: Securing Devices

Topic A: Maintain Physical Security of Devices

Topic B: Use Passwords for Security

Topic C: Protect Your Data

Topic D: Identify and Mitigate Viruses, Ransomware, and Other Malware

Topic E: Use Wireless Devices Securely

Lesson 3: Using the Internet Securely

Topic A: Browse the Web Safely

Topic B: Use Email Securely

Topic C: Use Social Networking Securely

Topic D: Use Cloud Services Securely

Appendix A: Mapping Course Content to CyberSAFE 2019: Exam CBS-310

Exam
  • This is an eLearning course with a certification exam at the end.

  • Mapping Course Content to CyberSAFE 2019: Exam CBS-310
Learning Path
  • There are several options that may suit your business needs. Please contact us for further information.
Ways to Attend
  • You can take a 3-hour eLearning course anytime that suits you. If you have large teams for training we would be delighted to offer volume discounts and assist you with implementing your eLearning programme throughout your organisation.
  • Private onsite Team training also available, please contact us to discuss. We can customise this course to suit your business requirements.

Private Team Training is available for this course

We deliver this course either on or off-site in various regions around the world, and can customise your delivery to suit your exact business needs. Talk to us about how we can fine-tune a course to suit your team's current skillset and ultimate learning objectives.

Private Team Training | Contact us

Technical ICT learning & mentoring services

Private Team Training

Our instructors are specialist consultants with vast real world experience and expertise allowing them to design and deliver client-focused courses for your organisation.

Learn more about our Private Team Training

What Our Clients Say

“Given the breadth of the course, I think it was very well structured and organised, I got a lot
out of it.”     

 

JVM Tuning - Bespoke Course

Live Online - May 2020

 

“This was an excellent course and was lots of fun to attend. Instructor started with basic intro to
containerization, then explained Kubernetes and the different components (Container
engine, orchestrator, control plane) which all made sense because of the containerization
intro. The parts of the course layered on top of one another to give a good understanding of
Kubernetes.”

 

Kubernetes for App Developers - GTLFKAD

Live Online - Nov 2020

 

“Really enjoyed the course, it has been an eye opener on opportunities to steer how we approach the cloud from a IT Service Management perspective.”

 

Professional Cloud Service Manager - GTC13

Live Online May 2020

 

''Fantastic course, looking forward to applying this in my work and home life. Excellent, practical approach, very motivational. I think the entire company should attend training.''

 

Being Agile in Business - GTBAB

Sept 2019

“The instructor was great! I didn't expect such a good level of teaching with what some may
consider a dry subject. This was simply great!”  

 

Linux LPIC-1 - GTU8

Live Online - August 2020

 

"Intelligence is the ability to avoid doing work, yet
getting the work done"

Linus Torvalds, creator of Linux and GIT

Technical ICT learning & mentoring services

About GuruTeam

GuruTeam is a high-level ICT Learning, Mentoring and Consultancy services company. We specialise in delivering instructor-led on and off-site training in Blockchain, Linux, Cloud, Big Data, DevOps, Kubernetes, Agile, Software & Web Development technologies. View our Testimonials

Download our eBrochure
Our Accreditation Partners
  •  
  •  
  •  

 

Upcoming Courses

Kubernetes Administration

26 July - 29 July 2021

Live Online

This Kubernetes Administration Certification training course is suitable for anyone who wants to learn the skills necessary to build and administer a Kubernetes cluster

Learn More

LPIC-1 PART 1

22 - 25 June 2021 

Live Online

This Linux certification training course teaches in-depth skills in the basics of Linux Administration.
 

Learn More

PROFESSIONAL CLOUD SERVICE MANAGER

22 - 23 June 2021

Live Online

The Cloud Service Manager course enables participants to design and deliver cloud services. Exam prep on day 3.

Learn More

 INTRO TO PYTHON 3

July 20 – 22 2021

Live Online        

A comprehensive introduction to the core syntax and functions provided by Python, including coverage of its object-oriented and functional programming features.

Learn More

Newsletter

Stay up to date, receive updates on scheduled dates, new courses, offers, and events.

Subscribe to our Newsletter