Course curriculum

  • 1

    Course Introduction

    • Course Functionality

    • Cybersecurity Basics

    • Types of Cyber Attacks

  • 2

    Training and Education

    • What are Criminals After?

    • Working In Public

    • Keep The Crown Jewels Safe

    • Security Risks Working From Home

    • Online Dating Platforms?

    • Protecting Against Deep Fakes

    • Maintaining Security

    • Financial Crime Red Flags

  • 3

    Real Life Case Studies

    • Shared Security Attacks

    • Deep Fake Customer Impersonations

    • Dependency Attacks

  • 4

    Regulatory Requirements

    • Policies, Procedures, and Compliance

  • 5

    Course Completion

    • Quiz

    • Rules, Regulations, and References