Security Awareness and Risk Management

This 1-year access course offers a dynamic and visual introduction to how modern cyberattacks unfold, tailored specifically for non-technical audiences. Through real-life inspired scenarios and step-by-step narrative walkthroughs, participants will witness how a cyberattack develops — from the early stages of online reconnaissance, to phishing, deception, malware delivery, data exfiltration, and final impact on organizations and individuals.

Each case shows the consequences of small security oversights, like trusting a legitimate-looking link or not verifying a domain name. As the story unfolds, students observe how data gets stolen, systems are encrypted, and the aftermath affects stock prices, reputation, and even legal outcomes.

By the end of the course, attendees will have a strong sense of how attackers operate, what red flags to look out for, and how to apply simple but critical awareness habits in daily work and life. This course is ideal for employees, managers, or individuals looking to develop a culture of cybersecurity awareness in any environment.

Course curriculum

    1. Introduction to Security Awareness

    2. Fundamentals of Cybersecurity Part I

    3. Fundamentals of Cybersecurity Part II

    4. Fundamentals of Cybersecurity Part III

    5. Fundamentals of Cybersecurity Part IV

    6. Threat Landscape

    7. Case Scenario No. 1

    8. Case Scenario No. 1 Analysis Part I

    9. Case Scenario No. 1 Analysis Part II

    10. Real Case Studies

    11. Social Engineering Part I

    12. Social Engineering Part II

    13. Social Engineering Part III

    14. Phishing Attack Samples Part I

    15. Phishing Attack Samples Part II

    16. Case Scenario No. 2

    17. Case Scenario No. 3

    1. Introduction to Risk Management

    2. Risk Management Key Concepts and Terminology Part I

    3. Risk Management Key Concepts and Terminology Part II

    4. Risk Management Key Concepts and Terminology Part III

    5. Risk Assessment Part I

    6. Risk Assessment Part II

    7. Risk Management Strategy Part I

    8. Risk Management Strategy Part II

    9. Risk Management Strategy Part III

    10. Identify Risks

    11. Threat Modeling

    12. Qualitative and Quantitative Analysis

    13. Mitigating Risk

About this course

  • 30 lessons
  • 7.5 hours of video content

Requirements

There are no requirements for this training.