Description
To register for Spanish version of this course, Click here
Note: The email that is used to register for the course will receive the login details. If you are registering for someone else, please use their email to register.
What Is Social Engineering Security Awareness Certification Training?
Security awareness training teaches you to spot fakes, avoid risks online, and use good cyber-hygiene practices at work and at home to protect themselves and their organization’s assets from loss or harm. Criminals take advantage of your trust, panic, greed, fear, and human error.
Your employees are the weak point in your security infrastructure. Make them your strength with our Certified CyberSecurity Awareness Professional (CCAP) Certification training.
Students learn how hackers use social engineering tools like spoofing, Deceptive Phishing, W2 Phishing, Search Engine Phishing, Pharming, Spear Phishing, Whaling / CEO Fraud, Vishing, SMiSHing, Dropbox Phishing, Google Docs Phishing, Image Phishing, Piggybacking, Dumpster diving, Eavesdropping and many more. With different types of Malware like Computer viruses, Worms, Trojan horses, Ransomware, Spyware, Adware, Scareware, Keylogger, etc., you want to be aware of threats around you. The overall goal is to protect you from financial losses, identity theft, and damage to reputation caused due to breach in security by criminals.
CCAP Approved as Certified Cybersecurity Training Program Under Texas House Bill (HB) 3834
The Texas Department of Information Resources (DIR) has approved cybersecurity training program of CCAP for use by state and local government employees, in accordance with House Bill (HB) 3834.
Why Companies & Individuals Need Social Engineering Awareness Training?
FBI’s Internet Crime Complaint Center annual report says in 2019 US victims lost $3.5 billion, which does not include unreported losses. The benefits of investing in security awareness training outweigh the cost of a leak or breach. The following are some of the potential repercussions should your business fall victim to a cyber-attack:
- Loss of revenue
- Reputation damage
- Loss of clients
- Operational disruptions
- Lawsuits
- Intellectual property (IP) cyber theft
- Theft of personally identifiable information (PII)
- Compromised client data, sensitive business information and equipment
This training is the first line of defense and can help the company prevent the above-mentioned problems.
Who should take Certified CyberSecurity Awareness Professional (CCAP) training?
Technology alone cannot protect you from cybercrime threats. Criminals tend to go where security is weakest. Humans are considered the weakest link in the chain. Humans are a link in the chain & the first line of defense.
This course is specifically designed for todays’ computer users who a substantial portion of their time using the Internet extensively to work, study and play.
- Employees
- Business owners
- Individuals applying for the first job in their life
- Seniors
- Parents
- Volunteers
- Kids
With kids having access to the internet through cell phones, laptops, iPads & tablets at home, kids must take this training as criminals can use different techniques to hack into your home network, possibly leading to a breach.
Certified CyberSecurity Awareness Professional Course Objectives
- Users will be aware of what “information security” means
- Users will be aware of the types of information (e.g. confidential, private, sensitive, etc.) they are responsible for safeguarding
- Users will be aware of how to identify social engineering tools used for deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
- Users will be aware of the forms and locations of the information they are responsible for safeguarding
- Users will be aware of how to safeguard against unauthorized access to information, information systems, and secure facilities/locations.
- Users will be aware of how to safeguard against unauthorized use of information and information systems
- Users will be aware of best practices related to securely storing information
- Users will be aware of best practices related to securely disposing and sanitizing information and information systems.
- Users will be aware of the meaning of “threat” with regards to information security
- Users will be aware of common “threat actors” and their motivations.
- Users will be aware of the meaning of “risk” & “attack” with regards to information security
- Users will be aware of how to identify indicators for common attacks
- Users will be aware of how to respond to and report on common attacks or suspicious activity
What Does the Course Cover?
The course includes the following subject areas:
Introduction
- Security Training and Its importance
- How does this training help?
- Breach Cost
- Bad Actors
- What is information security, risk, threats, attacks
- Information security: CIA
- Information security controls
Our Working Conditions
- Working Remotely
- Smart devices
- Threat Target – Humans
- Spoofing
- Caller ID Spoofing
- One ring Phone scam
- IP Spoofing
- URL Spoofing
- Email address Spoofing
- IoT/Home Security
- Security While Traveling
Physical Security Concerns
- Dumpster Diving
- Piggybacking
- Tailgating
- Eavesdropping
- Portable Media Devices
- Email communications
Social Engineering
- Phishing scams & Threats
- Deceptive Phishing
- Whaling / CEO Fraud
- W2 Phishing
- Search Engine Phishing
- Pharming
- Spear Phishing
- Vishing
- SMiSHing
- Dropbox Phishing
- Google Docs Phishing
- Image Phishing
- Protect against Identity Theft
- Examples of Social Engineering
Social Media
- Personal Social Media
- Business Social Media
- Social Media & “BYOD”
Malware
- Computer viruses
- Worms
- Trojan horses
- Ransomware
- Spyware
- Adware
- Scareware
- Keylogger
- Signs of infection
- Password: Guidelines and Best Practices
- Two-factor Authentication
Internet Security
- Guidelines and Best Practices
- Is the link safe?
- Hover mouse before clicking
- Downloading safely
- VOIP Communications
- Advantages & disadvantages
- Phone scams
System and Device Security
- Operating System and Device Security
- Mobile devices
- Cloud
About the Exam
This course will prepare a candidate to sit for the CCAP Examination. Here is the essential information about the exam:
- Prerequisite: None
- Testing Center: Time-bound online test can be taken from anywhere
- Number of Questions: 30
- Passing Score: 80{0b27dbd4f1eb987500121a7d3820b3dc1a5f9e41ac51e14b1ddc7e432d2b10af}
- Test Duration: 30 Min
- Test Format: Multiple Choice
- Certificate Expiry: 2 Years
Training Options with Certification Test
Online Self-Study
Slides with Audio: Yes
Self-Paced: Yes
Avg Completion Time: 4 Hours / Course
Access: Online Access for 60 Days
Certificate of Completion: Yes
View Sample Video of the Course
Certified CyberSecurity Awareness Professional Certification Training is rated 4.8 out of 5 by 487 users.
Theodore J. Cohen, PhD –
This course is a true tour de force when it comes to cybersecurity. The sponsors focus on the issues and threats that impact on all of us. How, and to what extent, you implement the information and advice provided will depend on your needs, risk tolerance, and ability to withstand the consequences should a threat materialize. The material is well organized and paced in such a way that the “student” has time to make notes. Whether you are a student, a person responsible for a household, retiree, employee, corporate official, or security officer, you will find the material here you can understand and, importantly, put to use immediately in your cyberenvironment.
Theodore J. Cohen, PhD