Description

To register for Spanish version of this course, Click here

Note: The email that is used to register for the course will receive the login details. If you are registering for someone else, please use their email to register.

What Is Social Engineering Security Awareness Certification Training?

Security awareness training teaches you to spot fakes, avoid risks online, and use good cyber-hygiene practices at work and at home to protect themselves and their organization’s assets from loss or harm. Criminals take advantage of your trust, panic, greed, fear, and human error.

Your employees are the weak point in your security infrastructure. Make them your strength with our Certified CyberSecurity Awareness Professional (CCAP) Certification training.

Students learn how hackers use social engineering tools like spoofing, Deceptive Phishing, W2 Phishing, Search Engine Phishing, Pharming, Spear Phishing, Whaling / CEO Fraud, Vishing, SMiSHing, Dropbox Phishing, Google Docs Phishing, Image Phishing, Piggybacking, Dumpster diving, Eavesdropping and many more. With different types of Malware like Computer viruses, Worms, Trojan horses, Ransomware, Spyware, Adware, Scareware, Keylogger, etc., you want to be aware of threats around you. The overall goal is to protect you from financial losses, identity theft, and damage to reputation caused due to breach in security by criminals.

CCAP Approved as Certified Cybersecurity Training Program Under Texas House Bill (HB) 3834

The Texas Department of Information Resources (DIR) has approved cybersecurity training program of CCAP  for use by state and local government employees, in accordance with House Bill (HB) 3834.

Why Companies & Individuals Need Social Engineering  Awareness Training?

FBI’s Internet Crime Complaint Center annual report says in 2019 US victims lost $3.5 billion, which does not include unreported losses. The benefits of investing in security awareness training outweigh the cost of a leak or breach. The following are some of the potential repercussions should your business fall victim to a cyber-attack:

  • Loss of revenue
  • Reputation damage
  • Loss of clients
  • Operational disruptions
  • Lawsuits
  • Intellectual property (IP) cyber theft
  • Theft of personally identifiable information (PII)
  • Compromised client data, sensitive business information and equipment

This training is the first line of defense and can help the company prevent the above-mentioned problems.

Who should take Certified CyberSecurity Awareness Professional (CCAP) training?

Technology alone cannot protect you from cybercrime threats. Criminals tend to go where security is weakest. Humans are considered the weakest link in the chain. Humans are a link in the chain & the first line of defense.

This course is specifically designed for todays’ computer users who a substantial portion of their time using the Internet extensively to work, study and play.

  • Employees
  • Business owners
  • Individuals applying for the first job in their life
  • Seniors
  • Parents
  • Volunteers
  • Kids

With kids having access to the internet through cell phones, laptops, iPads & tablets at home, kids must take this training as criminals can use different techniques to hack into your home network, possibly leading to a breach.

Certified CyberSecurity Awareness Professional Course Objectives

  • Users will be aware of what “information security” means
  • Users will be aware of the types of information (e.g. confidential, private, sensitive, etc.) they are responsible for safeguarding
  • Users will be aware of how to identify social engineering tools used for deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes. 
  • Users will be aware of the forms and locations of the information they are responsible for safeguarding
  • Users will be aware of how to safeguard against unauthorized access to information, information systems, and secure facilities/locations.
  • Users will be aware of how to safeguard against unauthorized use of information and information systems
  • Users will be aware of best practices related to securely storing information
  • Users will be aware of best practices related to securely disposing and sanitizing information and information systems.
  • Users will be aware of the meaning of “threat” with regards to information security
  • Users will be aware of common “threat actors” and their motivations.
  • Users will be aware of the meaning of “risk” & “attack” with regards to information security
  • Users will be aware of how to identify indicators for common attacks
  • Users will be aware of how to respond to and report on common attacks or suspicious activity

What Does the Course Cover?

The course includes the following subject areas:

Introduction

  • Security Training and Its importance
  • How does this training help?
  • Breach Cost
  • Bad Actors
  • What is information security, risk, threats, attacks
  • Information security: CIA
  • Information security controls

Our Working Conditions

  • Working Remotely
  • Smart devices
  • Threat Target – Humans
    • Spoofing
    • Caller ID Spoofing
    • One ring Phone scam
    • IP Spoofing
    • URL Spoofing
    • Email address Spoofing
  • IoT/Home Security
  • Security While Traveling

Physical Security Concerns

  • Dumpster Diving
  • Piggybacking
  • Tailgating
  • Eavesdropping
  • Portable Media Devices
  • Email communications

Social Engineering

  • Phishing scams & Threats
  • Deceptive Phishing
  • Whaling / CEO Fraud
  • W2 Phishing
  • Search Engine Phishing
  • Pharming
  • Spear Phishing
  • Vishing
  • SMiSHing
  • Dropbox Phishing
  • Google Docs Phishing
  • Image Phishing
  • Protect against Identity Theft
  • Examples of Social Engineering

Social Media

  • Personal Social Media
  • Business Social Media
  • Social Media & “BYOD”

Malware

  • Computer viruses
  • Worms
  • Trojan horses
  • Ransomware
  • Spyware
  • Adware
  • Scareware
  • Keylogger
  • Signs of infection
  • Password: Guidelines and Best Practices
  • Two-factor Authentication

Internet Security

  • Guidelines and Best Practices
  • Is the link safe?
  • Hover mouse before clicking
  • Downloading safely
  • VOIP Communications
  • Advantages & disadvantages
  • Phone scams

System and Device Security

  • Operating System and Device Security
  • Mobile devices
  • Cloud

About the Exam

This course will prepare a candidate to sit for the CCAP Examination. Here is the essential information about the exam:

  • Prerequisite: None
  • Testing Center: Time-bound online test can be taken from anywhere
  • Number of Questions: 30
  • Passing Score: 80{0b27dbd4f1eb987500121a7d3820b3dc1a5f9e41ac51e14b1ddc7e432d2b10af}
  • Test Duration: 30 Min
  • Test Format: Multiple Choice
  • Certificate Expiry: 2 Years

Training Options with Certification Test

Online Self-Study
Slides with Audio: Yes
Self-Paced: Yes
Avg Completion Time: 4 Hours / Course
Access: Online Access for 60 Days
Certificate of Completion: Yes

View Sample Video of the Course

Certified CyberSecurity Awareness Professional Certification Training is rated 4.8 out of 5 by 487 users.