Published 2/2023MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 1.03 GB | Duration: 1h 44m
Learn the basics of running a successful training and awareness program. What you'll learn Defining Security and Awarness Developing a successful Security and Awarness Program Protect the organization data and ressources Help employees to protects their assets against any leakage Understanding the basic concept of Cybersecurity Understand the basic concept of Sales and Marketing Requirements No prior knowledge is required Description Not all training and awareness programs are alike. Building a robust security awareness program is important, but it can be in vain in your employees don't buy into what you're selling and actually change their security behavior. Go “beyond compliance” to learn about sales and marketing techniques that can take a training and awareness program to the next level: engagement and behavior change. This course also includes security basics for soft-skilled professionals new to the security field, as well as how to leverage brain chemistry to be more effective. This learning path is designed for established security practitioners with existing security expertise who are new to the practice of security training and awareness and people with existing marketing and communications experience who are entering the field of security training and awareness. Any hacker will tell you that the easiest target isn’t a system or a technology; it’s people. In this learning path, you’ll learn how to engage your audience and create “pull” for your training and awareness. You’ll learn how to assess the security culture of your organization and map out a plan to improve it. You’ll learn how align your program to your organization’s goals and get executive support. You’ll learn how people learn, and how they consume media. You’ll learn how to create marketing personas and how to get the right message to the right person at the right , increasing the likelihood of behavioral change. You’ll also learn about: the awareness maturity model, measuring impact and engagement, integrating existing technology with your training and awareness program, and evaluating human risk. Overview Lecture 1 Course Overview Lecture 2 Who Am I Section 1: Training and Awareness Basics Overview Lecture 3 What is Training and Awarness Section 2: Security Basics Lecture 4 People, Process, Technology and the NIST Framework Lecture 5 Basic Security Teology and Concepts Lecture 6 Basic Risk Teology Lecture 7 Teology: Law, Regulation, Policy, Standard, Guideline Lecture 8 Attacks and Social Eeering Teology Section 3: Introduction to Security and Awarness Lecture 9 Current State of Training and Awareness and Employee Engagement Lecture 10 Bias, Distraction, Apathy and Fatigue Section 4: Sales and Marketing Concepts and Techniques for Training and Awareness Lecture 11 Human Attention Spans, the Hook and Storytelling Lecture 12 Introduction to Marketing, Personas and the Sales Funnel Lecture 13 Tactics, Marketing Automation and Integrated Campaigns Section 5: Creative Lecture 14 Branding and Positioning Section 6: Program Execution Lecture 15 Designing and Planning a Program Lecture 16 Learning Science, Fogg and Gardner Lecture 17 Right Message, Right Person, Right Lecture 18 Launching Phishing and Training, Reporting Lecture 19 Carrot vs Stick, Repeat Offenders Ambitious Students who want to entry to the cybersecurity learning path HomePage:
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.