Descrizione
Did you know that cybercrime generates more money globally than the value of drug trafficking? Did you know that cybercrime also targets small organizations?
Cybercrime causes losses in revenue, clients, reputation and it results in additional unprevented expenses in order to remedy attack related damages and it may endanger the survival of the company itself. Moreover, besides material consequences, it causes physical harm to the workers involved. Companies that manage any type of data must preserve confidentiality, integrity and availability, in order not to let such information be violated through Cybercrime attacks from third unauthorized parties.
This course is meant to give an overview on Cybersecurity focussing on risks and responsibilities related to data and information treatment when using IT devices (PC, laptops, tablets, smartphones, etc...)
The contents go over the essential role that users play in such situations: participating actively and being able to distinguish different attacks are basic elements that ensure a first defence from cyber-crime. It's time to stop thinking that cyber-crime is solely about single workers: the course illustrates crime examples and good practices that could potentially prevent and stem attacks.
Cybercrime causes losses in revenue, clients, reputation and it results in additional unprevented expenses in order to remedy attack related damages and it may endanger the survival of the company itself. Moreover, besides material consequences, it causes physical harm to the workers involved. Companies that manage any type of data must preserve confidentiality, integrity and availability, in order not to let such information be violated through Cybercrime attacks from third unauthorized parties.
This course is meant to give an overview on Cybersecurity focussing on risks and responsibilities related to data and information treatment when using IT devices (PC, laptops, tablets, smartphones, etc...)
The contents go over the essential role that users play in such situations: participating actively and being able to distinguish different attacks are basic elements that ensure a first defence from cyber-crime. It's time to stop thinking that cyber-crime is solely about single workers: the course illustrates crime examples and good practices that could potentially prevent and stem attacks.
Programma
The contents go over the essential role that users play in such situations: participating actively and being able to distinguish different attacks are basic elements that ensure a first defence from cyber-crime. It's time to stop thinking that cyber-crime is solely about single workers: the course illustrates crime examples and good practices that could potentially prevent and stem attacks.
Introduction to Cyber Security.
The damages of Cybercrime
How to avoid damage and defend ourselves against Cybercrime.
Find out who is the victim.
How to identify Cybercrime.
Dangerous emails.
Watch out for the password!
What passwords can resist attacks?
Good practises to defend ourselves.
Possible risky situations.
Conclusions.
Domande frequenti
Certificato di completamento corso
Tutte le nostre categorie
Power & Soft SkillFormazione obbligatoria e normativaFinanza AziendalePresentazioni efficaciDa Zero a ManagerOnboarding welcome kitAgenda 2030Trasformazione DigitaleRisorse UmaneManagement & LeadershipDigital MarketingSocial Media & ContentSmart workingSales e Customer ServiceDiversità & InclusioneProject ManagementOffice & Strumenti MicrosoftLingue per il businessData ScienceESG & Sostenibilità