About
Cyber security incidents are increasing across Australia, impacting businesses, government agencies, and individuals at unprecedented rates. Every employee plays a crucial role in protecting organisational systems, data, and reputation. This course provides practical, easy-to-understand guidance to help staff recognise threats, follow secure practices, and respond effectively to potential security breaches. Course Purpose To equip learners with the knowledge and skills required to identify, prevent, and report cyber security risks in the workplace, while supporting compliance with Australian cyber safety standards and organisational policies. Who Should Complete This Course All staff, contractors, supervisors, and managers who use email, computers, mobile devices, networks, or online systems as part of their daily work. Learning Outcomes By the end of this course, participants will be able to: Understand what cyber security is and why it is essential for modern organisations. Recognise common cyber threats including phishing, malware, ransomware, social engineering, and data breaches. Follow secure practices for passwords, authentication, internet use, email safety, and device management. Identify warning signs of a potential security incident and know how to report it promptly. Apply organisational policies and procedures related to IT security, acceptable use, remote access, and data protection. Understand the importance of compliance with Australian Cyber Security Centre (ACSC) guidelines and relevant legal requirements. Key Topics Introduction to Cyber Security Standard Operating Procedures (SOPs) Identifying Security Breaches Malware, Ransomware & Malicious Code Safe Internet & Website Access Email Security & Phishing Awareness Passwords, MFA & Account Security Contracting and Preventing Viruses Remote Access & Secure Data Transfer Portable Device Security (Laptops, Tablets, Mobile Phones) Organisational Policies & Reporting Requirements
You can also join this program via the mobile app. Go to the app
Overview
Understanding Cyber Threats in the Workplace
.2 steps
