Learning Outcomes
By the end of this course, participants will be able to:
- Describe how cybercrime has grown over time and its financial and operational impact on organizations.
- Identify common types of cyberattacks and explain how they work (phishing, spear phishing, whaling, vishing, smishing, malware, social engineering, malicious QR codes, etc.).
- Explain how human error contributes to successful attacks and why security culture matters as much as technology.
- Recognize clues that indicate phishing and related scams in email, SMS, voice calls, and social media.
- Apply good security practices when using social media, working remotely, or travelling.
- Understand the organization’s key security and privacy policies, including data classification, privacy obligations, and roles of IT and the Privacy Officer.
- Take appropriate first steps when they suspect malware, a data breach, or another cyber incident.
- Build a simple personal cybersecurity plan to protect themselves and their organization online.


