CertNexus CyberSAFE

Learn how to put the latest open source technology into practice with hands-on training, delivered by industry experts, aligned to your desired business outcomes

If you are interested in other Cloud Native courses, search our entire catalog.

}
0.1 Days

Available On-Site

Available Virtually

Open Enrollments Available
f

Customizable

The CertNexus CyberSAFE course is designed to provide non-technical users the cybersecurity fundamentals necessary under the growing cybersecurity threats like ransomware, data breaches, and phishing, for example. The intention of the CertNexus CyberSAFE course is to increase participants’ knowledge of technology-related risks, regarding devices they may already use daily. Upon completion of the course presentation, candidates may obtain the Certified CyberSAFE certificate by completing the credential process on CertNexus’ CHOICE platform.

In this course, you will use discussions, case studies, and the experiences of the instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely.

Delivery

CyberSAFE training is available for Instructor-Led (ILT) in-person/onsite training or Virtual Instructor-Led training (VILT) delivery; Open Enrollment options may be available.

Who Should Attend

This course is intended for non-technical end users of mobile devices, computers, networks, cloud based systems, and the Internet, in order to increase their awareness and enable them to minimize the digital risks to themselves and others.

What Attendees will learn

This CyberSAFE course is a one hour session, where participants will learn cybersecurity fundamentals as well as the minimization of cybersecurity risks in order to better protect themselves and their organizations.

This course will help participants to do the following:

  • Identify the need for security and compliance
  • Secure devices such as personal computers, tablets, and mobile phones
  • Recognize and avoid social engineering such as phishing
  • Recognize and avoid malware, such as viruses and ransomware
  • Use the Internet securely

Prerequisites

A familiarity with the basic use of common end-user technology, such as laptops, tablets, mobile phones, email, and web browsers.