fbpx
Limited Offer: Enter OAGLOWUP25 to get 20% off now! Limited Offer: Enter OAGLOWUP25 to get 20% off now! Limited Offer: Enter OAGLOWUP25 to get 20% off now! Limited Offer: Enter OAGLOWUP25 to get 20% off now!

Within 2 hours, my entire life savings was gone.

One Breach. That’s All It Takes To Ruin You. Secure Yourself With Cyber Safe.

Cyber-Safe: A Guide For Employees

6 Course Series

Clear step-by-step guide to boost your cyber skills

45 Videos, Learn At Your Pace

Concise, 5-min videos

Get Full Lifetime Access

Quizzes To Test Your Learnings

Real-Life Case Studies & Implementation

What You'll Learn

Fundamentals of Cybersecurity and Why It Matters

Spot Cyber Attack Threats & How to Prevent Them

Know What To Do When An Incident Happens

Course Information

Instructor

James Lim, Earnest Lim & Tushar Ismail

Course Length

6 Lesson, 2 Hour

Category

Technology, Work Culture

Language

English

Subtitles

English

Price

RM 199.00, Lifetime Access

Brands And Companies we have had the pleasure to up skill with

Ready to prevent data breaches, cyber attacks and safeguard your personal information?

This is important if you:

Share sensitive information online

The internet has become a necessity, with even government services moving online. But it’s your responsibility to secure your personal data and confidential documents online.

Use a cloud storage

Contrary to popular belief, cloud storage isn’t as secure as many assume. Even through cloud providers use secure servers, they are still vulnerable to cyber-attacks, data breaches, and unauthorised access.

Don’t regularly update security software

Cyber threats are constantly evolving, and outdated software may not be equipped to handle the latest vulnerabilities. Don’t risk your data falling into the wrong hands because you missed an ‘update’.

Lesson Plan Content

Lesson 1

Introduction to Cybersecurity

  • What is Cybersecurity?
  • Cybersecurity in the Workplace
  • Simplifying Cyber Lingo
  • Cyber Threats – Malaysian Edition
  • Case Study: Phishing Attack
  • Preventing Cyber Attacks
Lesson 2

Understanding Cyber Threats

  • Phishing Tactics 101
  • Handling Phishing Emails
  • Viruses, Trojans, and more
  • Guarding Against Malware
  • Building Strong Passwords
  • MFA for Extra Protection
  • Managing User Access Rights
  • Understanding Insider Threats
  • Case Study: Insider Threat
  • Preventing Insider Attacks
Lesson 3

Staying Safe Online

  • Staying Secure on Social Media
  • Risk Assessments in Cybersecurity
  • Identifying Cyber Risks
  • Mitigating Cyber Risks
  • Cyber Hygiene Habits
  • Securing Remote Work
Lesson 4

Cyber Policies at Work

  • Identifying Key Assets
  • Implementing Access Controls
  • Auditing Data Access
  • Key Cybersecurity Regulations
  • Implementing Cyber Compliance
  • Maintaining Cyber Compliance
Lesson 5

Cyber Attacks & Response

  • Protecting Data with Encryption
  • Responding to Data Breaches
  • Spotting Cyber Attack Warnings
  • First Response in a Cyber Attack
  • Creating Your Cyber Response Team
  • Reviewing Cyber Incidents
Lesson 6

The Human & Culture Elements of Cybersecurity

  • Human Factor in Cybersecurity
  • Common Human Errors
  • Building a Cyber-Aware Culture
  • Continuous Education
  • What is Cybersecurity?
  • Cybersecurity in the Workplace
  • Simplifying Cyber Lingo
  • Cyber Threats – Malaysian Edition
  • Case Study: Phishing Attack
  • Preventing Cyber Attacks
  • Phishing Tactics 101
  • Handling Phishing Emails
  • Viruses, Trojans, and more
  • Guarding Against Malware
  • Building Strong Passwords
  • MFA for Extra Protection
  • Managing User Access Rights
  • Understanding Insider Threats
  • Case Study: Insider Threat
  • Preventing Insider Attacks
  • Staying Secure on Social Media
  • Risk Assessments in Cybersecurity
  • Identifying Cyber Risks
  • Mitigating Cyber Risks
  • Cyber Hygiene Habits
  • Securing Remote Work
  • Identifying Key Assets
  • Implementing Access Controls
  • Auditing Data Access
  • Key Cybersecurity Regulations
  • Implementing Cyber Compliance
  • Maintaining Cyber Compliance
  • Protecting Data with Encryption
  • Responding to Data Breaches
  • Spotting Cyber Attack Warnings
  • First Response in a Cyber Attack
  • Creating Your Cyber Response Team
  • Reviewing Cyber Incidents
  • Human Factor in Cybersecurity
  • Common Human Errors
  • Building a Cyber-Aware Culture
  • Continuous Education

Get To Know The Speakers!

What’s in it for you?

Level up your cyber skills with 45 videos packed with everything you need!

Quizzes at the end of each chapter to help review and test what you’ve learned.

Future discounts for all things OpenAcademy related.

How to Boost Your Cyber Skills?

You’re just 3 simple steps away from becoming your company’s top defense!

Follow these easy steps to learn from these industry experts now!

1

Purchase

Purchase the Cyber-Safe series now!

2

Access

Follow the steps after purchasing the series.

3

Learn

Voila! You now have access to learn directly from James, Earnest & Tushar. Time to conquer the cyber workspace!

FAQs

This series is perfect for employees, cybersecurity newbies, IT teams, and anyone eager to promote a safe, cyber-smart workplace.

  • There will be 45 short videos, each 2 to 5 minutes long, offering practical strategies for data protection and risk management to secure your organisation’s future.
  • Curated quizzes from James, Earnest & Tushar to track your progress.
  • Future discounts for all things OpenAcademy related.

You can reach out to them via LinkedIn or drop us a message at [email protected] to find out more!

This series is exclusively available on the OpenAcademy app. To start watching, simply download the app from the App Store or Google Play!

OpenAcademy is a platform that enables communities to be able to learn directly from industry practitioners. Our goal is to provide a no-nonsense platform in sharing real, unbiased, non-theory driven content and programmes designed for students, startups, business owners, teams and more!