Cybersecurity Awareness Challenge

A comprehensive overview of core information security concepts with learning activities designed to promote faster adoption of secure practices and keep organizational data safe – from data classification and remote user security to insider and social engineering threats and ransomware attacks

Course Description

Despite the best efforts of organizations worldwide, cybercrime – and the cost associated with it – is rising rapidly. What cost the global economy $3 trillion in 2015 is projected to cost a stunning $10.5 trillion annually by 2025. This is due to the relentless and growing sophistication and targeting by cyber criminals and hackers. Unfortunately, ongoing human error and poor security awareness practices continue to be the biggest threat to protecting information security.

The Cybersecurity Awareness Challenge focuses on mitigating the risk of human error by providing a robust overview of the core concepts of information security – including classifying data, handling sensitive data, recognizing insider threats, creating strong passwords, securing mobile devices, working securely from home, and recognizing and avoiding social engineering threats like phishing.

The course engages users by describing real-life security challenges and asking them to choose the best course of action for each challenge and includes a final 8-question quiz.

New content for 2021

GLS’s Cybersecurity Awareness Challenge is essential for any organization that is required to deliver annual security training or is seeking to strengthen and enhance its overall security posture.

  • Foundational training on all common aspects of key information security topics and best practices
  • Engages learners in hands-on problem-solving using case-study-based examples
  • Key concepts behind classifying and handling sensitive data, recognizing insider threats, creating strong passwords, securing mobile devices, and recognizing and avoiding phishing and ransomware threats

Course Curriculum

Module 1: Introduction – Communicates the need for a strong information security program, individual responsibility and the consequences of not having one

Module 2: Data Classification and Protection – Explains the importance of classifying data correctly and using strong passwords—and also how to handle, share, and protect data from unauthorized disclosure and insider threat

Module 3: Mobile & Remote Office Security – Teaches how to protect and secure data when using mobile devices and working from home or a remote office

Module 4: Social Engineering – Describes common social engineering tactics, such as phishing, baiting, quid pro quo, and tailgating—and provides best practices to avoid becoming a victim

Module 5: Final Reminders – Reinforces the importance of information security awareness and how organizational employees are the best line of defense against cyberattacks

Quiz – Tests the user’s knowledge via a scenario-driven eight-question quiz

Upon Completion, Learners Will Be Able To

Request a Demo or Quote

Please complete the form below and a GLS representative will contact you

First Name
*
Last Name
*
Job Title
Email Address
*
Phone Number
*
Organization Name
*
Organization Size
Product/Solution Area of Interest

Training Promotions

See Our Current Promotions

GLS Logo
GLS Logo
Front-End Exercises
React Angular Vue.js
Cross Site Request Forgery Cross Site Request Forgery Untrusted HTML Rendering XSS
Direct Dom Manipulation XSS Direct Dom Manipulation XSS Direct Dom Manipulation XSS
Components with Known Vulnerabilities Template Concatenation Cross Site Request Forgery
Untrusted HTML Rendering XSS Sanitization Misuse XSS Untrusted Template Usage XSS
GLS Logo
OWASP Top 10 – API – 2019
ID Topic Covered in SecureDev Modules Programming Languages Available
API1:2019 Broken Object Level Authorization Broken Object Level Authorization JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
API2:2019 Broken User Authentication Broken User Authentication
API3:2019 Excessive Data Exposure Excessive Data Exposure
API4:2019 Lack of Resources & Rate Limiting Lack of Resources & Rate Limiting
API5:2019 Broken Function Level Authorization Broken Function Level Authorization
API6:2019 Mass Assignment Mass Assignment
API7:2019 Security Misconfiguration Security Misconfiguration
API8:2019 Injection Injection
API9:2019 Improper Assets Management Improper Assets Management
API10:2019 Insufficient Logging & Monitoring Insufficient Logging & Monitoring
GLS Logo
OWASP Top 10 – 2021
ID Topic Covered in SecureDev Modules Programming Languages Available
A01:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation JAVA, C#, Python (Django), Python (Flask), Node.js, GO, PHP, Ruby on Rails, Scala, Kotlin
A02:2021 Cryptographic Failures Weak Randomness
A03:2021 Injection SQL Injection Command Injection Header Injection XML Injection
A04:2021 Insecure Design User Enumeration
A05:2021 Security Misconfiguration Leftover Debug Code
A06:2021 Broken Access Control Vertical Privilege Escalation Horizontal Privilege Escalation
A07:2021 Vulnerable and Outdated Components Session Fixation Forced Browsing
A08:2021 Software and Data Integrity Failures Reflected XSS
Forced Browsing
Stored Cross-Site Scripting
Insecure URL Redirect
Clickjacking
Directory Traversal
DOM XSS
Cross-site Request Forgery
A09:2021 Security Logging and Monitoring Failures PII Data in URL
Token Exposure in URL
A10:2021 Server-Side Request Forgery (SSRF) Server-Side Request Forgery
GLS Logo

Your download is complete!

Need more training?