Category:

Threat Modeling & Risk Assessment for Organizations

Level:

Intermediate

No. of hours:

2

Learning Objectives (By the end of this Learning Unit you will be able to...)

  • Identify threat actors
  • Explain the basics of the risk assessment frameworks
  • Explain the basics of organizational threat models

Topics Covered:

  • Threat actors (state actors, cybercriminals, insiders)
  • Advanced risk assessment frameworks
  • Organizational threat models

Category:

Organization readiness

Level:

Intermediate

No. of hours:

1

Learning Objectives (By the end of this Learning Unit you will be able to...)

  • Explain the importance of a digital security policy in an organization.
  • Identify key elements of a digital security policy.
  • Develop a security policy.

Topics Covered:

  • Elements of a Digital Security policy
  • Implementation challenges

Category:

Organization readiness

Level:

Intermediate

No. of hours:

2

Learning Objectives (By the end of this Learning Unit you will be able to...)

  • Create an incident response plan
  • Prioritize security measures
  • Form a basic set of rules to protect information and communications

Topics Covered:

  • Creating and implementing an Incident Response Plan (IRP)
  • Digital security drills

Category:

Organization readiness

Level:

Intermediate

No. of hours:

1

Learning Objectives (By the end of this Learning Unit you will be able to...)

  • Understand Global Regulatory Landscape and Emerging Regulations
  • Define Best Practices for Compliance.

Topics Covered:

  • Digital Security Regulations
  • Best Practices for Compliance
  • Ethical Considerations and Accountability
  • Training and Awareness staff and stakeholders 

Category:

Organization readiness

Level:

Beginner

No. of hours:

1

Learning Objectives (By the end of this Learning Unit you will be able to...)

  • Develop security awareness training strategies
  • Build a security-first culture in organizations
  • Implement phishing simulations & internal security testing

Topics Covered:

  • Security awareness training strategies
  • Security-first culture
  • Phishing simulations & internal security testing