
How to spot a phishing mail
Learning objectives: The do’s and don’ts when you receive a suspicious e-mail
We offer a variety of courses in cyber security and GDPR for your employees. This ensures that you gain awareness of a broad spectre of important topics.
We are continuously creating courses on new topics, to ensure that your employees are kept up-to-date with important and relevant information.
On this site, you will find an overview of all of our courses and their learning goals.
The training consists of video and quiz material, which is continuously being updated.
Learning objectives: The do’s and don’ts when you receive a suspicious e-mail
Learning objectives: What a unknown network is and what security risks are present when using unknown networks
Learning objectives: How security breaches can occur in video conferences and what to be aware of to avoid security breaches
Learning objectives: Why it is important not to reuse passwords, how to create strong passwords and how to keep your passwords secure
Learning objectives: What the biggest risks are when surfing the internet and what you need to be aware of to avoid the most common mistakes and to safely surf
Learning objectives: What legal grounds for processing means according to the GDPR and what consent is, and some misconceptions about it
Learning objectives: Why the mishandling of personal data happens most on e-mail, what you can do to prevent security breaches when using email and how to practice data minimization for emails
Learning objectives: What data minimisation is, why it is necessary to minimise the collecting of personal data and how to perform data minimisation
Learning objectives: What a cloud service is, what risks can be present when using cloud services and what to be aware of when using cloud services
Learning objectives: How to tell if a website is trustworthy and payment methods for safe online shopping
Learning objectives: What secure mail is and why and when it is important to use secure email
Learning objectives: What a security breach is and why it is important to report a security breach
Learning objectives: Why it is important to save files to the company’s shared drive rather than to your own computer and the risks involved with locally saving files on your computer
Learning objectives: Why it is important not to reuse passwords, how to create strong passwords and how to keep your passwords secure
Learning objectives: What phishing is and how it targets us and how to recognise and avoid phishing attacks
Learning objectives: What risks are associated with working from home in relation to cybersecurity and data protection and what you need to be aware of to avoid the most common mistakes
Learning objectives: What personal data is and what the GDPR means for you
Learning objectives: What you need to be aware of when you want to post a picture or video of someone online and how the rules apply if you are acting as a private person vs. part of an organisation
Learning objectives: Why it is important to protect your work computer and the Do’s and Don’ts of keeping your computer safe
Learning objectives: What ransomware is and how cybercriminals make use of it and how you can protect yourself from a possible ransomware attack
Learning objectives: Why it is important to separate personal and work-related use of IT equipment and how to steer clear of the risks related to personal use on work-related devices
Learning objectives: Why it is important to be aware when using your mobile phone and how to use your mobile phone focusing
Learning objectives: What malware is and what consequences it can have for you or your business, how cybercriminals try to plan malicious programs onto your computer and how to protect yourself from malware
Learning objectives: What personal data is, how to make a strong password and how to recognise a phishing e-mail
Learning objectives: What social engineering is and how it can target us and how to recognize social engineering attacks and how to avoid them
Learning objectives: What regular personal data is, what sensitive personal data is and what to be aware of when both types of data are combined
Learning objectives: How a typical cybercriminal thinks and target us and how to use this knowledge to protect yourself against cybercriminals
Learning objectives: The do’s and don’ts when you receive a suspicious e-mail
Learning objectives: What a unknown network is and what security risks are present when using unknown networks
Learning objectives: How security breaches can occur in video conferences and what to be aware of to avoid security breaches
CyberPilot ApS
Fredens Torv 8, side building 1, 8000
Aarhus
+45 40 32 32 35
E-mail: info@cyberpilot.io
Copyright © 2020
CyberPilot