Home 9 Cybersecurity Awareness 9 Cybersecurity Training Programme ( Page 3 )

Cybersecurity Training Programme

This programme consists of six essential modules:

Each module is designed to equip employees with the knowledge and skills necessary to protect company data and systems.

When you have completed all 6 modules, you should be ready to take our Cybersecurity Quiz and get a Certificate of Completion.

1: Essential Cybersecurity Basics

Cybersecurity is an ongoing process, not a one-time fix.

By understanding the threats and adopting basic security practices, we can all contribute to creating a safer digital environment.

Want to learn more about Cybersecurity Basics?

CLICK HERE TO LEARN MORE

2: Spotting Phishing and Social Engineering Attacks

Phishing and social engineering attacks are constantly evolving, but their core tactics remain the same: they exploit human nature.

Want to get better at spotting Phishing attacks?

CLICK HERE TO LEARN MORE

3: Password Best Practices and Multi-Factor Authentication

By adopting long passphrases, using a password manager, and enabling MFA on every account that offers it, you turn your digital presence from a “low-hanging fruit” into a locked vault.

Need help implementing stronger password practices?

CLICK HERE TO LEARN MORE

4: Data Protection and Privacy Essentials

Organisations in Ireland must protect personal and sensitive data by complying with GDPR and the Data Protection Act 2018.

Strong security measures, clear privacy practices, and ongoing staff training help reduce risk, ensure compliance, and maintain trust.

CLICK HERE TO LEARN MORE

5: Internet and Device Security Tips

Safe internet and device usage practices are essential for protecting yourself and your organisation from cyber threats.

By following these tips, you can reduce your risk of malware infections, phishing attacks, and data breaches. Stay vigilant, stay informed, and make cybersecurity a habit in your daily digital life.

CLICK HERE TO LEARN MORE

6: Reporting Cybersecurity Incidents

Incident reporting is a critical component of a strong cybersecurity posture.

By promptly reporting any suspicious activity or security incidents, you can help your organisation minimise damage, prevent future attacks, and maintain a secure digital environment.

Remember, when it comes to cybersecurity, if you see something, say something!

CLICK HERE TO LEARN MORE

 

ALL DONE? NOW TAKE A QUIZ

AND GET A CERTIFICATE OF COMPLETION WHEN YOU PASS

Cybersecurity Awareness

Test your cybersecurity knowledge and see how well you can protect yourself online!

This quick and engaging quiz covers essential topics like phishing, malware, and password security.

Challenge yourself to identify common threats and learn valuable tips for staying safe in the digital world.

Click below to start the quiz and discover your cybersecurity score!

(Allow 5 to 10 minutes to complete the quiz.)

Please fill in your name and email address.
We will send you your results and a certificate of completion when you pass.

(Pass is 80% or more.)

1 / 20

1. What is a "keylogger"?

2 / 20

2. In cybersecurity, what does 'See Something, Say Something' encourage?

3 / 20

3. What is the primary method used in a 'Phishing' attack?

4 / 20

4. Under GDPR, which of these is a 'Special Category' of personal data?

5 / 20

5. What is a "man-in-the-middle" attack?

6 / 20

6. What is the main risk of using public Wi-Fi without a VPN?

7 / 20

7. What is the best way to protect yourself from ransomware?

8 / 20

8. What is a "security patch"?

9 / 20

9. If you suspect your computer is infected with malware, you should:

10 / 20

10. What is the risk of using online banking on public Wi-Fi?

11 / 20

11. What is the primary risk of clicking on links in unsolicited emails?

12 / 20

12. Why is it important to keep your operating system and software updated?

13 / 20

13. What should you do before clicking a link on a computer to verify its destination?

14 / 20

14. What is "endpoint security"?

15 / 20

15. What are the three core principles of cybersecurity?

16 / 20

16. What is a "cookie" in web browsing?

17 / 20

17. Which type of malware is described as a ‘digital hostage-taker’?

18 / 20

18. What is the purpose of "multi-factor authentication" (MFA)?

19 / 20

19. Why are Passkeys considered 'immune to phishing'?

20 / 20

20. What is the purpose of a firewall?

Your score is

The average score is 97%

0%