Skip to content
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Login
Sign Up
Login
Sign Up
Login
Sign Up
Home
All Programs
Political Science
Security
Wrap up! The Part of Tens
Wrap up! The Part of Tens
Curriculum
4 Sections
40 Lessons
Lifetime
Expand all sections
Collapse all sections
Chapter 13: Ten Ways to Win Support for Your Awareness Program
20
1.1
Finding Yourself a Champion
1.1
Quiz for Finding Yourself a Champion
5 Questions
1.2
Setting the Right Expectations
1.2
Quiz for Setting the Right Expectations
5 Questions
1.3
Addressing Business Concerns
1.3
Quiz for Addressing Business Concerns
5 Questions
1.4
Creating an Executive Program
1.4
Quiz for Creating an Executive Program
5 Questions
1.5
Starting Small and Simple
1.5
Quiz for Starting Small and Simple
5 Questions
1.6
Finding a Problem to Solve
1.6
Quiz for Finding a Problem to Solve
5 Questions
1.7
Establishing Credibility
1.7
Quiz for Establishing Credibility
5 Questions
1.8
Highlighting Actual Incidents
1.8
Quiz for Highlighting Actual Incidents
5 Questions
1.9
Being Responsive
1.9
Quiz for Being Responsive
5 Questions
1.10
Looking for Similar Programs
1.10
Quiz for Looking for Similar Programs
5 Questions
Chapter 14: Ten Ways to Make Friends and Influence People
20
2.1
Garnering Active Executive Support
2.1
Quiz for Garnering Active Executive Support
5 Questions
2.2
Courting the Organization’s Influencers
2.2
Quiz for Courting the Organization’s Influencers
5 Questions
2.3
Supporting Another Project That Has Support
2.3
Quiz for Supporting Another Project That Has Support
5 Questions
2.4
Choosing Topics Important to Individuals
2.4
Quiz for Choosing Topics Important to Individuals
5 Questions
2.5
Having Some Fun Events
2.5
Quiz for Having Some Fun Events
5 Questions
2.6
Don’t Promise Perfection
2.6
Quiz for Don’t Promise Perfection
5 Questions
2.7
Don’t Overdo the FUD Factor
2.7
Quiz for Don’t Overdo the FUD Factor
5 Questions
2.8
Scoring an Early Win
2.8
Quiz for Scoring an Early Win
5 Questions
2.9
Using Real Gamification
2.9
Quiz for Using Real Gamification
5 Questions
2.10
Integrating the Organization’s Mission Statement
2.10
Quiz for Integrating the Organization’s Mission Statement
5 Questions
Chapter 15: Ten Fundamental Awareness Topics
20
3.1
Phishing
3.1
Quiz for Phishing
5 Questions
3.2
Business Email Compromise
3.2
Quiz for Business Email Compromise
5 Questions
3.3
Mobile Device Security
3.3
Quiz for Mobile Device Security
5 Questions
3.4
Home Network and Computer Security
3.4
Quiz for Home Network and Computer Security
5 Questions
3.5
Password Security
3.5
Quiz for Password Security
5 Questions
3.6
Social Media Security
3.6
Quiz for Social Media Security
5 Questions
3.7
Physical Security
3.7
Quiz for Physical Security
5 Questions
3.8
Malware and Ransomware
3.8
Quiz for Malware and Ransomware
5 Questions
3.9
Social Engineering
3.9
Quiz for Social Engineering
5 Questions
3.10
It Can Happen to You
3.10
Quiz for It Can Happen to You
5 Questions
Chapter 16: Ten Helpful Security Awareness Resources
20
4.1
Security Awareness Special Interest Group
4.1
Quiz for Security Awareness Special Interest Group
7 Questions
4.2
CybSafe Research Library
4.2
Quiz for CybSafe Research Library
5 Questions
4.3
Cybersecurity Culture Guidelines
4.3
Quiz for Cybersecurity Culture Guidelines
5 Questions
4.4
RSA Conference Library
4.4
Quiz for RSA Conference Library
5 Questions
4.5
You Can Stop Stupid
4.5
Quiz for You Can Stop Stupid
5 Questions
4.6
The Work of Sydney Dekker
4.6
Quiz for The Work of Sydney Dekker
5 Questions
4.7
Human Factors Knowledge Area
4.7
Quiz for Human Factors Knowledge Area
5 Questions
4.8
People-Centric Security
4.8
Quiz for People-Centric Security
5 Questions
4.9
Human Security Engineering Consortium
4.9
Quiz for Human Security Engineering Consortium
5 Questions
4.10
How to Run a Security Awareness Program Course
4.10
Quiz for How to Run a Security Awareness Program Course
5 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Login
or
Sign Up
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Cybersecurity
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Linkedin
Instagram
Modal title
Main Content