Cybersecurity - social media

Light grey icon of a clock

10

min

Personal information such as photos, visited locations, connections, and more are stored in social media profiles, providing scammers with a wealth of information about you. This module will look at social media best practices to help you avoid scammers stealing your information and using it to commit identity fraud.

WCAG 2.2 AA accessibility

Add your branding

Designed by learning designers

Cybersecurity - social media
Cybersecurity - social media
Cybersecurity - social media
Cybersecurity - social media

Learning outcomes

After completing the module, you’ll be able to:

  • Identify why identities are stolen on social media;
  • Differentiate between safe and unsafe social media practices;
  • Describe common social media attacks;
  • Reflect on your current social media account practices;
  • Describe how to keep your information safe;
  • Identify what to do when social media encounters are suspicious;
  • Describe the support and resources available.

Course features

Pencil icon

Assessment

Speech bubble icon

Audio transcript

Volume icon

Audio

Video icon

Video

Accessibility icon

WCAG AA 2.2 compliant


Start training your teams and customers today

Book a demo or consult

Related course

10

min

Cybersecurity - don't get phished

Cybersecurity - don't get phished

Scammers are smarter and more cunning then ever. In this module learn to spot the warning signs to avoid being scammed and having your personal and business information hacked.

10

min

Cybersecurity - storage and retention

Cybersecurity - storage and retention

File sharing is common place within the workplace, but is your team aware of how to share data safeley? This module guides you through data-sharing best practices and ways to avoid a data breach.

10

min

Cybersecurity - password awareness

Cybersecurity - password awareness

Cybersecurity is now a business critical issue. This module will educate your workforce on the importance of password protection reducing the risk of hacks and breaches that could jeopardize your identity.

Related blog