Cyber Security Awareness Training, Page 270 Reviews

We ask our users to rate and review our course immediately after they've completed their training. Here's what people are saying...

USER REVIEWS

Average score 4.7

9798 reviews

  • 83% 5
  • 11% 4
  • 3% 3
  • 1% 2
  • 1% 1
Good course and awareness of risk

No summary provided

5/5
very interesting

The information given is very useful not only for the office but for at home. I've never thought of using a song as a password La La La

5/5
a very interesting course

I found it very interesting and will take lots from this especially the song idea for a new password!

5/5
taking this course was really useful

It was useful to learn about cyber security, privately and in the work place, and how to protect your data and your devices safely and away from cyber attacks

5/5
It’s good to know how to protect ourself

I’m not very good with It( IT products and software) this is why It was helpful for me. Thanks

5/5
learned some new terminology

its always a good idea to be aware and revisit that awareness in the hope that you are not the person who causes an organisation disaster by opening the wrong email!

5/5
Very informative in bite size chunks

Helped break down different terminology, reinforcing what I already knew along with providing usefully information I didn't know and will be able to use in my home life as well as work life.

5/5
factually incorrect in places

generation of your secure password was weak easy for computers to crack hard to remember setting a "Pass Phase" is much better at 18 chars or better. password strength is worked out from entropy bits. yours had a very low score.VPN's don't use Fake IP addresses and as such are factually incorrect and misrepresentation.Zero information about the importance of locking your computer when you leave it. in your video, it even shows somebody doing it in the USB section shame this wasn't picked up internally. Zero information about really checking spam emails. you need to look at the message headers, look at dkim, sfp etc.Zero information about risk of file sharing and not using email as a file sharing tool.social media elements didn't cover risks of 3rd party tagging you in photo's issues with geo tagging publishing your date of birth etc.Zero information about physical security and equipment tamper detection.all in this is a massive can-do better.

1/5
A succinct and useful course.

No summary provided

4/5
Very clear and informative

No summary provided

5/5

Ready to get started?