Cybersecurity for Small and Medium Businesses: Essential Training

Go to class
Write Review

Free Online Course: Cybersecurity for Small and Medium Businesses: Essential Training provided by LinkedIn Learning is a comprehensive online course, which lasts for 1-2 hours worth of material. The course is taught in English and is free of charge. Upon completion of the course, you can receive an e-certificate from LinkedIn Learning. Cybersecurity for Small and Medium Businesses: Essential Training is taught by Kristin Judge.

Overview
  • Learn how to protect your small or medium business from cybersecurity threats.

Syllabus
  • Introduction

    • Welcome
    • What you should know
    1. The Basics
    • Why you should care
    • Physical security vs. cybersecurity
    • Anyone can improve the cybersecurity of a business
    • What are the cybersecurity threat actions facing businesses?
    • What are the cybersecurity threats?
    • A five-step process to improve cybersecurity
    2. Identify
    • Step #1: Identify key assets
    • Inventory sheet: Data and devices
    • Account access best practices
    • What about the cloud?
    3. Protect
    • Step #2: Protect data and accounts
    • Humans: Education and awareness is essential
    • Sharing online: How to prevent a phish
    • Technology solutions to protect a business
    • Passphrases and authentication
    • Culture of security: Policies, procedures, and attitude
    4. Detect
    • Step #3: Detect a breach
    • Detecting a compromise: The human element
    • Cybersecurity assessments and detection technology solutions
    5. Respond
    • Step #4: Respond to a cyber breach
    • Cybersecurity response plans for business
    • Key elements of a cyber incident response
    • Federal government response support and guidance
    • State breach response laws
    6. Recover
    • Step #5: How to recover from a cyber incident
    • Cybersecurity insurance
    • Reputation management
    7. Resources
    • Technology checklists for small and medium businesses
    • More cybersecurity resources
    • Scam and threat alerts
    Conclusion
    • Next steps