Course Curriculum

  • 1

    Data Breaches

    • What are Data Breaches & Why are they important

    • What is a data breach?

    • The Mandatory Breach Notification Scheme

  • 2

    Common Scams to Look Out For

    • Phishing Scams

    • Spearphishing

    • What Type of Scam Is This?

    • 3 Step Review Process

    • The 3 Step Process Quiz

  • 3

    Reporting

    • Notifiable Data Breach Scheme Flow

    • Consequences for failure to notify a data breach

    • Data Breach Quiz

    • Notifiable Data Breaches Flow Chart Summary

  • 4

    Other Scams To Look Out For

    • Overpayment scams

    • Fake directories and advertising

    • Domain name renewal scam

    • Payment redirection scams

    • Office supply scam

    • Malware & Ransomware

    • Investment schemes

  • 5

    General Security Best Practices

    • Passwords

    • Confidential Material

    • Clean Desk

    • Computer Installs

    • Malicious Attachments

    • Spyware

    • Social Engineering - friendship

    • Inappropriate emails

    • Shoulder Surfing

    • Password Handling

    • Key loggers

    • Chain Mail

    • Printouts

    • USB Key Drop

  • 6

    References

    • Original Sources

About the curator

Cloud Integration Consultant

Alvin Landicho

A lover of all things technical, Alvin always wanted to know how things worked. From pulling apart appliances and putting them back together with a few screws left over to reading manuals from cover to cover; he was destined for a career in engineering. After studying Bachelor Degrees in Electrical and Computer Engineering and Business majoring in marketing he started to learn that this unique academic combination would help him in future endeavours.