The HR professional’s guide to cybersecurity
3.7 (39 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
7,738 students enrolled

The HR professional’s guide to cybersecurity

This course is designed for acting HR professionals, who contribute their organization in managing cybersecurity
3.7 (39 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
7,738 students enrolled
Created by Teo Dvali
Last updated 1/2020
English
English [Auto]
Current price: $11.99 Original price: $19.99 Discount: 40% off
1 day left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1 hour on-demand video
  • 14 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • HR professional's role in managing cyber security
Requirements
  • It will be better if students had experience in Human resources essentials
Description

This course is designed for students who are acting HR professionals, already have knowledge in this  Filed or going to get some knowledge,  completing this course gives you an understanding about the importance of the HR professional's role in cybersecurity of the company, how HR leaders can enable their organizations to benefit from improved cybersecurity culture, so my course is kind of a handbook For every HR professional to protect a company from cyber attacks and also guide to them Become a Cybersecurity Ninja.

Who this course is for:
  • Human resources professionals
Course content
Expand all 18 lectures 01:09:11
+ Review of course content
3 lectures 01:37

This course is designed to give you an understanding about the importance of the HR professional's role in cybersecurity of the company, how HR leaders can enable their organizations to benefit from improved cybersecurity culture, so my course is kind of a handbook For every HR professional to protect a company from cyber attacks and also guide to them Become a Cybersecurity Ninja.

Preview 00:39
+ 2. Briefly about cyber security
4 lectures 14:55

Vocabulary:


Hardware


Computer hardware refers to the physical parts of a computer and related devices. Internal hardware devices include motherboards, hard drives, and RAM. External hardware devices include monitors, keyboards, mice, printers, and scanners.

The internal hardware parts of a computer are often referred to as components, while external hardware devices are usually called peripherals. Together, they all fall under the category of computer hardware.


Software

Software, on the other hand, consists of the programs and applications that run on computers. Because the software runs on computer hardware, software programs often have system requirements that list the minimum hardware required for the software to run.


Data

Computer data is information processed or stored by a computer. This information may be in the form of text documents, images, audio clips, software programs, or other types of data. Computer data may be processed by the computer's CPU and is stored in files and folders on the computer's hard disk.

At its most rudimentary level, computer data is a bunch of ones and zeros, known as binary data. Because all computer data is in binary format, it can be created, processed, saved, and stored digitally. This allows data to be transferred from one computer to another using a network connection or various media devices. It also does not deteriorate over time or lose quality after being used multiple times.


The Digital Infrastructure


Digital Infrastructure is defined as the ability to store and exchange data through a centralized communication system.


Preview 01:58

In Summary:


• A lack of focus on cybersecurity can be greatly damaging to a business

• There is the direct economic cost of such attacks to the business, such as theft of corporate information, disruption to trading or even having to repair affected systems all resulting in financial loss. As well as the physical impact, cybersecurity breaches can also cause reputational damage

• Aside from the direct impacts of a cybersecurity breach, there are also legal consequences to deal with in the aftermath

• With a lack of faith in the security of the affected business, customers will be more inclined to venture elsewhere, resulting in a loss of sales and profits.

• This can also be supported by a business not posting too much personal information online, as an opportunist scammer can (and may) use this information to convince of their legitimacy when contacting the business.


Preview 05:01
Cyber attacks and cyber security threats
05:11
+ Mid-test
0 lectures 00:00
Mid-test of Section 2: ,,Briefly about cyber security''
7 questions
+ The Role of Human Resources in Managing Cyber security
4 lectures 20:53
Some essential issues every HR professional should know about cyber security
04:49
Personally identifiable information (PII)
02:11
Types of data that human resources handles
05:18
Managing HR Data security
08:35
Mid-test of Section 4: The Role of Human Resources in Managing Cyber security
10 questions
+ Handbook for HR professionals ensuring the cybersecurity of company
7 lectures 31:46
Importance of employee cyber security Handbook and It’s main chapters
02:17
Employee vulnerability to cyber attacks
06:46
Define access policies
04:21
Pre-define Security policies and escalation procedure
01:42
The end-users
03:28
Data classification
05:05
Increase employee awareness About cybersecurity
08:07

Handbook for HR professionals ensuring the cybersecurity of company

Mid-test of Section 5
8 questions