Instructor(s)

Tech Lead Silvino Santos

Silvino Santos, our Tech Lead, boasts 20+ years of experience as a digital content consultant and trainer. He's a Cybersecurity Master's grad and Competitive Intelligence Analyst focused on enhancing professional performance and profitability via tech innovation and knowledge resources. Silvino's role at MBU Intelligence is central to guiding teams and organizations in the tech and knowledge management landscape.

Psychologist Olga Delgado

Join me on a transformative journey to leadership, success, happiness, and well-being. Through AI, digital transformation, and third-gen therapies, I provide a unique approach to revolutionize your personal and professional growth.

Team Developer Ricardo Andorinho

Ricardo Andorinho is from Évora, Portugal. He is an international handball player having played in 155 matches. Ricardo is the author of a management guide “Awaken Your Genius” and founder of MBU Intelligence - a company that drives innovation. Using his business focus and experience in finance, innovation and business performance, Ricardo specialises in innovation through people.

Table of Contents

Human-Centric CyberSecurity

Welcome!

  • The Context
  • Table of Contents


Determine your level of knowledge

  • Before you begin, assess your current level of knowledge.
  • First Step: Determine your current level of knowledge.


Introduction: Human-centered cybersecurity - People as Potential Defenders and Threats

  • Why Human-Centric Cybersecurity?
  • Q0 Test your learning about Human-Centric Cybersecurity


Section 1 - Human errors in cybersecurity and their effects

  • S1 - A1 Consequences of cybersecurity human errors
  • S1 - Q1 Test your learning - Consequences of cybersecurity human errors
  • S1 - A2 Preventing and Mitigating Cybersecurity Human Errors
  • S1 - Q2 Test your learning - Preventing and Mitigating Cybersecurity Human Errors


Section 2 - Cybersecurity Privilege Abuse's Effects

  • S2 - A1 Consequences of Cybersecurity Privilege Abuse
  • S2 - Q1 Test your learning - Consequences of Cybersecurity Privilege Abuse
  • S2 - A2 Preventing and Mitigating Privilege Abuse
  • S2 - Q2 Test your learning - Preventing and Mitigating Privilege Abuse


Section 3 - Cybersecurity Repercussions of Stolen Credentials

  • S3 - A1 Consequences of Stolen Credentials in Cybersecurity
  • S3 - Q1 Test your learning - Consequences of Stolen Credentials in Cybersecurity
  • S3 - A2 Preventing and Mitigating Stolen Credentials in Cybersecurity:
  • S3 - Q2 Test your knowledge - Preventing and Mitigating Stolen Credentials in Cybersecurity


Section 4 - Impacts of Social Engineering in Cybersecurity

  • S4 - A1 Consequences of Cybersecurity Social Engineering
  • S4 - Q1 Test your learning - Consequences of Cybersecurity Social Engineering
  • S4 - A2 Preventing and Mitigating Social Engineering Attacks
  • S4 - Q2 Test your knowledge - Preventing and Mitigating Social Engineering Attacks


Section 5 - Business Email Compromise (BEC) attack for commercial fraud.

  • S5 - A1 Consequences of Business Email Compromise (BEC)
  • S5 - Q1 Test your learning - Business Email Compromise (BEC) attack for retail fraud.
  • S5 - A2 Preventing and Mitigating of Business Email Compromise (BEC)
  • S5 - Q2 Test your learning - Preventing and Mitigating of Business Email Compromise (BEC)


Section 6 - Cognitive Biases and Their Impact on Cybersecurity

  • S6 - A1 Consequences of Cognitive Biases and Their Impact on Cybersecurity

Trends and Conclusion in Human-Centered Cybersecurity

  • CA1Trends in Human-Centered Cybersecurity
  • CQ1 Test your knowledge - Trends in Human-Centered Cybersecurity
  • CA2 Conclusions
  • CQ2 Test your knowledge - Conclusions


Determine your level of knowledge

  • To conclude, assess your current level of knowledge
  • Last step: Determine your current level of knowledge


Before you go...

  • Drag handle to reorder lessoS1 Improving iSecure (NPS)
  • Drag handle to reorder lessS2 Safety at work - On a scale of 0 to 10 (0 = Not at all likely, 10 = Extremely likely)

iSecure Programs

Critical information, including customer information, intellectual property, and financial data, are made available while maintaining their confidentiality, integrity, and availability. It guarantees operational continuity, legal compliance, and defense against cyberthreats.

Coming soon!

Add your email to the mailing list to get the latest updates.

Thank You