CyberSAFE: Cyber Safety in the Age of AI

Every time you check email, log into a cloud app, or perform any number of job tasks using technology, you’re a potential target for cyber threats—and a critical line of defense. This course empowers everyday technology users like you with the awareness and habits needed to protect yourself and your organization from these threats. You’ll learn how to recognize threats, avoid common traps, and use today’s digital tools—including artificial intelligence (AI)—more safely. Whether you’re in the office, at home, or on the move, you’ll walk away from this course with the confidence to use technology more securely. And, you’ll have the knowledge and skills to contribute to a strong culture of cybersecurity wherever you work.
Course Details

Price:

Days:

0.5

Location:

Course Overview

Every time you check email, log into a cloud app, or perform any number of job tasks using technology, you’re a potential target for cyber threats—and a critical line of defense. This course empowers everyday technology users like you with the awareness and habits needed to protect yourself and your organization from these threats. You’ll learn how to recognize threats, avoid common traps, and use today’s digital tools—including artificial intelligence (AI)—more safely. Whether you’re in the office, at home, or on the move, you’ll walk away from this course with the confidence to use technology more securely. And, you’ll have the knowledge and skills to contribute to a strong culture of cybersecurity wherever you work.

Use technology, including generative artificial intelligence (AI), responsibly. Resist social-engineering attacks. Secure devices such as desktops, laptops, tablets, smartphones, and more. Use the Internet securely.

To ensure your success in this course, you should have experience with the basic use of computing technology, including desktop, laptop, or tablet computers; mobile phones; and basic Internet functions, such as web browsing and email.

1 – Using Technology Responsibly

  • Follow Compliance Requirements
  • Use Generative AI Safely

2 – Resisting Social-Engineering Attacks

  • Identify Social-Engineering Attacks
  • Defend Against Social-Engineering Attacks

3 – Securing Devices

  • Maintain Physical Security of Devices
  • Use Wireless Devices Securely
  • Use Secure Authentication Methods
  • Protect Data
  • Defend Against Malware

4 – Using the Internet Securely

  • Use Email Securely
  • Browse the Web Safely
  • Use Social Networks Securely
  • Use Cloud Services Securely
  • Ensure the Security of Remote Work
Class Dates & Times
Filters Sort results
Reset Apply
No results found. Clear filters and try again?
— Questions?

Information Request

— Empower Change

Invest in Skills & Equality

Support Diversity, Equity, and Inclusion with Every Purchase.

Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.