Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

LinkedIn Learning

Cybersecurity for Small and Medium Businesses: Essential Training

via LinkedIn Learning

Overview

Learn how to protect your small or medium business from cybersecurity threats.

As the owner of a small or medium business, you're probably aware that cybersecurity threats are on the rise. Learning which issues to watch out for—and how to best respond to threats—can help you keep your business safe. In this course, instructor Kristin Judge provides business owners and their staff with the foundational knowledge they need to secure their data and online accounts. Using the NIST Cybersecurity Framework—an international standard created by the National Institute of Standards and Technology—Kristin takes you through a five-step process that can help you better secure your business.

Syllabus

Introduction
  • Welcome
  • What you should know
1. The Basics
  • Why you should care
  • Physical security vs. cybersecurity
  • Anyone can improve the cybersecurity of a business
  • What are the cybersecurity threat actions facing businesses?
  • What are the cybersecurity threats?
  • A five-step process to improve cybersecurity
2. Identify
  • Step #1: Identify key assets
  • Inventory sheet: Data and devices
  • Account access best practices
  • What about the cloud?
3. Protect
  • Step #2: Protect data and accounts
  • Humans: Education and awareness is essential
  • Sharing online: How to prevent a phish
  • Technology solutions to protect a business
  • Passphrases and authentication
  • Culture of security: Policies, procedures, and attitude
4. Detect
  • Step #3: Detect a breach
  • Detecting a compromise: The human element
  • Cybersecurity assessments and detection technology solutions
5. Respond
  • Step #4: Respond to a cyber breach
  • Cybersecurity response plans for business
  • Key elements of a cyber incident response
  • Federal government response support and guidance
  • State breach response laws
6. Recover
  • Step #5: How to recover from a cyber incident
  • Cybersecurity insurance
  • Reputation management
7. Resources
  • Technology checklists for small and medium businesses
  • More cybersecurity resources
  • Scam and threat alerts
Conclusion
  • Next steps

Taught by

Kristin Judge

Related Courses

Reviews

Start your review of Cybersecurity for Small and Medium Businesses: Essential Training

Never Stop Learning!

Get personalized course recommendations, track subjects and courses with reminders, and more.

Sign up for free