Cybersecurity awareness training course for employees of organizations of all sizes. Targeted at small and medium-sized organizations that may not have a complete training program prepared for use by the organization. This course presents cybersecurity fundamentals for employees of organizations that use information systems and want all users to have basic cybersecurity knowledge and skills.
Welcome to An Employee’s Guide to Cybersecurity. This course is designed to help you understand your role in protecting your organization’s digital information and systems. You’ll explore the fundamentals of cybersecurity, learn how to recognize threats like phishing and malware, and discover practical ways to secure your devices and communications—especially when working remotely. We’ll also cover the importance of cybersecurity policies, legal and regulatory requirements, and how your online behavior can impact your organization. Whether you're new to cybersecurity or need a refresher, this course will equip you with essential knowledge and skills to stay secure and support a safe workplace environment.
In today's interconnected world, protecting sensitive information is everyone's responsibility. This module introduces the fundamentals of cybersecurity, helping employees understand what cybersecurity is, why it matters, and how everyday actions can make or break an organization’s security posture. Through five focused lessons, you’ll explore core cybersecurity concepts, learn about common threats and attackers, and discover practical ways to safeguard information—from managing passwords to recognizing malware and avoiding costly mistakes. By the end of this module, you'll be equipped with the essential knowledge to play your part in keeping systems secure.
What's included
7 videos6 assignments
Show info about module content
7 videos•Total 52 minutes
Module Welcome (1.1)•4 minutes
Lesson 1.1.1 – What is Cybersecurity and Why Do We Need It?•9 minutes
Lesson 1.1.2 – Access Controls: Passwords and Password Management•9 minutes
Lesson 1.1.3 – Hackers and Hacking•13 minutes
Lesson 1.1.4 – Malware•6 minutes
Lesson 1.1.5 – Theft, Natural Disasters, and Technology Issues•8 minutes
Module Conclusion (1.1)•2 minutes
6 assignments•Total 60 minutes
Lesson Quiz•6 minutes
Lesson Quiz 1.1.2•6 minutes
Lesson Quiz 1.1.3•6 minutes
Lesson Quiz 1.1.4•6 minutes
Lesson Quiz 1.1.5•6 minutes
Module Quiz•30 minutes
Module 1.2 – Social Engineering and Cybersecurity
Module 3•2 hours to complete
Module details
Social engineering is one of the most effective tools in a cyberattacker’s arsenal, targeting people rather than technology. This module explores how attackers use deception, impersonation, and manipulation—online and in person—to exploit human trust and gain access to sensitive systems and information. You’ll learn to recognize common attack techniques, such as phishing and business email compromise, and develop the skills to respond effectively and protect yourself and your organization.
What's included
7 videos6 assignments
Show info about module content
7 videos•Total 39 minutes
Welcome to the Module on Social Engineering and Cybersecurity (1.2)•3 minutes
Lesson 1.2.3 – Business Email Compromise•9 minutes
Lesson 1.2.4 – Ransomware•12 minutes
New Video•1 minute
Module Conclusion•1 minute
6 assignments•Total 60 minutes
Lesson Quiz•6 minutes
Lesson Quiz•6 minutes
Lesson Quiz•6 minutes
Lesson Quiz•6 minutes
Lesson Quiz•6 minutes
Module Quiz•30 minutes
Module 1.3 – Introducing Cybersecurity Threats and Attacks
Module 4•2 hours to complete
Module details
As remote work becomes more common, so do the cybersecurity risks that come with working outside the traditional office environment. In this module, employees will learn how to recognize and address the unique threats associated with remote work—ranging from insecure networks and devices to phishing, ransomware, and physical security risks. Each lesson provides practical guidance for safeguarding organizational data and personal devices through proper endpoint protection, secure communication, controlled remote access, and awareness of both digital and physical vulnerabilities. By the end of this module, you'll understand the essential security practices that help keep remote work safe, productive, and resilient.
What's included
7 videos1 reading6 assignments
Show info about module content
7 videos•Total 52 minutes
Welcome to Module 3•9 minutes
Lesson 1.3.1 – Remote Work Cybersecurity Challenges•9 minutes
Lesson 1.3.3 – Securing Communications during Remote Work•9 minutes
Lesson 1.3.4 – Secure Remote Access to Organizational Technology•9 minutes
Lesson 1.3.5 – Physical Security of Remote Devices•7 minutes
Conclusion•2 minutes
1 reading•Total 10 minutes
New Reading•10 minutes
6 assignments•Total 60 minutes
Lesson Quiz•6 minutes
Lesson Quiz•6 minutes
Lesson Quiz•6 minutes
Lesson Quiz•6 minutes
Lesson Quiz•6 minutes
Module Quiz•30 minutes
Module 1.4 – Employee's Role in Cybersecurity
Module 5•2 hours to complete
Module details
Cybersecurity is not just the responsibility of IT professionals—every employee plays a vital role in protecting an organization’s information assets and reputation. This module explores how employees contribute to cybersecurity through policy compliance, responsible use of technology, legal awareness, and professional online conduct. By understanding expectations and taking action in everyday situations, employees help safeguard the organization from threats and support a culture of accountability, trust, and resilience.
What's included
7 videos6 assignments
Show info about module content
7 videos•Total 61 minutes
Welcome•5 minutes
Lesson 1.4.1 – What is Cybersecurity Policy?•12 minutes
Lesson 1.4.2 – Fair and Responsible Use of Information Assets•11 minutes
Lesson 1.4.3 – Legal and Regulatory Requirements for Cybersecurity •16 minutes
Lesson 1.4.4 – The Employee's Role in Incident Response•9 minutes
Congratulations on completing An Employee’s Guide to Cybersecurity! You've taken an important step in becoming a more informed, proactive, and responsible member of your organization’s cybersecurity mission. By understanding threats, following policies, and adopting secure behaviors—both online and offline—you help protect not only your company’s information but also your coworkers, customers, and community.
Remember, cybersecurity is not a one-time task—it’s an ongoing responsibility we all share. Stay curious, stay vigilant, and continue applying what you’ve learned to keep yourself and your organization secure. Thank you for your commitment to building a safer workplace. Well done!
Kennesaw State is a Carnegie-designated doctoral research institution (R2), placing it among an elite group of only 6 percent of U.S. colleges. A leader in innovative teaching and learning, KSU is making an impact across the region, the nation and around the world. As the third largest university in the state of Georgia, Kennesaw State has nearly 45,000 students enrolled in over 180 undergraduate, master’s, doctoral degree and certificate programs.
When will I have access to the lectures and assignments?
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
What will I get if I subscribe to this Specialization?
When you enroll in the course, you get access to all of the courses in the Specialization, and you earn a certificate when you complete the work. Your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Is financial aid available?
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.