Autoplay
Autocomplete
HTML5
Flash
Player
Speed
Previous Lecture
Complete and continue
The Security Culture Framework Online Certification Course
Introducing Security Culture
Lecture 1.1: Welcome! (18:08)
Reading 1.1: The Characteristics of Culture (according to sociology)
Reading 1.2: How to build security culture
Reading 1.3: 5 Reasons Security Awareness Programs Fail
Quiz 1.1: Culture
Building Security Culture
Lecture 2.1: Building Culture (5:47)
Reading 2.1: Why you should not do awareness trainings
Reading 2.2: Bruce Schneier on awareness
Quiz 2.1: Awareness trainings
Lecture 2.2: What is culture? (2:46)
Reading 2.3: Data support need for awareness
Lecture 2.3: Impact on culture (4:21)
Lecture 2.4: Where is that dang culture!? (4:05)
Quiz 2.2: Culture
The Security Culture Framework Process
Lecture 3.1: Introducing the Security Culture Framework (8:03)
Task 3.1: Get to know the SCF
Reading 3.1: Culture: Why it´s the hottest topic in business today
Lecture 3.2: The Security Culture Process (3:16)
Lecture 3.3: The Security Culture Campaign (5:48)
Hangout: The first live!
Quiz 3.1: Successful Training Programs
Metrics: Setting goals and measuring progress
Lecture 4.1: The Metrics Element (3:21)
Reading 4.1: Why Metrics Drive Mediocrity
Lecture 4.2: Gone Sailing! (1:35)
Reading 4.2: SANS: A guide to Security Metrics
Lecture 4.3: Why do we need metrics? (3:32)
Lecture 4.4: How do we measure? (5:19)
Reading 4.3: Soft and Hard data for Metrics
Lecture 4.5: What do we measure? (2:00)
Quiz 4.1: Metrics
Lecture 4.6: Result Goals (5:02)
(BONUS) Lecture 4.6.2: : Fuzzy Goals (8:11)
Lecture 4.7: Learning Goals (4:02)
Assignment 1: Metrics and Goals
Lecture 4.8: Wrapping up metrics (1:27)
Organization: Audiences and Stakeholders
Lecture 5.0: Welcome to People! (4:07)
Hangout #2: Organization
Lecture 5.1: Organizer (2:38)
Lecture 5.2: Who do I involve (8:07)
Reading: Employee Engagement Strategy is from Bottom-up
Lecture 5.3: Stakeholders (4:11)
Reading: Stakeholder Analysis
Lecture 5.4: C-Level buy-in (3:46)
Lecture 5.5: Audience Analysis (7:42)
Exercise: Empathy Mapping
Lecture 5.6: Adapting the Message (1:52)
Assignment 2: Organizing People
Lecture 5.7: Wrap-up Organization (2:20)
OPTIONAL: Promoting an Information Security Culture
Topics: Activities to build Culture
Lecture 6.1: Topics (4:45)
Lecture 6.2: Choosing Topics (5:35)
Reading: Getting employee training right
Lecture 6.3: Inspiring Topics (7:41)
Lecture 6.4: Activities (8:24)
Reading: Onboarding
Quiz
Hangout #3: Topics
Assignment: Topics
Lecture 6.5: Wrapup (2:10)
Planner: Ready, Set, Go!
Lecture 7.1: The Planner (1:52)
Reading: Good Plans or Good Execution?
Lecture 7.2: Must I plan (9:32)
Reading: The Execution Trap
Lecture 7.3: Keeping Control (4:39)
Lecture 7.4: Measure and Adjust (6:35)
Quiz 7.1: Making Plans
Lecture 7.5: The 12 Week Campaign (8:40)
Quiz 7.2: 12 week campaign template
Final Assignment
Hangout #4: Planner
What now?
Lecture 8.1: Holistic Approach (3:36)
Lecture 8.2: The Process (5:49)
Reading: Get Success
Lecture 8.3: Starting from Scratch (4:18)
Hangout: Farewell and Thanks for all the Fun
Lecture 8.4: What Now! (11:05)
Certificates and CPE´s
Thank you!
Quiz 3.1: Successful Training Programs
Lecture content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock