Skip to content
English
  • There are no suggestions because the search field is empty.

Big Ideas Collection

Big Ideas

BigIdeas_ClientMarketingFlyer_8-5x11_THUMBNAIL

Audience: General End User (All)
Difficulty Level: Foundational
Time: 8 modules, 3-5 minutes Videos + 10 Questions per Module

Availability: Available on Training as individual modules. Do not need to be assigned or watched together, designed to stand independently.

Modules:

  • Big Ideas: General Cybersecurity (3:46 Video) 
  • Big Ideas: Data Classification (3:59 Video)
  • Big Ideas: Password Management (4:03 Video)
  • Big Ideas: Phishing (3:58 Video)
  • Big Ideas: Personally Identifiable Information (PII) (3:57 Video)
  • Big Ideas: Privacy (4:11 Video)
  • Big Ideas: Privileged User/Permissions (4:04 Video)
  • Big Ideas: Vishing (3:30 Video)

Sample video: Big Ideas: Password Management

Marketing Materials:  Big Ideas Marketing Kit


Major Themes: Each module features an expert-driven conversation, where a single security concept is explained at three levels of difficulty. The conversations begin with a foundational level explanation accessible to all people, followed by an intermediate discussion accessible to most people, building upon the foundation laid in the first discussion. The modules conclude with an advanced discussion between an expert and an active professional to flesh out the concept for more advanced and ambitious learners.

Major Learning Concepts:

  • Big Ideas: General Cybersecurity
    • Protecting data
    • Personal responsibility
    • USB devices
    • Sensitive information in the open
    • Tailgating
    • Suspicious computer behavior
    • Unauthorized visitors
    • Reporting suspicious activity
    • Cybersecurity culture
  • Big Ideas: Data Classification
    • Definition of data classification
    • Public vs private data
    • Sensitive information
    • Private vs confidential
    • Value of data
    • Personal responsibility
  • Big Ideas: Password Management
    • Strong passwords
    • Passphrases
    • Access and influence
    • Consequences of a compromised password
    • Personal responsibility
    • Reporting compromised passwords
  • Big Ideas: Phishing
    • Definition of phishing
    • Social engineering
    • Phishing red flags
    • Phishing vs spam
    • Malicious links and attachments
    • Healthy suspicion
    • Reporting suspicious messages
  • Big Ideas: PII
    • Definition of personally identifiable information
    • Disposal of physical documents
    • Privacy
    • App permissions
    • Patient health information (PHI)
    • Collecting of personal information
    • Sensitive financial information
  • Big Ideas: Privacy
    • Definition of privacy
    • Importance of privacy
    • Sharing personal data with organizations
    • Privacy on social media
    • Risks of oversharing personal information
    • Personal responsibility
  • Big Ideas: Privileged User/Permissions
    • Definition of a privileged user
    • Sensitive information
    • Least privilege
    • Personal responsibility
    • Risks of elevated access
    • Personal responsibility
    • Relinquishing unnecessary access
    • Consequences of stolen access
  • Big Ideas: Vishing
    • Definition of vishing
    • Healthy paranoia
    • Verifying callers
    • Staying safe from vishing
    • Red flags for vishing
    • Organized cybercrime

🔍 View Big Ideas in your Living Security platform catalog here!