Back to Platform

eu-leaders high tech course

0% Complete
0/0 Steps
  1. 1. e-leadership styles & e-management strategies
    5 Topics
    |
    1 Quiz
  2. 2. e-ethics
    2 Topics
    |
    1 Quiz
  3. 3. e-social skills and e-team building skills
    4 Topics
    |
    1 Quiz
  4. 4. Information and data literacy
    6 Topics
    |
    1 Quiz
  5. 5. Information security
    6 Topics
    |
    1 Quiz
  6. 6. e-technology Skills – Innovative digital tools
    5 Topics
    |
    1 Quiz
  7. 7. Evaluation and effective follow up techniques
    5 Topics
    |
    1 Quiz
Module Progress
0% Complete

1

Information security is essential, and a breach can have serious consequences.

2

Phishing attacks, malware and ransomware, are common information security threats.

3

The General Data Protection Regulation (GDPR) is a prominent cybersecurity regulation and standard.

4

Protecting information includes using strong passwords, maintaining network security, and ensuring mobile device security.

5

An incident response plan should be in place, including key components for an effective response.

6

Information security can be evaluated through risk assessment, evaluation of security controls, evaluation of compliance and evaluation of management practices.

7

Managers can be involved in responding to information security incidents.

© 2023 – E(U)Leaders 🇪🇺 | handcrafted & powered with  by p-consulting.gr