You will identify and apply security techniques.
Target Student
This course is intended for end users who use computers at home or in the office.
Prerequisites
Students should understand fundamental computer concepts, such as how to run applications, manage files, and use a web browser.
Course Objectives
Upon successful completion of this course, students will be able to:
- describe the importance of securing information.
- identify the different ways to guard yourself against social engineering exploits.
- describe the security practices related to computers, mobile devices, networks, and the Internet.
- maintain the security of the files and folders stored on your computing devices.
- identify and protect information against risks associated with the cyber world.
- identify potential security incidents, ways to respond in the event of a possible breach, and measures to prevent a security breach.
- identify methods to keep the cloud and virtualized environments secured..
Hardware Requirements
For the Instructor's Desktop Computer
This course requires a laptop computer for the instructor with the following configuration:
- Intel® Pentium® 1.0 GHz or higher processor.
- 1 GB of RAM or higher.
- A generic monitor with a resolution of 1024 x 768 or higher.
- 40 GB of hard disk space or larger.
- A 512 MB graphics processor that supports Microsoft® DirectX® 9.0.
- Support for audio output.
- A DVD-ROM drive.
- A network adaptor.
- A high-speed Internet connection.
- A USB 2.0 thumb drive with a minimum capacity of 1 GB. (If available, supply one to the students.)
- A display system to project the instructor’s computer screen.
For the Instructor's Laptop
The following are the hardware requirements for the instructor computer:
- Intel® Pentium® 1.0 GHz or higher processor.
- 1 GB of RAM or higher.
- 40 GB of hard disk space or larger.
- A DVD-ROM drive.
- Support for audio output.
- A high-speed Internet connection.
- A projector display system to project the instructor’s computer screen.
For Student Desktop Computers
This course requires one desktop computer for each student with the following configuration:
- Intel® Pentium® IV 800 MHz or higher processor.
- 512 MB of RAM or higher.
- A generic monitor with a resolution of 1024 x 768 or higher.
- 40 GB of hard disk space or larger.
- A 512 MB graphics processor that supports DirectX® 9.0.
- Support for audio output.
- A DVD-ROM drive.
- A network adapter.
- A high-speed Internet connection
.
Software Requirements
Each computer requires the following software:
- Microsoft® Windows® 7 Professional Edition.
- Microsoft Silverlight should be installed on the Instructor and Student machines. It is available at http://www.microsoft.com/getsilverlight/Get-Started/Install/Default.aspx. Copy Silverlight.exe to the Identifying Security measures folder created during the extraction of the course data files.
- Spybot — Search & Destroy. A third-party security tool. It is available at http://www.safer-networking.org/en/mirrors/downloadmirrors1.html. Copy the spybotsd162.exe file to the Identifying Security measures folder created during the extraction of the course data files.
Course duration
1 Day
Course outline
Lesson 1: Securing Information
- Topic 1A: Examine Information Security
- Topic 1B: Implement Physical Security Measures
- Topic 1C: Examine Cyber Security
Lesson 2: Guarding Against Social Engineering Exploits
- Topic 2A: Identify Social Engineering Exploits
- Topic 2B: Counteract Social Engineering Exploits
- Topic 2C: Evolve Social Engineering Organization Policies
Lesson 3: Identifying Security Measures
- Topic 3A: Strengthen Desktop Security
- Topic 3B: Strengthen Software Security
- Topic 3C: Strengthen Browser Security
- Topic 3D: Strengthen Network Security
- Topic 3E: Secure Wireless Networks
- Topic 3F: Strengthen Mobile Security
Lesson 4: Maintaining File System Security
- Topic 4A: Implement File System Security in Windows 7
- Topic 4B: Back Up and Restore Data
- Topic 4C: Dispose of Data Securely
Lesson 5: Guarding Against Attacks
- Topic 5A: Protect a Computer from Security Threats
- Topic 5B: Protect Computers from Virus Attacks
- Topic 5C: Protect Computers from Social Network Threats
Lesson 6: Handling Security Breaches
- Topic 6A: Identify Incidents
- Topic 6B: Respond to Incidents
Lesson 7: Identifying Cloud Computing And Virtualization Security Methods
- Topic 7A: Fundamentals of Cloud Computing
- Topic 7B: Fundamentals of Virtualization
Appendix A: Security and Privacy Regulations