Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Security Awareness (Fourth Edition)
Overview

You will identify and apply security techniques.

Target Student

This course is intended for end users who use computers at home or in the office.

Prerequisites

Students should understand fundamental computer concepts, such as how to run applications, manage files, and use a web browser.

Course Objectives

Upon successful completion of this course, students will be able to:

  • describe the importance of securing information.
  • identify the different ways to guard yourself against social engineering exploits.
  • describe the security practices related to computers, mobile devices, networks, and the Internet.
  • maintain the security of the files and folders stored on your computing devices.
  • identify and protect information against risks associated with the cyber world.
  • identify potential security incidents, ways to respond in the event of a possible breach, and measures to prevent a security breach.
  • identify methods to keep the cloud and virtualized environments secured..
Hardware Requirements

For the Instructor's Desktop Computer

This course requires a laptop computer for the instructor with the following configuration:
  • Intel® Pentium® 1.0 GHz or higher processor.
  • 1 GB of RAM or higher.
  • A generic monitor with a resolution of 1024 x 768 or higher.
  • 40 GB of hard disk space or larger.
  • A 512 MB graphics processor that supports Microsoft® DirectX® 9.0.
  • Support for audio output.
  • A DVD-ROM drive.
  • A network adaptor.
  • A high-speed Internet connection.
  • A USB 2.0 thumb drive with a minimum capacity of 1 GB. (If available, supply one to the students.)
  • A display system to project the instructor’s computer screen.
For the Instructor's Laptop

The following are the hardware requirements for the instructor computer:
  • Intel® Pentium® 1.0 GHz or higher processor.
  • 1 GB of RAM or higher.
  • 40 GB of hard disk space or larger.
  • A DVD-ROM drive.
  • Support for audio output.
  • A high-speed Internet connection.
  • A projector display system to project the instructor’s computer screen.
For Student Desktop Computers

This course requires one desktop computer for each student with the following configuration:
  • Intel® Pentium® IV 800 MHz or higher processor.
  • 512 MB of RAM or higher.
  • A generic monitor with a resolution of 1024 x 768 or higher.
  • 40 GB of hard disk space or larger.
  • A 512 MB graphics processor that supports DirectX® 9.0.
  • Support for audio output.
  • A DVD-ROM drive.
  • A network adapter.
  • A high-speed Internet connection
.
Software Requirements

Each computer requires the following software:
  • Microsoft® Windows® 7 Professional Edition.
  • Microsoft Silverlight should be installed on the Instructor and Student machines. It is available at http://www.microsoft.com/getsilverlight/Get-Started/Install/Default.aspx. Copy Silverlight.exe to the Identifying Security measures folder created during the extraction of the course data files.
  • Spybot — Search & Destroy. A third-party security tool. It is available at http://www.safer-networking.org/en/mirrors/downloadmirrors1.html. Copy the spybotsd162.exe file to the Identifying Security measures folder created during the extraction of the course data files.
Course duration

1 Day

Course outline

Lesson 1: Securing Information
  • Topic 1A: Examine Information Security
  • Topic 1B: Implement Physical Security Measures
  • Topic 1C: Examine Cyber Security
Lesson 2: Guarding Against Social Engineering Exploits
  • Topic 2A: Identify Social Engineering Exploits
  • Topic 2B: Counteract Social Engineering Exploits
  • Topic 2C: Evolve Social Engineering Organization Policies
Lesson 3: Identifying Security Measures
  • Topic 3A: Strengthen Desktop Security
  • Topic 3B: Strengthen Software Security
  • Topic 3C: Strengthen Browser Security
  • Topic 3D: Strengthen Network Security
  • Topic 3E: Secure Wireless Networks
  • Topic 3F: Strengthen Mobile Security
Lesson 4: Maintaining File System Security
  • Topic 4A: Implement File System Security in Windows 7
  • Topic 4B: Back Up and Restore Data
  • Topic 4C: Dispose of Data Securely
Lesson 5: Guarding Against Attacks
  • Topic 5A: Protect a Computer from Security Threats
  • Topic 5B: Protect Computers from Virus Attacks
  • Topic 5C: Protect Computers from Social Network Threats
Lesson 6: Handling Security Breaches
  • Topic 6A: Identify Incidents
  • Topic 6B: Respond to Incidents
Lesson 7: Identifying Cloud Computing And Virtualization Security Methods
  • Topic 7A: Fundamentals of Cloud Computing
  • Topic 7B: Fundamentals of Virtualization
Appendix A: Security and Privacy Regulations
Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved