Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Security Awareness: Concepts and Practices
Overview

In today's organizational environments, almost every job role involves working with computers in some manner. Recent news events indicate that security breaches can happen to almost any computer user, on home systems or in corporate or organizational environments. This course is intended to provide you with an introduction to common security threats and issues, as well as ways that you can counteract them.

Course Objectives

You will identify and apply security techniques to common job activities.

Prerequisites

Internet Explorer 6.0: Introduction, Netscape 6: Introduction, Introduction to Personal Computing using Windows XP, and Introduction to Networks and the Internet, or equivalent knowledge.

Target Student
Students should understand fundamental computer concepts, such as how to run applications, manage files, and use a Web browser. Performance-Based Objectives Upon successful completion of this course, students will be able to:
  • Access a computer and a private network, and you will compare the security measures that are in place for each type of access.
  • Access the Internet, and identify several technologies that enhance information security on the Internet.
  • Share and transfer files, apply security updates, back up data, and encrypt and decrypt a file.
  • Identify and protect yourself and your information against risks associated with using email and email attachments.
  • Examine and use several software implementations that help protect your computer while you are working on the World Wide Web.
  • Identify common social engineering exploits, and how to counteract their effectiveness.
  • Determine when security has been compromised and what you should do in the event of a possible security breach.
Delivery Method
Instructor led, group-paced, classroom-delivery learning model with structured hands-on activities. Course duration 1 Day(s) Course outline Lesson 1: Gaining Computer and Network Access in a Secure Manner
  • Topic 1A: Implement Physical Security Measures
  • Topic 1B: Develop a Strong Password
  • Topic 1C: Implement a Strong Password
  • Topic 1D: Adjust Desktop Settings Related to Security
  • Topic 1E: Access a Network Securely
Lesson 2: Accessing the Internet in a Secure Manner
  • Topic 2A: Adjust Internet Settings Related to Security
  • Topic 2B: Identify Protective Technologies
  • Topic 2C: Implement a Firewall Solution
Lesson 3: Maintaining File Security
  • Topic 3A: Share Files Securely
  • Topic 3B: Transfer Files Securely
  • Topic 3C: Apply Software Security Updates
  • Topic 3D: Back Up and Restore Data
  • Topic 3E: Encrypt and Decrypt Files
Lesson 4: Using Email and Attachments in a Secure Manner
  • Topic 4A: Identify Email Security Risks
  • Topic 4B: Defend Against Email Security Risks
  • Topic 4C: Use Updated Definitions to Scan for Viruses
Lesson 5: Promoting Web Security
  • Topic 5A: Adjust Cookies Settings
  • Topic 5B: Identify Uses for Digital Certificates
Lesson 6: Counteracting Social Engineering Exploits
  • Topic 6A: Identify Social Engineering Exploits
  • Topic 6B: Counteract Social Engineering Exploits
Lesson 7: Handling Security Breaches
  • Topic 7A: Identify Incidents
  • Topic 7B: Respond to Incidents
Appendix A: Security and Privacy Regulations


Hardware Requirements
  • One PC, with a network card and live Internet connection, for the instructor and for each student. All keyboards should include a Windows logo key (WinKey).
  • Network hardware (hubs, cables, and the like) needed to provide the network and Internet environment
Software Requirements
  • Windows XP Professional
  • Support Pack 1A for Windows XP Professional
  • Symantec Norton AntiVirus 2004

Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved