This course is provided by Wintrac.
Wintrac provides one stop shopping for all your IT training needs. Wintrac’s course catalog of over two thousand courses includes courses on
Desktop Application Software training,
E-Mail/Groupware training,
Office Suite training,
Operating Systems training,
Presentations training,
Spreadsheets training,
Web Browsers training and
Word Processing training
Overview
In today's organizational environments, almost every job role involves working with computers in some manner. Recent news events indicate that security breaches can happen to almost any computer user, on home systems or in corporate or organizational environments. This course is intended to provide you with an introduction to common security threats and issues, as well as ways that you can counteract them.
Course Objectives
You will identify and apply security techniques to common job activities.
Prerequisites
Internet Explorer 6.0: Introduction, Netscape 6: Introduction, Introduction to Personal Computing using Windows XP, and Introduction to Networks and the Internet, or equivalent knowledge.
Target Student
Students should understand fundamental computer concepts, such as how to run applications, manage files, and use a Web browser.
Performance-Based Objectives
Upon successful completion of this course, students will be able to:
- Access a computer and a private network, and you will compare the security measures that are in place for each type of access.
- Access the Internet, and identify several technologies that enhance information security on the Internet.
- Share and transfer files, apply security updates, back up data, and encrypt and decrypt a file.
- Identify and protect yourself and your information against risks associated with using email and email attachments.
- Examine and use several software implementations that help protect your computer while you are working on the World Wide Web.
- Identify common social engineering exploits, and how to counteract their effectiveness.
- Determine when security has been compromised and what you should do in the event of a possible security breach.
Delivery Method
Instructor led, group-paced, classroom-delivery learning model with structured hands-on activities.
Course duration
1 Day(s)
Course outline
Lesson
1: Gaining Computer and Network Access in a Secure Manner
- Topic 1A: Implement Physical Security Measures
- Topic 1B: Develop a Strong Password
- Topic 1C: Implement a Strong Password
- Topic 1D: Adjust Desktop Settings Related to Security
- Topic 1E: Access a Network Securely
Lesson
2: Accessing the Internet in a Secure Manner
- Topic 2A: Adjust Internet Settings Related to Security
- Topic 2B: Identify Protective Technologies
- Topic 2C: Implement a Firewall Solution
Lesson
3: Maintaining File Security
- Topic 3A: Share Files Securely
- Topic 3B: Transfer Files Securely
- Topic 3C: Apply Software Security Updates
- Topic 3D: Back Up and Restore Data
- Topic 3E: Encrypt and Decrypt Files
Lesson
4: Using Email and Attachments in a Secure Manner
- Topic 4A: Identify Email Security Risks
- Topic 4B: Defend Against Email Security Risks
- Topic 4C: Use Updated Definitions to Scan for Viruses
Lesson
5: Promoting Web Security
- Topic 5A: Adjust Cookies Settings
- Topic 5B: Identify Uses for Digital Certificates
Lesson
6: Counteracting Social Engineering Exploits
- Topic 6A: Identify Social Engineering Exploits
- Topic 6B: Counteract Social Engineering Exploits
Lesson
7: Handling Security Breaches
- Topic 7A: Identify Incidents
- Topic 7B: Respond to Incidents
Appendix
A: Security and Privacy Regulations
Hardware Requirements
- One PC, with a network card and live Internet connection, for the instructor and for each student. All keyboards should include a Windows logo key (WinKey).
- Network hardware (hubs, cables, and the like) needed to provide the network and Internet environment
Software Requirements
- Windows XP Professional
- Support Pack 1A for Windows XP Professional
- Symantec Norton AntiVirus 2004