This course is provided by Wintrac.
Wintrac provides one stop shopping for all your IT training needs. Wintrac’s course catalog of over two thousand courses includes courses on
Desktop Application Software training,
E-Mail/Groupware training,
Office Suite training,
Operating Systems training,
Presentations training,
Spreadsheets training,
Web Browsers training and
Word Processing training
Overview
In today's organizational environment, almost every role involves working with computers in some manner. Recent events indicate that security breaches can happen to almost any computer user, at home or office. This course is intended to provide you with an introduction to common security threats and issues, as well as ways to counteract them.
Course Objectives
You will identify and apply security techniques.
Prerequisites
Students should understand fundamental computer concepts, such as how to run applications, manage files, and use a web browser.
Target Student
End users who use computers at home or in the office.
Performance-Based Objectives
Upon successful completion of this course, students
will be able to:
-
examine the need for information security.
- identify common social engineering exploits and how to counteract their effectiveness. You will also determine when to implement the practices that help thwart attempted social engineering attacks.
- explore the basic security concepts and practices related to computers, networks, and the Internet.
- identify the ways to share and transfer files, back up data, encrypt and decrypt files, and to dispose of information.
- identify and protect your information against risks associated with the cyber world.
- identify potential security incidents and the ways to respond in the event of a possible breach.
Delivery Method
Instructor led, group-paced, classroom-delivery learning model with structured hands-on activities.
Course duration
1 Day(s)
Course outline
Lesson 1: Securing Information
- Topic 1A: Understand Information Security
- Topic 1B: Implement Physical Security Measures
- Topic 1C: Identify the Need for Cyber Security
Lesson 2: Counteracting Social Engineering Exploits
- Topic 2A: Identify Social Engineering Exploits
- Topic 2B: Counteract Social Engineering Exploits
- Topic 2C: Evolve Social Engineering Organization Policies
Lesson 3: Identifying Security Measures
- Topic 3A: Strengthen Desktop Security
- Topic 3B: Strengthen Software Security
- Topic 3C: Strengthen Network Security
Lesson 4: Maintaining File Security
- Topic 4A: Back Up Data
- Topic 4B: Implement File Security
- Topic 4C: Disposal of Computer Information
Lesson 5: Guarding Against Attacks
- Topic 5A: Identify Email Security Threats
- Topic 5B: Protect Computers from Virus Attacks
- Topic 5C: Block Spyware
Lesson 6: Handling Security Breaches
- Topic 6A: Identify Incidents
- Topic 6B: Respond to Incidents
Appendix A: Security and Privacy Regulations