Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Security Awareness (Second Edition)
This course is provided by Wintrac. Wintrac provides one stop shopping for all your IT training needs. Wintrac’s course catalog of over two thousand courses includes courses on Desktop Application Software training, E-Mail/Groupware training, Office Suite training, Operating Systems training, Presentations training, Spreadsheets training, Web Browsers training and Word Processing training

Overview

In today's organizational environment, almost every role involves working with computers in some manner. Recent events indicate that security breaches can happen to almost any computer user, at home or office. This course is intended to provide you with an introduction to common security threats and issues, as well as ways to counteract them. Course Objectives

You will identify and apply security techniques.

Prerequisites

Students should understand fundamental computer concepts, such as how to run applications, manage files, and use a web browser.

Target Student
End users who use computers at home or in the office. Performance-Based Objectives

Upon successful completion of this course, students will be able to:

  • examine the need for information security.
  • identify common social engineering exploits and how to counteract their effectiveness. You will also determine when to implement the practices that help thwart attempted social engineering attacks.
  • explore the basic security concepts and practices related to computers, networks, and the Internet.
  • identify the ways to share and transfer files, back up data, encrypt and decrypt files, and to dispose of information.
  • identify and protect your information against risks associated with the cyber world.
  • identify potential security incidents and the ways to respond in the event of a possible breach.
Delivery Method
Instructor led, group-paced, classroom-delivery learning model with structured hands-on activities. Course duration 1 Day(s) Course outline Lesson 1: Securing Information
  • Topic 1A: Understand Information Security
  • Topic 1B: Implement Physical Security Measures
  • Topic 1C: Identify the Need for Cyber Security
Lesson 2: Counteracting Social Engineering Exploits
  • Topic 2A: Identify Social Engineering Exploits
  • Topic 2B: Counteract Social Engineering Exploits
  • Topic 2C: Evolve Social Engineering Organization Policies
Lesson 3: Identifying Security Measures
  • Topic 3A: Strengthen Desktop Security
  • Topic 3B: Strengthen Software Security
  • Topic 3C: Strengthen Network Security
Lesson 4: Maintaining File Security
  • Topic 4A: Back Up Data
  • Topic 4B: Implement File Security
  • Topic 4C: Disposal of Computer Information
Lesson 5: Guarding Against Attacks
  • Topic 5A: Identify Email Security Threats
  • Topic 5B: Protect Computers from Virus Attacks
  • Topic 5C: Block Spyware
Lesson 6: Handling Security Breaches
  • Topic 6A: Identify Incidents
  • Topic 6B: Respond to Incidents
Appendix A: Security and Privacy Regulations
Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved