Security Awareness

Security Awareness

This course provides students with the basic knowledge and skills to understand and implement security awareness at home or in business.

WHO SHOULD ATTEND

 

PREREQUISITE

There are no prerequisites for this course.

WHAT YOU WILL LEARN

Course Introduction
  • Course Introduction
Module 00 - Course Overview
  • Course Overview
  • What is Security Awareness?
  • Security Domains
  • What is Security?
  • Are You at Risk?
  • So What About You?
  • What are the Goals of this Course?
  • What Will We Cover?
  • Surprise!
  • Is it Too Late?
  • Red Flags
  • Module 00 Review
Module 01 - Types of Security Threats
  • Course Overview
  • Types of Security Threats
  • Your Computer
  • Your Internet
  • Yourself
  • Your Words
  • Your E-mail
  • Your Home
  • Your Files
  • Module 01 Review
Module 03 - Identity Theft
  • Identity Theft
  • What is Identity Theft?
  • How Does it Happen?
  • How to Defend Yourself
  • What Criminals Do with Your Information
  • How Can You Tell if You’re a Victim?
  • Actions to Take if You are a Victim
  • Your Home
  • Contact Information
  • Module 03 Review
Module 04 - Data Classification
  • Data Classification
  • Policies for Data Sharing
  • Least Privilege
  • How to Classify
  • Types of Classifications
  • Jurisdictional Issues
  • Your Involvement
  • What Could Happen?
  • What Type of Policies?
  • How to Destroy Data
  • Module 04 Review
Module 05 - Protecting Your Digital Information
  • Protecting Your Digital Information
  • Why Do a Backup?
  • Types of Backups
  • What to Backup
  • Where to Store Backups
  • How to Perform Backups
  • Demo - Backups
  • Backup Utilities
  • Backup Management Practices
  • Passwords
  • Demo - Password Management
  • Password Management
  • AAA
  • Module 05 Review
Module 06 - Malware
  • Malware
  • Basic Definitions
  • What to Look For
  • How You Can Get Infected
  • Software Detection
  • Hardware Detection
  • Cloud Detection
  • Know the Extensions
  • Demo - Knowing Your Extensions
  • Your Defenses
  • Module 06 Review
Module 07 - Security from End-to-End
  • Security from End-to-End
  • Physical Security
  • Home/Workstation Security
  • Encryption
  • Demo - EFS
  • Hand Held Electronics
  • Workstation Software
  • Updating the OS and Software
  • Secure E-mail Use
  • E-mail Encryption
  • E-mail Hazards
  • How to Stop SPAM
  • E-mail Attachments
  • Other E-mail Warnings
  • What if You Get Malware from E-mail?
  • How to Avoid SPAM
  • Secure Web Browsing
  • Demo - Secure Web Browsing
  • Secure Instant Messaging / Social Sites
  • Module 07 Review
Module 08 - Piracy
  • Piracy
  • What is Intellectual Property
  • Copyrights
  • Software Piracy
  • Types of Piracy
  • Risks
  • Module 08 Review
Module 09 - Security Policies
  • Security Policies
  • Why are Policies Important
  • Defining an Incident
  • Response Teams
  • Response Checklist
  • Module 09 Review
Module 10 - Moving Forward
  • Moving Forward
  • Education and Awareness
  • Individuals
  • Organizations
  • Know the Principles of Security Domains
  • Module 10 Review
  • Course Closure