Get in Touch

Course Outline

Lesson 1: Identifying Security Compliance Measures

  • Identify organizational compliance requirements and resources
  • Identify legal compliance requirements and resources

Lesson 2: Recognizing and Addressing Social Engineering Attacks

  • Recognize social engineering attacks
  • Defend against social engineering attacks

Lesson 3: Securing Devices

  • Maintain the physical security of devices
  • Utilize secure authentication methods
  • Protect your data
  • Defend against malware
  • Use wireless devices securely

Lesson 4: Using the Internet Securely

  • Browse the web safely
  • Use email securely
  • Use social networks securely
  • Use cloud services securely
  • Work from remote locations securely

Requirements

To ensure your success in this course, you should possess basic proficiency with conventional end-user technology. This includes familiarity with desktop, laptop, or tablet computers, mobile phones, and fundamental Internet functions such as web browsing and email.

 7 Hours

Testimonials (3)

Related Categories