Security Awareness

Course Overview

This course provides students with the basic knowledge and skills to understand and implement security awareness at home or in business.

Course Introduction 3m

Module 00Course Overview 14m

What is Security Awareness?
Security Domains
What is Security?
Are You at Risk?
So What About You?
What are the Goals of this Course?
What Will We Cover?
Is it Too Late?
Module 00 Review

Module 01 – Types of Security Threats 29m
Types of Security Threats
Your Computer
Your Internet
Your Words
Your E-mail
Your Home
Your Files
Module 01 Review

Module 02 – Social Engineering 30m
Social Engineering
What is Social Engineering?
Social Engineering Defense
Why Does it Work?
Fooling People
What Else Can Be Done?
Personal Precautions
Module 02 Review

Module 03 – Identity Theft 29m
Identity Theft
What is Identity Theft?
How Does it Happen?
How to Defend Yourself
What Criminals Do with Your Information
How Can You Tell if You’re a Victim?
Actions to Take if You are a Victim
Contact Information
Module 03 Review

Module 04 – Data Classification 46m
Data Classification
Policies for Data Sharing
Least Privilege
How to Classify
Types of Classifications
Jurisdictional Issues
Your Involvement
What Could Happen?
What Type of Policies?
How to Destroy Data
Module 04 Review

Module 05 – Protecting Your Digital Information 46m
Protecting Your Digital Information
Why Do a Backup?
Types of Backups
What to Backup
Where to Store Backups
How to Perform Backups
Demo – Backups
Backup Utilities
Backup Management Practices
Demo – Password Management
Password Management
Module 05 Review

Module 06Malware 45m
Basic Definitions
What to Look For
How You Can Get Infected
Software Detection
Hardware Detection
Cloud Detection
Know the Extensions
Demo – Knowing Your Extensions
Your Defenses
Module 06 Review

Module 07 – Security from End-to-End 1h 15m
Security from End-to-End
Physical Security
Home/Workstation Security
Demo – EFS
Hand Held Electronics
Workstation Software
Updating the OS and Software
Secure E-mail Use
E-mail Encryption
E-mail Hazards
How to Stop SPAM
E-mail Attachments
Other E-mail Warnings
What if You Get Malware from E-mail?
How to Avoid SPAM
Secure Web Browsing
Demo – Secure Web Browsing
Secure Instant Messaging / Social Sites
Module 07 Review

Module 08Piracy 16m
What is Intellectual Property
Software Piracy
Types of Piracy
Module 08 Review

Module 09 – Security Policies 18m
Security Policies
Security Policies
Why are Policies Important
Defining an Incident
Response Teams
Response Checklist
Module 09 Review

Module 10 – Moving Forward 13m
Moving Forward
Education and Awareness
Know the Principles of Security Domains
Module 10 Review

Course Closure

Total Duration: 6h 16m

Leave Comment