Course Overview
This course provides students with the basic knowledge and skills to understand and implement security awareness at home or in business.
Course Introduction 3m
Module 00 –Course Overview 14m
What is Security Awareness?
Security Domains
What is Security?
Are You at Risk?
So What About You?
What are the Goals of this Course?
What Will We Cover?
Surprise!
Is it Too Late?
Module 00 Review
Module 01 – Types of Security Threats 29m
Types of Security Threats
Your Computer
Your Internet
Yourself
Your Words
Your E-mail
Your Home
Your Files
Module 01 Review
Module 02 – Social Engineering 30m
Social Engineering
What is Social Engineering?
Social Engineering Defense
Manipulation
Why Does it Work?
Fooling People
What Else Can Be Done?
Personal Precautions
Module 02 Review
Module 03 – Identity Theft 29m
Identity Theft
What is Identity Theft?
How Does it Happen?
How to Defend Yourself
What Criminals Do with Your Information
How Can You Tell if You’re a Victim?
Actions to Take if You are a Victim
Contact Information
Module 03 Review
Module 04 – Data Classification 46m
Data Classification
Policies for Data Sharing
Least Privilege
How to Classify
Types of Classifications
Jurisdictional Issues
Your Involvement
What Could Happen?
What Type of Policies?
How to Destroy Data
Module 04 Review
Module 05 – Protecting Your Digital Information 46m
Protecting Your Digital Information
Why Do a Backup?
Types of Backups
What to Backup
Where to Store Backups
How to Perform Backups
Demo – Backups
Backup Utilities
Backup Management Practices
Passwords
Demo – Password Management
Password Management
AAA
Module 05 Review
Module 06 – Malware 45m
Malware
Basic Definitions
What to Look For
How You Can Get Infected
Software Detection
Hardware Detection
Cloud Detection
Know the Extensions
Demo – Knowing Your Extensions
Your Defenses
Module 06 Review
Module 07 – Security from End-to-End 1h 15m
Security from End-to-End
Physical Security
Home/Workstation Security
Encryption
Demo – EFS
Hand Held Electronics
Workstation Software
Updating the OS and Software
Secure E-mail Use
E-mail Encryption
E-mail Hazards
How to Stop SPAM
E-mail Attachments
Other E-mail Warnings
What if You Get Malware from E-mail?
How to Avoid SPAM
Secure Web Browsing
Demo – Secure Web Browsing
Secure Instant Messaging / Social Sites
Module 07 Review
Module 08 – Piracy 16m
Piracy
What is Intellectual Property
Copyrights
Software Piracy
Types of Piracy
Risks
Module 08 Review
Module 09 – Security Policies 18m
Security Policies
Security Policies
Why are Policies Important
Defining an Incident
Response Teams
Response Checklist
Module 09 Review
Module 10 – Moving Forward 13m
Moving Forward
Education and Awareness
Individuals
Organizations
Know the Principles of Security Domains
Module 10 Review
Course Closure
Total Duration: 6h 16m