Skip to main Content

Security Awareness

  • Code training SECAW
  • Duur 1 dag

Klassikale training Prijs

eur595,00

(excl. BTW)

Vraag een groepstraining aan Schrijf je in

Methode

Deze training is in de volgende formats beschikbaar:

  • Klassikale training

    Klassikaal leren

  • Op locatie klant

    Op locatie klant

  • Virtueel leren

    Virtueel leren

Vraag deze training aan in een andere lesvorm.

Trainingsbeschrijving

Naar boven

Security specialists often see users as the biggest threat to information security. In cases of data loss, users' behavior is often described as naive, casual and even malicious. No surprise, since in 87% of those cases users had not received any training.

Skillsoft Global Knowledge's security awareness program teaches employees to become aware of common risks, what role they have and what their responsibilities are within the organization, when it comes to and information security.

In this 1-day course you will identify and apply security techniques.

Doelgroep

Naar boven
This course is intended for end users who use computers at home or in the office.

Trainingsdoelstellingen

Naar boven
Upon successful completion of this course, students will be able to:
  • describe the importance of securing information.
  • identify the different ways to guard yourself against social engineering exploits.
  • describe the security practices related to computers, mobile devices, networks, and the Internet.
  • maintain the security of the files and folders stored on your computing devices.
  • identify and protect information against risks associated with the cyber world.
  • identify potential security incidents, ways to respond in the event of a possible breach, and measures to prevent a security breach.
  • identify methods to keep the cloud and virtualized environments secured.

Inhoud training

Naar boven

Lesson 1: Securing Information

  • Topic 1A: Examine Information Security
  • Topic 1B: Implement Physical Security Measures
  • Topic 1C: Examine Cyber Security


Lesson 2: Guarding Against Social Engineering Exploits

  • Topic 2A: Identify Social Engineering Exploits
  • Topic 2B: Counteract Social Engineering Exploits
  • Topic 2C: Evolve Social Engineering Organization Policies

Lesson 3: Identifying Security Measures

  • Topic 3A: Strengthen Desktop Security
  • Topic 3B: Strengthen Software Security
  • Topic 3C: Strengthen Browser Security
  • Topic 3D: Strengthen Network Security
  • Topic 3E: Secure Wireless Networks
  • Topic 3F: Strengthen Mobile Security


Lesson 4: Maintaining File System Security

  • Topic 4A: Implement File System Security in Windows
  • Topic 4B: Back Up and Restore Data
  • Topic 4C: Dispose of Data Securely


Lesson 5: Guarding Against Attacks

  • Topic 5A: Protect a Computer from Security Threats
  • Topic 5B: Protect Computers from Virus Attacks
  • Topic 5C: Protect Computers from Social Network Threats


Lesson 6: Handling Security Breaches

  • Topic 6A: Identify Incidents
  • Topic 6B: Respond to Incidents


Lesson 7: Identifying Cloud Computing And Virtualization Security Methods

  • Topic 7A: Fundamentals of Cloud Computing
  • Topic 7B: Fundamentals of Virtualization
  • Appendix A: Security and Privacy Regulations

Voorkennis

Naar boven
Students should understand fundamental computer concepts, such as how to run applications, manage files, and use a web browser
Cookie Control toggle icon