Overview

This instructor led, online training course allows organizations to increase their security defenses quickly and with minimal investment by ensuring that end-users are equipped with the knowledge necessary to be effective defenders of their organizations’ data. The program is designed for non-technical end-users of computers, mobile devices, networks, and the Internet.

All individuals that have access to an organization’s information systems require a thorough understanding of their effect on cybersecurity. In this course, students will learn to identify many of the common risks involved in using conventional end-user technology, how to use it safely, how to protect themselves and their organizations from malicious threats.

Course Instructor: Derrick Coston

Course Outline

01. Introduction

  • Breaches

02. The Human Factor

  • Working from home as a user

03. Your Cubicle

04. The Trouble with Passwords

  • Building better passwords
  • Multifactor Authentication

05. Social Engineering

  • Types of Social Engineering attacks
  • Diversion theft
  • Social engineering defenses

06. Phishing

  • Email Phishing
  • Spear Phishing
  • Whaling
  • Smishing
  • Vishing
  • Clone Phishing
  • Phishing techniques
  • Phishing Mitigation

07. Working Remotely

08. Your Company

  • A safe place to work
  • Malware eradication
  • Symptoms of virus infection
  • Layered security and defense in depth
  • Least privileges
  • Insider threats
  • Your mobile devices

09. International travel concerns

10. Advanced Persistent Threats

11. Conclusion

Skills Learned

After completing this online training course, students will be able to:

  • Understand the latest risks involved in using the technology available in today’s workplaces
  • How to become an active contributor to the security of your company’s assets
  • Recognize insider threats and close the door on intruders
  • Securing your devices and accommodating remote work locations
  • Responsible use of the Internet