Overview
All individuals that have access to an organization’s information systems require a thorough understanding of their effect on cybersecurity. In this course, students will learn to identify many of the common risks involved in using conventional end-user technology, how to use it safely, how to protect themselves and their organizations from malicious threats.
Course Instructor: Derrick Coston
Course Outline
01. Introduction
- Breaches
02. The Human Factor
- Working from home as a user
03. Your Cubicle
04. The Trouble with Passwords
- Building better passwords
- Multifactor Authentication
05. Social Engineering
- Types of Social Engineering attacks
- Diversion theft
- Social engineering defenses
06. Phishing
- Email Phishing
- Spear Phishing
- Whaling
- Smishing
- Vishing
- Clone Phishing
- Phishing techniques
- Phishing Mitigation
07. Working Remotely
08. Your Company
- A safe place to work
- Malware eradication
- Symptoms of virus infection
- Layered security and defense in depth
- Least privileges
- Insider threats
- Your mobile devices
09. International travel concerns
10. Advanced Persistent Threats
11. Conclusion
Skills Learned
After completing this online training course, students will be able to:
- Understand the latest risks involved in using the technology available in today’s workplaces
- How to become an active contributor to the security of your company’s assets
- Recognize insider threats and close the door on intruders
- Securing your devices and accommodating remote work locations
- Responsible use of the Internet