In this course, you will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect yourself from those risks.
•Identify the need for security.
•Secure devices like desktops, laptops, smartphones, and more.
•Use the Internet securely.
Instructor did a great job, from experience this subject can be a bit dry to teach but he was able to keep it very engaging and made it much easier to focus.
Excellent presentation skills, subject matter knowledge, and command of the environment.
Instructor was outstanding. Knowledgeable, presented well, and class timing was perfect.
Click here to print this page »
To ensure your success in this course, you should have experience with the basic use of conventional end-user technology, including desktop, laptop, or tablet computers; mobile phones; and basic Internet functions, such as web browsing and email.
Detailed Class Syllabus
Lesson 1: Identifying the Need for Security
Topic A: Identify Security Compliance Requirements
Topic B: Recognize Social Engineering and Avoid Phishing and Other Attacks
Lesson 2: Securing Devices
Topic A: Maintain Physical Security of Devices
Topic B: Use Passwords for Security
Topic C: Protect Your Data
Topic D: Identify and Mitigate Viruses, Ransomware, and Other Malware
Topic E: Use Wireless Devices Securely
Lesson 3: Using the Internet Securely
Topic A: Browse the Web Safely
Topic B: Use Email Securely
Topic C: Use Social Networking Securely
Topic D: Use Cloud Services Securely