IT Security for End Users: IT Security
Fundamentals
Expected Duration (hours) 0.9
Overview/Description
Companies that have the greatest chance of fending
off IT security attacks are those that have employees who are armed with the
knowledge of how to use a company's computers, network, and mobile devices with
security in mind. In this course, you'll learn fundamental security concepts
that apply to use as an end user, like the role you play in your company's
overall IT security. This course also covers some of the most common IT
security policies that apply to you as an end user, including policies for
secure computer use, mobile device use, and general security policies if you
work remotely.
Target Audience
End users of computer systems and mobile devices
in a corporate environment, individuals interested in fundamentally secure
computers, and communications practices
Prerequisites
None
Lesson Objectives
describe
what IT security is and what it includes
identify
the role and purpose of IT security in the corporate environment
distinguish
between confidentiality, integrity, and availability security objectives
identify
the end user's role in overall IT security
describe
general IT policy characteristics
identify
computer and hardware security policy best practices
identify
mobile device security policy best practices
identify
e-mail and Internet security policy best practices
identify
social networking security policy best practices
identify
password security policy best practices
describe
the specific security considerations for remote users
identify
remote user security policy best practices
identify
fundamental IT security best practices for the work environment
IT Security for End Users: Using Corporate
Devices Securely
Expected Duration (hours) 0.8
Overview/Description
Knowing how to use corporate computers and
devices in a secure way helps ensure you don't jeopardize your work, your
organization, or your personal security. In this course you'll learn about
common threats to corporate computers, including malicious attacks, and best
practices for using your computer in ways that prevent these attacks. This
course also covers some of the security threats you might face when using
corporate mobile devices, and techniques you can use to protect your device and
yourself.
Target Audience
End users of computer systems and mobile devices
in a corporate environment, individuals interested in fundamentally secure
computers, and communications practices
Prerequisites
None
Lesson Objectives
describe
characteristics of human error threats to corporate computer security
describe
characteristics of malicious behavior that threatens corporate computer
security
identify
best practices for protecting your corporate computer against malicious
behavior
describe
characteristics and best practices for using file encryption and access
controls to protect your corporate computer
describe
characteristics and best practices for using system patches to protect your
corporate computer
describe
characteristics and best practices for using antivirus software to protect your
corporate computer
identify
potential physical security threats to corporate mobile devices
distinguish
between the different types of malware threats
identify
characteristics of threats to mobile devices via wireless networks
identify
best practices for securing corporate mobile devices against common physical
threats
identify
best practices for securing corporate mobile devices against common malware
threats
identify
best practices for securing corporate mobile devices against common wireless
network threats
identify
best practices for securing both corporate computers and corporate mobility
devices against common threats
IT Security for End Users: Secure Corporate
Communications and Networking
Expected Duration (hours) 1.3
Overview/Description
The advancement in corporate communications and
social networking has opened countless opportunities and new ways for people to
perform their jobs. But just as our IT communications options have advanced, so
have the security threats posed by these advancements. In this course you'll
learn about the common threats to corporate computers and devices that exploit
vulnerabilities in our communications and networking methods such as e-mail,
Internet, and social networking platforms. This course also covers best
practices and techniques to mitigate security risks while conducting communications
as part of your job. Finally, this course covers what social engineering is,
and how as an end user of corporate computers and devices you can protect
yourself and your company from the intelligent ways hackers use social
engineering.
Target Audience
End users of computer systems and mobile devices
in a corporate environment, individuals interested in fundamentally secure
computers, and communications practices
Prerequisites
None
Lesson Objectives
identify
the threats to corporate security that can result from unsecured communications
technologies
identify
the potential threats from unsecured e-mail usage
describe
best practices for ethical and safe e-mail use
identify
the common security threats to corporate systems and infrastructure from using
unsecured webmail access at work
identify
best practices for securely accessing webmail services
describe
the common corporate security risks of Internet usage
identify
secure corporate Internet usage best practices
identify
characteristics and risks of social engineering scams
describe
techniques to avoid being a victim of social engineering scams
identify
risks to corporate systems from unsecured social networking activities
identify
best practices when using social networking platforms
identify
best practices for securely using corporate e-mail, access webmail, Internet
use, and social networking activities