Building Breach Resistance: Security Skills for Employees

This instructor led, online training course allows organizations to increase their security defenses quickly and with minimal investment by ensuring that end-users are equipped with the knowledge necessary to be effective defenders of their organizations’ data. The program is designed for non-technical end-users of computers, mobile devices, networks, and the Internet.

All individuals that have access to an organization’s information systems require a thorough understanding of their effect on cybersecurity. In this course, students will learn to identify many of the common risks involved in using conventional end-user technology, how to use it safely, to how protect themselves and their organizations from malicious threats.

Instructor: Mike Vasquez

Skills Learned

  • Understand the latest risks involved in using the technology available in today’s workplaces
  • How to become an active contributor to the security of your company’s assets
  • Recognize insider threats and close the door on intruders
  • Securing your devices and accommodating remote work locations
  • Responsible use of the Internet

Who Should Attend This Course

This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.

Course Outline

Introduction

  • Introduction
  • The Human Factor
  • The Human Factor pt.2

Your Cubicle

  • The Trouble with Passwords
  • Building Better Passwords
  • Multifactor Authentication
  • Social Engineering Defenses
  • Types of Social Engineering Attacks
  • The Threats in Emails
  • Phishing for Your Secrets
  • Data Security
  • Data Destruction
  • Working Remotely

 

Your Company

  • A safe place to work
  • Malware Eradication
  • Symptoms of a Virus Infection
  • Layered Security and Defense in Depth
  • Least Privileges
  • Generic Account Prohibition
  • Insider Threats
  • Your Mobile Devices
  • International Travel Concerns
  • Dangers of Cloud Services
  • Advanced Persistent Threats

Conclusion