CyberSAFE: Securing Assets for End Users

Course Overview

CyberSAFE allows organizations to increase their security posture quickly and with minimal investment by ensuring that end-users are equipped with the knowledge necessary to be good stewards of their organizations’ data. The program is designed for non-technical end-users of computers, mobile devices, networks, and the Internet.
Read More

From the CEO to the new sales representative, any individual that has access to an organization’s information systems needs a thorough understanding of their effect on cybersecurity. Students will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect themselves and their organizations from those risks.

Instructor: Mike Vasquez

Real Class Example

Skills Learned

  • Become a good steward of your organization’s data
  • Identify many of the common risks involved in using conventional end-user technology
  • Identify the need for security
  • Secure devices like desktops, laptops, smartphones, and more
  • Secure your use of the Internet

Who Should Attend This Course

This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.

Course Outline

Module 1: Identifying the Need for Security

  • Identify Security Compliance Requirements
    • Security Compliance
    • Security Policies
    • Resources for Maintaining Security Compliance
  • Recognize Social Engineering
    • Social Engineering
    • Types of Social Engineering Attacks
    • Guidelines for Mitigating Social Engineering

Module 2: Securing Devices

  • Maintain Physical Security of Devices
    • Physical Security of Devices
    • Guidelines for Maintaining Physical Security of Devices
  • Use Passwords for Security
    • Password, PIN and Token Security
    • Guidelines for Password Security
  • Protect Your Data
    • Data Protection and the CIA Triad
    • Data Backup
    • Guidelines for Protecting Your Data
  • Identify and Mitigate Malware
    • Malware
    • Guidelines for Malware Mitigation
  • Use Wireless Devices Securely
    • Wireless Security
    • Organizational and Personal Devices
    • Secure and Insecure Wireless Networks
    • Bluetooth Security
    • Guidelines for Using Wireless Devices Securely

Module 3: Using the Internet Securely

  • Browse the Web Safely
    • Safe Web Browsing
    • URL Structure
    • Guidelines for Browsing the Web Safely
  • Use Email Securely
    • Email Security
    • Email Attachments
    • Attachment Types
    • Compliance and Email Attachments
    • Guidelines for Using Email Securely
  • Use Social Networking Securely
    • Social Networking Security
    • Guidelines for Using Social Networking Securely
  • Use Cloud Services Securely
    • Cloud Services
    • Cloud Services Risks
    • Guidelines for Secure Use of Cloud Services