Security Awareness

Course Description

Cyber security has become the hottest topic in the business world today. With the large amount of data companies collect and store it is critical they have the correct practices and protocols in place. While cyber security begins with the IT staff, it ends with each employee. Without a properly educated and trained staff, companies are leaving themselves open to attack.

The government is beginning to crack down on companies found guilty of losing customer or employee data. Security is no longer a job for just a few, but is a concept that must be bought into and monitored by each and every employee. It only takes one user to make a network vulnerable to the world.

This half day instructor led course will immerse students in the world of Cyber Security by teaching them proper security measures, but also explaining common techniques used for both online and offline security. Students will learn basic security fundamentals to not only protect company resources, but also sensitive personal information. Students will also gain demonstrations and walk-throughs to better understand each topic covered in this course.

At the end of this course students should be able to spot common forms of attacks such as phishing scams, and use best practices when using computers both in and outside the office.

After completing this course, students will be able to:

  • Monitor User Activity and Web Usage
  • Understand Social Engineering, Phishing, and Spamming Techniques
  • Scan, Update and Maintain for Virus Protection
  • Recognize Network Vulnerabilities
  • Implement Desktop Security and Access Controls
  • Password Usage and Management
  • Secure Wireless Connectivity on Personal Devices

Course Outline

Module One: Security Awareness

  1. Definition / purpose
  2. Real world application
    • Corporate Scenario

Module Two: Awareness

  1. Web usage and monitoring user activity
    • Internet Browser Settings Fundamentals (Chrome, Internet Explorer)
    • Recommended Browser Extensions
  2. Social Engineering methods
  3. Importance of personal usage and accountability
  4. How to identify spam and various phishing techniques
  5. Importance of data backup and storage
    • Cloud
    • External Device
  6. Response to changes in physical system environment (fire, earthquake, water, dust, etc.)
    • Ways to physically maintain your work station
  7. Understanding Wireless connectivity on mobile phones/laptops

Module Three: Countermeasures

  1. Scanning, updating and maintaining for virus protection
    • Norton, Kaspersky, Avast
  2. Understanding network vulnerability
    • Breakdown of the IP address and its purpose
    • How URL’s work (From your IP address, to searching a specified URL, to redirecting to its DNS, etc.)
    • Firewalls
    • Different file formats
  3. Desktop security
    • System settings
    • Automated log-offs
    • Maintaining user accounts and sharing
  4. Password usage and management
    • Password protection, encryption, and updates
  5. Access control of certain systems
    • File sharing and protection (public, home, work network)

Module Four: Training

  1. Demonstrations and Interactive lab walk-through.
  2. Understanding Wireless Connectivity

Download PDF:Cyber Security Awareness