IT Security for
The aim of this course is to raise awareness and to highlight best security practices for non-technical IT users. Without going into technical detail, participants will get an overview of what lies behind common technologies and various Internet services, along with how malicious entities will try to exploit social media, Wi-Fi networks and other platforms to lure unsuspecting users into actions that lead to unintended consequences.
Module 1: Information and the Value of Information
Module 2: Overview
Module 3: Data States
Module 4: Goals and Concerns
Module 5: Overview of Common Technologies
Module 6: A non-technical user friendly look under the hood of common technologies
Module 7: Information Lifecycle
Module 8: A Risk Based Approach
Module 9: Security Best Practices and Principles of Data Security
Module 10: WiFi, Browsing, Email, Mobile Devices, Social Networks, etc
Starting with an overview of Information and its value and then going through common technologies in use today, this course will show attendees and raise awareness on how and why attackers may exploit these technologies.
Participants and Requirements:
Anyone working in an office environment. Applies to all industries where employees use email, browse the Internet or use any other program to carry out their daily tasks. Ideal to raise awareness in an organization. No minimum requirements.