Security Awareness | Skillsoft Global Knowledge Skip to main Content

Security Awareness

  • Course Code SECAW
  • Duration 1 day

Public Classroom Price

eur595,00

excl. VAT

Request Group Training Add to Cart

Course Delivery

This course is available in the following formats:

  • Company Event

    Event at company

  • Public Classroom

    Traditional Classroom Learning

  • Virtual Learning

    Learning that is virtual

Request this course in a different delivery format.

Course Overview

Top

Security specialists often see users as the biggest threat to information security. In cases of data loss, users' behavior is often described as naive, casual and even malicious. No surprise, since in 87% of those cases users had not received any training.

Skillsoft Global Knowledge's security awareness program teaches employees to become aware of common risks, what role they have and what their responsibilities are within the organization, when it comes to and information security.

In this 1-day course you will identify and apply security techniques.

Course Schedule

Top

Target Audience

Top
This course is intended for end users who use computers at home or in the office.

Course Objectives

Top
Upon successful completion of this course, students will be able to:
  • describe the importance of securing information.
  • identify the different ways to guard yourself against social engineering exploits.
  • describe the security practices related to computers, mobile devices, networks, and the Internet.
  • maintain the security of the files and folders stored on your computing devices.
  • identify and protect information against risks associated with the cyber world.
  • identify potential security incidents, ways to respond in the event of a possible breach, and measures to prevent a security breach.
  • identify methods to keep the cloud and virtualized environments secured.

Course Content

Top

Lesson 1: Securing Information

  • Topic 1A: Examine Information Security
  • Topic 1B: Implement Physical Security Measures
  • Topic 1C: Examine Cyber Security


Lesson 2: Guarding Against Social Engineering Exploits

  • Topic 2A: Identify Social Engineering Exploits
  • Topic 2B: Counteract Social Engineering Exploits
  • Topic 2C: Evolve Social Engineering Organization Policies

Lesson 3: Identifying Security Measures

  • Topic 3A: Strengthen Desktop Security
  • Topic 3B: Strengthen Software Security
  • Topic 3C: Strengthen Browser Security
  • Topic 3D: Strengthen Network Security
  • Topic 3E: Secure Wireless Networks
  • Topic 3F: Strengthen Mobile Security


Lesson 4: Maintaining File System Security

  • Topic 4A: Implement File System Security in Windows
  • Topic 4B: Back Up and Restore Data
  • Topic 4C: Dispose of Data Securely


Lesson 5: Guarding Against Attacks

  • Topic 5A: Protect a Computer from Security Threats
  • Topic 5B: Protect Computers from Virus Attacks
  • Topic 5C: Protect Computers from Social Network Threats


Lesson 6: Handling Security Breaches

  • Topic 6A: Identify Incidents
  • Topic 6B: Respond to Incidents


Lesson 7: Identifying Cloud Computing And Virtualization Security Methods

  • Topic 7A: Fundamentals of Cloud Computing
  • Topic 7B: Fundamentals of Virtualization
  • Appendix A: Security and Privacy Regulations

Course Prerequisites

Top
Students should understand fundamental computer concepts, such as how to run applications, manage files, and use a web browser
Cookie Control toggle icon