Log On/Register  

855.838.5028

End User Security (CyberSAFE)

Duration: 3 Hours
Module Price: $130

Audience:

This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet and will enable participants to use technology more securely to minimize digital risks.

 

Prerequisites:

To ensure your success in this course, you should have experience with the basic use of conventional end-user technology, including desktop, laptop, or tablet computers, cell phones, and basic Internet functions such as web browsing and email.

 

Course Objectives:

In this course, you will identify many of the common risks involved in using conventional end-user technology as well as ways to use it safely, protecting yourself from those risks.

You will:

  • Identify the need for security
  • Secure devices like desktops, laptops, smartphones, and more
  • Secure your use of the Internet

 

Course Outline: 1 Module:

Lesson 1: Identifying the Need for Security

  • Identifying Security Compliance Requirements
  • Recognizing Social Engineering

Lesson 2: Securing Devices

  • Maintaining the Physical Security of Devices
  • Using Passwords for Security
  • Protecting Your Data
  • Identifying and Mitigating Malware
  • Using Wireless Devices Securely

Lesson 3: Using the Internet Securely

  • Browsing the Web Safely
  • Using Email Securely
  • Using Social Networking Securely
  • Using Cloud Services Securely

Audience:

This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet and will enable participants to use technology more securely to minimize digital risks.

 

Prerequisites:

To ensure your success in this course, you should have experience with the basic use of conventional end-user technology, including desktop, laptop, or tablet computers, cell phones, and basic Internet functions such as web browsing and email.

 

Course Objectives:

In this course, you will identify many of the common risks involved in using conventional end-user technology as well as ways to use it safely, protecting yourself from those risks.

You will:

  • Identify the need for security
  • Secure devices like desktops, laptops, smartphones, and more
  • Secure your use of the Internet

 

Course Outline: 1 Module:

Lesson 1: Identifying the Need for Security

  • Identifying Security Compliance Requirements
  • Recognizing Social Engineering

Lesson 2: Securing Devices

  • Maintaining the Physical Security of Devices
  • Using Passwords for Security
  • Protecting Your Data
  • Identifying and Mitigating Malware
  • Using Wireless Devices Securely

Lesson 3: Using the Internet Securely

  • Browsing the Web Safely
  • Using Email Securely
  • Using Social Networking Securely
  • Using Cloud Services Securely
Learn More
Please type the letters below so we know you are not a robot (upper or lower case):