In this course, you’ll be provided a jumpstart to being part of a secure workforce. Upon completing this course, students will be versed in the initial practices that will help them begin their safe computing story.
Overview
COURSE INSTRUCTOR
COURSE DIFFICULTY
COURSE DURATION
49m
Skills Learned
After completing this online training course, students will be able to:
Inspect the email address of the sender of an email
Recognize email based threats
Recognize common phishing attacks
Build strong passwords
Describe the purpose of a clean desk policy
All members of an organization
None
01. Introduction to Safe Email Usage
02. Inspecting the Sender of an Email
03. Understanding the Threat of Email Attachments
04. Introduction to Phishing
05. How to Create Strong Passwords
06. Understanding How to Follow a Clean Desk Policy
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Inspect the email address of the sender of an email
Recognize email based threats
Recognize common phishing attacks
Build strong passwords
Describe the purpose of a clean desk policy
WHO SHOULD ATTEND
All members of an organization
PREREQUISITES
None
COURSE OUTLINE
01. Introduction to Safe Email Usage
02. Inspecting the Sender of an Email
03. Understanding the Threat of Email Attachments
04. Introduction to Phishing
05. How to Create Strong Passwords
06. Understanding How to Follow a Clean Desk Policy
SCHEDULE