End User Security 101

 

Real Class Example

End User Security 101

This instructor led, online training course allows organizations to increase their security defenses quickly and with minimal investment by ensuring that end-users are equipped with the knowledge necessary to be effective defenders of their organizations’ data. The program is designed for non-technical end-users of computers, mobile devices, networks, and the Internet.

All individuals that have access to an organization’s information systems require a thorough understanding of their effect on cybersecurity. In this course, students will learn to identify many of the common risks involved in using conventional end-user technology, how to use it safely, how to protect themselves and their organizations from malicious threats.

Instructor:

Derrick Coston, Security+, CISSP, CISA, GIAC

Course Information

Skills Learned

  • Understand the latest risks involved in using the technology available in today’s workplaces
  • How to become an active contributor to the security of your company’s assets
  • Recognize insider threats and close the door on intruders
  • Securing your devices and accommodating remote work locations
  • Responsible use of the Internet

Who Should Attend This Course

This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.

Course Outline

  • Introduction
    • Breaches
  • The Human Factor
    • Working from home as a user
  • Your Cubicle
  • The Trouble with Passwords
    • Building better passwords
    • Multifactor Authentication
  • Social Engineering
    • Types of Social Engineering attacks
    • Diversion theft
    • Social engineering defenses
  • Phishing
    • Email Phishing
    • Spear Phishing
    • Whaling
    • Smishing
    • Vishing
    • Clone Phishing
    • Phishing techniques
    • Phishing Mitigation
  • Working Remotely
  • Your Company
    • A safe place to work
    • Malware eradication
    • Symptoms of virus infection
    • Layered security and defense in depth
    • Least privileges
    • Insider threats
    • Your mobile devices
  • International travel concerns
  • Advanced Persistent Threats
  • Conclusion

Like What You See? Let’s Get Started Training.

Call 480-850-9200 or submit below to get pricing for you or your team.