End User Security 101
End User Security 101
This instructor led, online training course allows organizations to increase their security defenses quickly and with minimal investment by ensuring that end-users are equipped with the knowledge necessary to be effective defenders of their organizations’ data. The program is designed for non-technical end-users of computers, mobile devices, networks, and the Internet.
All individuals that have access to an organization’s information systems require a thorough understanding of their effect on cybersecurity. In this course, students will learn to identify many of the common risks involved in using conventional end-user technology, how to use it safely, how to protect themselves and their organizations from malicious threats.

Instructor:
Derrick Coston, Security+, CISSP, CISA, GIAC
Course Information
Skills Learned
- Understand the latest risks involved in using the technology available in today’s workplaces
- How to become an active contributor to the security of your company’s assets
- Recognize insider threats and close the door on intruders
- Securing your devices and accommodating remote work locations
- Responsible use of the Internet
Who Should Attend This Course
This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.
Prerequisites
None
Course Outline
- Introduction
- Breaches
- The Human Factor
- Working from home as a user
- Your Cubicle
- The Trouble with Passwords
- Building better passwords
- Multifactor Authentication
- Social Engineering
- Types of Social Engineering attacks
- Diversion theft
- Social engineering defenses
- Phishing
- Email Phishing
- Spear Phishing
- Whaling
- Smishing
- Vishing
- Clone Phishing
- Phishing techniques
- Phishing Mitigation
- Working Remotely
- Your Company
- A safe place to work
- Malware eradication
- Symptoms of virus infection
- Layered security and defense in depth
- Least privileges
- Insider threats
- Your mobile devices
- International travel concerns
- Advanced Persistent Threats
- Conclusion