
End User Security 101
End User Security 101
This instructor led, online training course allows organizations to increase their security defenses quickly and with minimal investment by ensuring that end-users are equipped with the knowledge necessary to be effective defenders of their organizations’ data. The program is designed for non-technical end-users of computers, mobile devices, networks, and the Internet.
All individuals that have access to an organization’s information systems require a thorough understanding of their effect on cybersecurity. In this course, students will learn to identify many of the common risks involved in using conventional end-user technology, how to use it safely, how to protect themselves and their organizations from malicious threats.

Instructor:
Derrick Coston, Security+, CISSP, CISA, GIAC
Course Information
Skills Learned
- Understand the latest risks involved in using the technology available in today’s workplaces
- How to become an active contributor to the security of your company’s assets
- Recognize insider threats and close the door on intruders
- Securing your devices and accommodating remote work locations
- Responsible use of the Internet
Who Should Attend This Course
This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.
Prerequisites
None
Course Outline
- Introduction
- Breaches
- The Human Factor
- Working from home as a user
- Your Cubicle
- The Trouble with Passwords
- Building better passwords
- Multifactor Authentication
- Social Engineering
- Types of Social Engineering attacks
- Quid Pro Quo
- Baiting
- Pretexting
- Diversion Theft
- Social Engineering Defenses
- Data security
- Data destructions
- Types of Social Engineering attacks
- Phishing
- Email Phishing
- Spear Phishing
- Whaling
- Smishing
- Vishing
- Clone Phishing
- Additional examples
- Phishing Techniques
- Link Manipulation
- Website Forgery
- Covert Redirects
- Phishing Mitigation
- User Training
- Filters
- Email content filtering
- Browser alerts
- Working Remotely
- Your Company
- A safe place to work
- Malware eradication
- Symptoms of Virus infection
- Layered Security and Defense in Depth
- Least Privileges
- Generic Account Prohibition
- Insider Threats
- Your mobile devices
- International travel concerns
- Advanced persistent threats
- Conclusion