Course Outline
Lesson 1: Identifying Security Compliance Measures
- Identify Organizational Compliance Requirements and Resources
- Identify Legal Compliance Requirements and Resources
Lesson 2: Recognizing and Addressing Social Engineering Attack
- Recognize Social Engineering Attacks
- Defend Against Social Engineering Attacks
Lesson 3: Securing Devices
- Maintain Physical Security of Devices
- Use Secure Authentication Methods
- Protect Your Data
- Defend Against Malware
- Use Wireless Devices Securely
Lesson 4: Using the Internet Securely
- Browse the Web Safely
- Use Email Securely
- Use Social Networks Securely
- Use Cloud Services Securely
- Work from Remote Locations Securely
Requirements
To ensure your success in this course, you should have experience with the basic use of conventional end-user technology, including desktop, laptop, or tablet computers; mobile phones; and basic Internet functions, such as web browsing and email.
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions