Regardless of computer experience, this class will help the student
become more aware of technology-related risks and what they can do to
protect themselves and their organization.
This course will help the student understand security compliance
considerations, social engineering, malware, and various other
data-security-related concepts.
In this course, the student will use discussions, case studies, and
the experiences of the instructor and fellow students to explore the
hazards and pitfalls of technology and learn how to use that technology
safely and securely.
In this 1-day course, students will identify many of the common risks
involved in using conventional end-user technology, as well as ways to
use it safely, to protect themselves from those risks.
The student will:
- Identify the need for security
- Secure devices like desktops, laptops, smartphones, and more
- Secure your use of the Internet
Pre-requisite Knowledge Advisory
To ensure success in this course, the learner should have experience
with the basic use of conventional end-user technology, including
desktop, laptop, or tablet computers, mobile phones, and basic Internet
functions such as web browsing and email.
Lesson 1: Identifying the Need for Security
- Topic A: Identify Security Compliance Requirements
- Topic B: Recognize Social Engineering
Lesson 2: Securing Devices
- Topic A: Maintain Physical Security of Devices
- Topic B: Use Passwords for Security
- Topic C: Protect Your Data
- Topic D: Identify and Mitigate Malware
- Topic E: Use Wireless Devices Securely
Lesson 3: Using the Internet Securely
- Topic A: Browse the Web Safely
- Topic B: Use Email Securely
- Topic C: Use Social Networking Securely
- Topic D: Use Cloud Services Securel
Appendix A: Mapping Course Content to CyberSAFE Extended Edition 2017: Exam CBS-210