Course Outline
Lesson 1: Identifying Security Compliance Measures
- Identify Organizational Compliance Requirements and Resources
- Identify Legal Compliance Requirements and Resources
Lesson 2: Recognizing and Addressing Social Engineering Attack
- Recognize Social Engineering Attacks
- Defend Against Social Engineering Attacks
Lesson 3: Securing Devices
- Maintain Physical Security of Devices
- Use Secure Authentication Methods
- Protect Your Data
- Defend Against Malware
- Use Wireless Devices Securely
Lesson 4: Using the Internet Securely
- Browse the Web Safely
- Use Email Securely
- Use Social Networks Securely
- Use Cloud Services Securely
- Work from Remote Locations Securely
Requirements
To ensure your success in this course, you should have experience with the basic use of conventional end-user technology, including desktop, laptop, or tablet computers; mobile phones; and basic Internet functions, such as web browsing and email.
Testimonials (5)
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
Nothing it was perfect.
Zola Madolo - Vodacom
Course - Android Security
It opens up a lot and gives lots of insight what security
Nolbabalo Tshotsho - Vodacom SA
Course - Advanced Java Security
I genuinely enjoyed the great information and content.