1 - Identifying Security Compliance Measures
Topic A: Identify Organizational Compliance Requirements and ResourcesTopic B: Identify Legal Compliance Requirements and ResourcesTopic C: Identify Industry Compliance Requirements and Resources
2 - Recognizing and Addressing Social Engineering Attacks
Topic A: Recognize Phishing and Other Social Engineering AttacksTopic B: Defend Against Phishing and Other Social Engineering Attacks
3 - Securing Devices
Topic A: Maintain Physical Security of DevicesTopic B: Use Secure Authentication MethodsTopic C: Protect Your DataTopic D: Defend Against MalwareTopic E: Use Wireless Devices Securely
4 - Using the Internet Securely
Topic A: Browse the Web SafelyTopic B: Use Email SecurelyTopic C: Use Social Networks SecurelyTopic D: Use Cloud Services SecurelyTopic E: Work from Remote Locations Securely
Actual course outline may vary depending on offering center. Contact your sales representative for more information.
Who is it For?
This course is designed for all users of computers, mobile devices, networks, and the Internet, to enable them to use technology more securely and minimize digital risks, regardless of technical ability. This course is also designed for you to prepare for the CyberSAFE credential. You can obtain your CyberSAFE certificate by completing the CyberSAFE credential process on the CHOICE platform following the course presentation.
To ensure your success in this course, you should have experience with the basic use of conventional computing technology, including desktop, laptop, or tablet computers; mobile phones; and basic Internet functions, such as web browsing and email.