Gedetailleerde cursusinhoud
Module 1: Introduction to Data Security
- Data–Digital Building Blocks
- Importance of Data in the Information Age
- Threats to Data
- Data Security
- Potential Losses Due to Security Attacks
- Implementing Security
Module 2: Securing Operating Systems
- Guidelines To Secure Windows
- Guidelines To Secure Mac OS X
Module 3: Malware and Antiviruses
- What is Malware
- Types Of Malware
- Symptoms Of Malware Infection
- Antivirus
- Configuring and Using Antivirus Software
- How To Test If an Antivirus is Working
Module 4: Internet Security
- Understanding Web Browser Concepts
- Understanding IM Security
- Understanding Child Online Safety
Module 5: Security on Social Networking Sites
- Understanding Social Networking Concepts
- Understanding Various Social Networking Security Threats
- Understanding Facebook Security Settings
- Understanding Twitter Security Settings
Module 6: Securing Email Communications
- Understanding Email Security Concepts
- Understanding Various Email Security Threats
- Understanding Various Email Security Procedures
Module 7: Securing Mobile Devices
- Understanding Mobile Device Security Concepts
- Understanding Threats To a Mobile Device
- Understanding Various Mobile Security Procedures
- Understanding How to Secure iPhone and iPad Devices
- Understanding How to Secure Android Devices
- Understanding How to Secure Windows Device
- Mobile Security Tools
Module 8: Securing the Cloud
- The Concept of Cloud
- How Cloud Works
- Threats To Cloud Security
- Safeguarding Against Cloud Security Threats
- Cloud Privacy Issues
- Addressing Cloud Privacy Issues
- Choosing a Cloud Service Provider
Module 9: Securing the Network Connections
- Understanding Various Networking Concepts
- Understanding Setting Up a Wireless Network in Windows
- Understanding Setting Up a Wireless Network in Mac
- Understanding Threats to Wireless Network Security and Countermeasures
- Measures to Secure Network Connections
Module 10: Data Backup and Disaster Recovery
- Data Backup Concepts
- Types of Data Backups
- Windows Backup and Restore Procedures
- MAC OS X Backup and Restore Procedures
- Understanding Secure Data Destruction