Gedetailleerde cursusinhoud
- Course Introduction
- Module 1 - Basic Security Awareness What is it and why it’s needed? End User Risk Trends, Who, What and How are people the target, What are the losses associated to end user hacks? o The policies are as good as the employee who embraces them
- Module 2 - Social Engineering Phishing, mail, via phone, social websites are common Spear Phishing, Example: Fake email sample Social media Personification
- Module 3 - Data Classification and corporate use (Safe Guarding) Corporate, Sensitive, internal or public classification, Objectives of securing data (IP, Compliance/legislature) Personal vs. Business Use, Segregating personal use with business use Data management Business standard for deleting data Personal standard of data dumping (old phones/hard drives and usb). Did you know that I can unearth deleted docs from a USB drive from a standard Forensics app off of the internet? How to delete and get rid of your old data
- Module 4 - End User Best Practices Hot spots, public places & roaming risks Safe Web Site surfing, Discerning safe secure sites (never go to a site link indirectly), Locks and HTTPS Computer Usage, Using computer in non-admin mode, Ransomware Password management Removable Devices Mobile, Smart Phones and Tablets (risks associated with mobile devices), Device always locked, Device should always be trackable