IT Security for Non-Technical Users
DescriptionThe aim of this course is to raise awareness and to highlight best practices for non-technical users. Without going into technical detail, participants will get an overview of what lies behind common technologies and various Internet services, and how malicious entities will try to exploit social media, Wi-Fi and other platforms to lure unsuspecting users into actions that lead to unintended consequences.
SyllabusModule 1: Information and the Value of Information Module 2: Overview Module 3: Data States Module 4: Goals and Concerns Module 5: Overview of Common Technologies Module 6: A non-technical user friendly look under the hood of common technologies Module 7: Information Lifecycle Module 8: A Risk Based Approach Module 9: Security Best Practices and Principles of Data Security Module 10: WiFi, Browsing, Email, Mobile Devices, Social Networks, etc
Learning OutcomesStarting with an overview of Information and its value and then going through common technologies in use today, this course will show attendees and raise awareness on how and why attackers may exploit these technologies.
Participants and RequirementsAnyone working in an office environment. Applies to all industries where employees use email, browse the Internet or use any other program to carry out their daily tasks. Ideal to raise awareness in an organization. No minimum requirements.
CertificateCertificate of attendance
Course Duration6 hours