Even with millions spent on security infrastructure, all it takes is one employee clicking on one wrong link to compromise critical data and information systems. End-user security awareness is a major issue in the business world today. The threat landscape is complicated, and the typical end-users are unaware of the ways in which they could adversely affect their organization.
With organizations being put under a microscope when it comes to their cybersecurity practices, the costs are too high to overlook the importance of effectively equipping end-users with the skills they need to combat the growing threat of cybercrime. The CyberSAFE class enables employees of any organization to identify many of the common risks associated with using conventional end-user technology, as well as how to safely protect themselves and their organizations from security risks.
This course is designed for you as a non-technical end-user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks. This course is also designed for you to prepare for the Certified CyberSAFE credential. You can obtain your Certified CyberSAFE certificate by completing the Certified CyberSAFE credential process on the CHOICE platform following the course presentation.
To ensure your success in this course, you should have experience with the basic use of conventional end-user technology, including desktop, laptop, or tablet computers; mobile phones; and basic Internet functions, such as web browsing and email.
What You Will Learn
Lesson 1: Identifying the Need for Security
Topic A: Identify Security Compliance Requirements
Topic B: Recognize Social Engineering
Lesson 2: Securing Devices
Topic A: Maintain Physical Security of Devices
Topic B: Use Passwords for Security
Topic C: Protect Your Data
Topic D: Identify and Mitigate Malware
Topic E: Use Wireless Devices Securely
Lesson 3: Using the Internet Securely
Topic A: Browse the Web Safely
Topic B: Use Email Securely
Topic C: Use Social Networking Securely
Topic D: Use Cloud Services Securely