It Spac
It Spac
It Spac
IT|SPAC
IT Security & Privacy Awareness Compliance
Overview
This course provides a solid foundational part for your overall Data Security Awareness
program. It helps your staff perceive data security risks, sound data protection practices,
and the way their individual actions and behaviors will impact data security in your
organization as a full.
This exceptional course uses a stimulating and creative approach that engages and
challenges the learner. Interactive learning activities and realistic scenarios are
presented that maintain interest and add relevance for learners from different departments
and levels within the organization.
The primary and foremost objective of any
awareness program is to educate users on
their responsibility to protect the
confidentiality, availability and integrity of
their organization's information.
Objective
users perceive not solely the way to shield
the organization’s info, however why it's
necessary to guard that info.
TarGeT AuDienCe
Perhaps the biggest security issues companies face
are not problems with the technology itself, but
problems with employees not knowing what is
important in the security world because of lack of
appropriate training or continuing education.
• Common Terminologies
• Data Backup
• What is Encryption?
• What Files to Backup and How often?
• What is Decryption?
• Online Data Backup
• Objectives of Encryption
• Online Data Backup Service Providers
• Usage of Encryption
• Types of Data Backup
• Types of Encryption
• Windows OS - Backup & Restore
• Symmetric vs. Asymmetric Encryption
• Securing Backup on Storage Devices with Encryption
• Encryption Standards
• Data Recovery
• Digital Certificates
• Physical Security
• Working of Digital Certificates
• Physical Security Measures
• Digital Signature
• Security Laptops & Mobile Devices from Theft
• How Digital Signature Works?
• Laptop Theft Countermeasures
• Security Checklist
• Protect Your Data while Traveling
• Security Checklist
MoDulE 8
Introduction to Information Security and
Ethical Hacking
• Online Security • Online Gaming
• Understanding Cookies • Online Gaming Risks
• Installing Plug-in • Insecure or Compromised Game Servers & Game Coding
• Never share secure information or PII over insecure • Social Risks
channels • Security Practices Specific to Gaming
• Http vs. Https • Childs Online Safety
• Check for Website Clones • Role of the Internet in Child Pornography
• Browser Security Settings • Effects of Pornography on Children
• Security on Instant Messaging • Finding if Children are at Risk Online
• Instant Messaging Security Issues • Encourage Children to Report
• Secure Searching on the Web • Security Software for Protecting Children from Online Threat
• Security Checklist
MoDulE 9 MoDulE 10
Data Encryption Securing Online Transactions
• Home Network
• Networking Devices • Online Shopping
• Home Networking Security • How Online Shopping Works?
• Wireless Networks • Online Banking
• Setting up a Wireless Network • Credit Card Payments
• Wireless Networks Security • Types of Credit Card Frauds
• Using the Network with Windows • Guidelines for Credit Card Safety
• Setting Up the PC’s Name and Workgroup Name • Securing Online Transactions
• Simple File Sharing • Choosing a Secure Online Payment Service
• Hiding a Shared File and Folder • SSL and Padlock Symbol
• Windows Easy Transfer • Identify Trustworthy Websites
• Setting Up the PC’s Name and Workgroup Name • Identify Untrustworthy Websites
• Creating User Accounts & Groups • McAfee’s Site Advisor
• Sharing Files & Folders • Security Checklist
• Sharing Printer
• Network Security Threats
• Securing Network Connections
• Network Adapters
• Troubleshooting with Network Adapters
MoDulE 11 MoDulE 12
Securing E-Mail Communications Security on Social Networking Sites
• Social Engineering
• Social Engineers attempt to gather • Identity Theft Statistics
• Types of Social Engineering • What is Identity Theft?
• Social Engineering Examples • Personal Information that can be stolen
• Human weaknesses and lack of knowledge is the main • How do Attackers steal Identity?
target • What Attackers do with stolen Identity?
• Human based Social Engineering • Identity Theft example
• Computer based Social Engineering • How to find if you are a Victim?
• How to find if you are a Victim? • What to do if Identity is stolen?
• Security Checklist • Federal Trade Commission
• Enconsumer.gov
• Internet Crime Complaint Centre
• Prosecuting Identity Theft
• Security Checklist
MoDulE 15
Securing Mobile Devices
• Mobile Device Security
• IMEI Number
• Mobile Device Security Risks
• Mobile Malware
• Mobile Application Vulnerabilities
• Patch Mobile Platforms and Applications
• Avoid Mobile Device Theft
• What to do if your Mobile device is Lost or Stolen?
• Use Power-on Authentication
• Back-up your Data • Install only Signed-in Applications
• Use Encryption to Secure Data • Install Mobile Phone Antivirus
• Enable Auto-Lock Feature • Secure Bluetooth Connectivity
• Enable Passcode Protection
• Enable SIM PIN Protection
• Enable auto-lock and Re-map button
• iPad Security
• Blackberry Phone : security settings
• Windows Phone : security settings
• Security Checklist
MoDulE 16 MoDulE 17
Cloud Security Incident Response
Connect US!
[email protected]
WWW.DUCARAINFO.COM