Search

Digital Security Awareness Training for Business and Home Users

Sale Price: $99.00
Item Number: PN-SAP
Configuration: -online

* denotes required field

Media Content*
Untitled Document
Package Includes
  • 12 Months Online Access, Featuring OnDemand Instructor-Led Classroom Sessions with Full Audio and Video Lectures
  • Hands-on Software Video Demonstrations
  • Self-Assessment Module Review Quizzes
  • Printable Courseware
  • Certificate of Completion
  • Free 1 Year Upgrade Policy
  • Mobile Access via iPhones and iPads
Our Expert

Kenneth Mayer - Microsoft Certified Trainer (CCSI, MCT, CCNP, CCDA)
Ken Mayer is a Microsoft Certified Trainer as well as a Certified Ethical Hacker Trainer and Security consultant. He started his career in computer technology in 1980s. He has offered a wide variety of IT training and high Chapter consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco in Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS.

Course Features:
       
Course Outline TXT
Module 00 - Course Overview
Course Overview
What is Security Awareness?
Security Domains
What is Security?
Are You at Risk?
So What About You?
What are the Goals of this Course?
What Will We Cover?
Surprise!
Is it Too Late?
Module 00 Review

Module 01 - Types of Security Threats
Types of Security Threats
Your Computer
Your Internet
Yourself
Your Words
Your E-mail
Your Home
Your Files
Module 01 Review

Module 02 - Social Engineering
Social Engineering
What is Social Engineering?
Social Engineering Defense
Manipulation
Why Does it Work?
Fooling People
What Else Can Be Done?
Personal Precautions
Module 02 Review

Module 03 - Identity Theft
Identity Theft
What is Identity Theft?
How Does it Happen?
How to Defend Yourself
What Criminals Do with Your Information
How Can You Tell if You’re a Victim?
Actions to Take if You are a Victim
Contact Information
Module 03 Review

Module 04 - Data Classification
Data Classification
Policies for Data Sharing
Least Privilege
How to Classify
Types of Classifications
Jurisdictional Issues
Your Involvement
What Could Happen?
What Type of Policies?
How to Destroy Data
Module 04 Review

Module 05 - Protecting Your Digital Information
Protecting Your Digital Information
Why Do a Backup?
Types of Backups
What to Backup
Where to Store Backups
How to Perform Backups
Demo - Backups
Backup Utilities
Backup Management Practices
Passwords
Demo - Password Management
Password Management
AAA
Module 05 Review

Module 06 - Malware
Malware
Basic Definitions
What to Look For
How You Can Get Infected
Software Detection
Hardware Detection
Cloud Detection
Know the Extensions
Demo - Knowing Your Extensions
Your Defenses
Module 06 Review

Module 07 - Security from End-to-End
Security from End-to-End
Physical Security
Home/Workstation Security
Encryption
Demo - EFS
Hand Held Electronics
Workstation Software
Updating the OS and Software
Secure E-mail Use
E-mail Encryption
E-mail Hazards
How to Stop SPAM
E-mail Attachments
Other E-mail Warnings
What if You Get Malware from E-mail?
How to Avoid SPAM
Secure Web Browsing
Demo - Secure Web Browsing
Secure Instant Messaging / Social Sites
Module 07 Review

Module 08 - Piracy
Piracy
What is Intellectual Property
Copyrights
Software Piracy
Types of Piracy
Risks
Module 08 Review

Module 09 - Security Policies
Security Policies
Security Policies
Why are Policies Important
Defining an Incident
Response Teams
Response Checklist
Module 09 Review
Module 10 - Moving Forward
Moving Forward
Education and Awareness
Individuals
Organizations
Know the Principles of Security Domains
Module 10 Review
Course Closure



MCITP Training
Shopping Cart
Your cart is empty.


Our Reputation Speaks for Itself!

"I have worked with Career Academy in many different formats over the last 8 years. I have been an instructor in their products, a reseller, and a business partner. I have been continually impressed with Career Academy's professionalism, quality of products, and ethics. Their whole team works very hard on all fronts and treats their customers and partners with respect.

Career Academy is certainly one of the 'good guys' in the industry who can be trusted to do the right thing by all. "

Shon Harris
President
Logical Security
Author of Best Selling
"CISSP All-in-One Exam Guide"


"New Horizons of Columbus, Omaha, Memphis, Pittsburgh, Lincoln, Atlanta, Indianapolis, and Nashville's addition of Career Academy's VideoTrainer learning systems has given us the ability to offer our students an additional training venue. The Remote Mentored Learning capabilities offered by Career Academy have helped revolutionize our virtual training delivery worldwide.

Career Academy's Video Learning Solution through New Horizons Computer Learning Centers delivery gives our customers what they want, how they want and when they want with quality delivery."

Bob Outlaw
Director/General Manager
New Horizons of Omaha and Lincoln


  • See More...