The 2-Day Security Awareness for Information Workers and 2-Day Security Awareness for IT workers use the same principle materials but are delivered at different technical levels.
Information Workers are defined as any employees that use the organization’s IT resources. These users are often referred to as “end users” or “power users”, along with their managers and organization officers.
IT Workers are defined as employees that have technical experience in some discipline such as database administration, network administration, developers, etc.
No two organizations are the same and, therefore, in order for security awareness training to be effective, it must be flexible and not rely on a cookie cutter approach. To allow a flexible non cookie-cutter approach to security awareness training, this course uses a menu of cybersecurity topics and case studies to adapt the content to the needs of each class’s attendees. Each class incorporates not only the latest information available in the cybersecurity field but also employees scientific adult learning and neuroscience principles to not only make learning more effective but also to better combat social engineering exploits.
Duration: 2 Day Course (12 Hours)
Prerequisites: To ensure your success in Information Workers version of this security awareness class, you should possess basic computer user skills and a fundamental understanding of computer and internet concepts, such as how to use a web browser and email.
For the IT worker version of this security awareness class, CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including configuring security parameters, are helpful but not required.
* Quantity discounts available upon request
This course is intended for both novice and experienced IT professionals, network administrators, help desk personnel, network support personnel, desktop support personnel and managers who oversee IT personnel and developers and any information worker using cloud products or mobile operating systems.
Lesson 1: Introduction
Lesson 2: Keeping up with the Bad Guys
Lesson3: Understanding Cybersecurity
Lesson 4: Personal Privacy and Why it is Important to Both You and Your Employer
Lesson 5: Cloud Migrations and Cloud Resources
Lesson 6: PKI Fundamentals
Lesson 7: Managing Security Incidents
Lesson 8: Case Studies and Discussions:
Hands-On LabsQuantity discounts available upon request