The Security Awareness Program Design class is for Information Workers and Information Technology Workers. We use the same principle materials but delivered at different technical levels.
Information Workers are defined as any employees that use the organization’s IT resources. These users are often referred to as “end users” or “power users”, along with their managers and organization officers.
Information Technology Workers are defined as employees that have technical experience in some discipline such as database administration, network administration, developers, etc.
No two organizations are the same and in order for security awareness training to be effective, it must be flexible and not rely on a cookie cutter approach. To allow a flexible, non-cookie-cutter approach to security awareness training, this course uses a menu of cybersecurity topics and case studies to adapt the content to the needs of each class’ attendees. Each class incorporates not only the latest information available in the cybersecurity field but also employees scientific adult learning and neuroscience principles to not only make learning more effective but also to better combat social engineering exploits.
Security Awareness Training can be tailored to meet all major compliance standards including: HIPAA, PCI-DSS, GLBA, FISMA, NIST 800-53, ISO/IEC 27002, Red Flags, NERC CIP, CobiT, GDPR and U.S. State Privacy Laws.
Duration: Courses are tailored to meet your needs.
Prerequisites: To ensure your success in the Information Workers version of this security awareness class, you should possess basic computer user skills and a fundamental understanding of computer and internet concepts, such as how to use a web browser and email.
For the Information Technology Worker version of this security awareness class, CompTIA A+ and Network+ certifications, or equivalent knowledge, and six to nine months experience in networking, including configuring security parameters, are helpful but not required.
Price: Rates are scaled to give the best value for the size and needs of your organization.
* Quantity discounts available upon request
These courses can be designed for all roles in your organization from the CEO and Board of Directors to your IT department and every employee. IT roles will often have a highly technical focus and decision maker roles are likely to have a business process focus.
Lesson 1: Introduction
Lesson 2: Keeping up with the Bad Guys
Lesson 3: Understanding Cybersecurity
Lesson 4: Personal Privacy and Why it is Important to Both You and Your Employer
Lesson 5: Cloud Migrations and Cloud Resources
Lesson 6: Metrics that Matter; is Security Awareness Working?
Lesson 7: Policies, Compliance and Due Diligence
Lesson 8: Case Studies and Discussions:
Hands-On Labs
625 Eden Park Drive, Suite 525
Cincinnati, OH 45202
Phone: 513-762-7350
Toll-free: 888-TOCADRE
Support: 513-762-6700