Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

CompTIA CyberSecure

Learn how to keep critical information protected, safe, and secure.

GK# 4180

Course Overview

TOP

In this course, you will learn about the security best practices vital to protecting your business. Implications of security behaviors that affect everyone in the workplace—not just the IT department—are also examined in this course.

This fun and engaging course enables you to learn how to keep critical information protected, safe, and secure.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • Cognitive mapping
  • Real world scenarios
  • Choose-your-own-adventure style
  • Case studies that contextualize choices
  • Ranking exercises that teach good, better and best choices

Outline

TOP
Viewing outline for:

Self-Paced Outline

Course Outline:

1. You are the Best Defense

  • User can and should effectively protect him/herself and her company from information leaks
  • Information security is the responsibility of every employee in an organization
  • Identify the human as the target of malicious actions, not technology
  • User can make a difference

2. Overview of Information Security Threats

  • Basic categories of information security threats
  • Personally identifiable information
  • Leaks can come from inside or outside of a network
  • The way information can be compromised

3. Cultivating a Safe Mindset

  • How to cultivate a safe information mindset
  • Role of IT and HR departments and policy in info security
  • Healthy vigilance and skepticism

4. Cultivating a Safe Environment

  • How to cultivate a safe environment
  • How to cultivate a safe office
  • How to cultivate a safe environment when working remotely

5. Staying Safe Online

  • How to implement safety strategies online
  • Practicing situational awareness, healthy vigilance, and skepticism will help keep the user and his/her data safe
  • How to implement the following safety measures

6. Summary / Recap

  • User can and should protect his/her data and network
  • Situational awareness, healthy vigilance, and skepticism when applied to online environments

Who Should Attend

TOP

Individuals looking to gain awareness about CyberSecurity and understand general CyberSecurity concepts and responsibilities

Course Delivery

This course is available in the following formats:

Self-Paced

On-demand content enables you to train on your own schedule.



Self-Paced

On-demand content enables you to train on your own schedule.



Request this course in a different delivery format.
Enroll