Security Awareness (Fourth Edition)

Course Specifications

Course number: 085175
Course length: 1.0 day(s)

Course Description

Course Objective: You will identify and apply security techniques.

Target Student: This course is intended for end users who use computers at home or in the office.

Prerequisites: Students should understand fundamental computer concepts, such as how to run applications, manage files, and use a web browser.

Hardware Requirements


For the Instructor's Desktop Computer

This course requires a laptop computer for the instructor with the following configuration:


For the Instructor's Laptop

The following are the hardware requirements for the instructor computer:


For Student Desktop Computers

This course requires one desktop computer for each student with the following configuration:

Software Requirements

Each computer requires the following software:

Course Objectives

Upon successful completion of this course, students will be able to:

Course Content

Lesson 1: Securing Information

Topic 1A: Examine Information Security
Topic 1B: Implement Physical Security Measures
Topic 1C: Examine Cyber Security
Lesson 2: Guarding Against Social Engineering Exploits

Topic 2A: Identify Social Engineering Exploits
Topic 2B: Counteract Social Engineering Exploits
Topic 2C: Evolve Social Engineering Organization Policies
Lesson 3: Identifying Security Measures

Topic 3A: Strengthen Desktop Security
Topic 3B: Strengthen Software Security
Topic 3C: Strengthen Browser Security
Topic 3D: Strengthen Network Security
Topic 3E: Secure Wireless Networks
Topic 3F: Strengthen Mobile Security
Lesson 4: Maintaining File System Security

Topic 4A: Implement File System Security in Windows 7
Topic 4B: Back Up and Restore Data
Topic 4C: Dispose of Data Securely
Lesson 5: Guarding Against Attacks

Topic 5A: Protect a Computer from Security Threats
Topic 5B: Protect Computers from Virus Attacks
Topic 5C: Protect Computers from Social Network Threats
Lesson 6: Handling Security Breaches

Topic 6A: Identify Incidents
Topic 6B: Respond to Incidents
Lesson 7: Identifying Cloud Computing And Virtualization Security Methods

Topic 7A: Fundamentals of Cloud Computing
Topic 7B: Fundamentals of Virtualization
Appendix A: Security and Privacy Regulations