Business Skills For The IT Professional
IT Security for End Users
IT Security for End Users: IT Security Fundamentals
IT Security for End Users: Secure Corporate Communications and Networking
IT Security for End Users: Using Corporate Devices Securely

IT Security for End Users: IT Security Fundamentals

Course Number:
ds_sfeu_a01_dt_enus
Lesson Objectives

IT Security for End Users: IT Security Fundamentals

  • start the course
  • describe what IT security is and what it includes
  • identify the role and purpose of IT security in the corporate environment
  • distinguish between confidentiality, integrity, and availability security objectives
  • identify the end user's role in overall IT security
  • describe general IT policy characteristics
  • identify computer and hardware security policy best practices
  • identify mobile device security policy best practices
  • identify e-mail and Internet security policy best practices
  • identify social networking security policy best practices
  • identify password security policy best practices
  • describe the specific security considerations for remote users
  • identify remote user security policy best practices
  • identify fundamental IT security best practices for the work environment

Overview/Description
Companies that have the greatest chance of fending off IT security attacks are those that have employees who are armed with the knowledge of how to use a company's computers, network, and mobile devices with security in mind. In this course, you'll learn fundamental security concepts that apply to use as an end user, like the role you play in your company's overall IT security. This course also covers some of the most common IT security policies that apply to you as an end user, including policies for secure computer use, mobile device use, and general security policies if you work remotely.

Target Audience
End users of computer systems and mobile devices in a corporate environment, individuals interested in fundamentally secure computers, and communications practices

IT Security for End Users: IT Security Fundamentals

Course Number:
ds_sfeu_a01_dt_enus
Lesson Objectives

IT Security for End Users: IT Security Fundamentals

  • start the course
  • describe what IT security is and what it includes
  • identify the role and purpose of IT security in the corporate environment
  • distinguish between confidentiality, integrity, and availability security objectives
  • identify the end user's role in overall IT security
  • describe general IT policy characteristics
  • identify computer and hardware security policy best practices
  • identify mobile device security policy best practices
  • identify e-mail and Internet security policy best practices
  • identify social networking security policy best practices
  • identify password security policy best practices
  • describe the specific security considerations for remote users
  • identify remote user security policy best practices
  • identify fundamental IT security best practices for the work environment

Overview/Description
Companies that have the greatest chance of fending off IT security attacks are those that have employees who are armed with the knowledge of how to use a company's computers, network, and mobile devices with security in mind. In this course, you'll learn fundamental security concepts that apply to use as an end user, like the role you play in your company's overall IT security. This course also covers some of the most common IT security policies that apply to you as an end user, including policies for secure computer use, mobile device use, and general security policies if you work remotely.

Target Audience
End users of computer systems and mobile devices in a corporate environment, individuals interested in fundamentally secure computers, and communications practices

IT Security for End Users: Secure Corporate Communications and Networking

Course Number:
ds_sfeu_a03_dt_enus
Lesson Objectives

IT Security for End Users: Secure Corporate Communications and Networking

  • start the course
  • identify the threats to corporate security that can result from unsecured communications technologies
  • identify the potential threats from unsecured e-mail usage
  • describe best practices for ethical and safe e-mail use
  • identify the common security threats to corporate systems and infrastructure from using unsecured webmail access at work
  • identify best practices for securely accessing webmail services
  • describe the common corporate security risks of Internet usage
  • identify secure corporate Internet usage best practices
  • identify characteristics and risks of social engineering scams
  • describe techniques to avoid being a victim of social engineering scams
  • identify risks to corporate systems from unsecured social networking activities
  • identify best practices when using social networking platforms
  • identify best practices for securely using corporate e-mail, access webmail, Internet use, and social networking activities

Overview/Description
The advancement in corporate communications and social networking has opened countless opportunities and new ways for people to perform their jobs. But just as our IT communications options have advanced, so have the security threats posed by these advancements. In this course you'll learn about the common threats to corporate computers and devices that exploit vulnerabilities in our communications and networking methods such as e-mail, Internet, and social networking platforms. This course also covers best practices and techniques to mitigate security risks while conducting communications as part of your job. Finally this course covers what social engineering is, and how as an end user of corporate computers and devices you can protect yourself and your company from the intelligent ways hackers use social engineering.

Target Audience
End users of computer systems and mobile devices in a corporate environment, individuals interested in fundamentally secure computers, and communications practices

IT Security for End Users: Secure Corporate Communications and Networking

Course Number:
ds_sfeu_a03_dt_enus
Lesson Objectives

IT Security for End Users: Secure Corporate Communications and Networking

  • start the course
  • identify the threats to corporate security that can result from unsecured communications technologies
  • identify the potential threats from unsecured e-mail usage
  • describe best practices for ethical and safe e-mail use
  • identify the common security threats to corporate systems and infrastructure from using unsecured webmail access at work
  • identify best practices for securely accessing webmail services
  • describe the common corporate security risks of Internet usage
  • identify secure corporate Internet usage best practices
  • identify characteristics and risks of social engineering scams
  • describe techniques to avoid being a victim of social engineering scams
  • identify risks to corporate systems from unsecured social networking activities
  • identify best practices when using social networking platforms
  • identify best practices for securely using corporate e-mail, access webmail, Internet use, and social networking activities

Overview/Description
The advancement in corporate communications and social networking has opened countless opportunities and new ways for people to perform their jobs. But just as our IT communications options have advanced, so have the security threats posed by these advancements. In this course you'll learn about the common threats to corporate computers and devices that exploit vulnerabilities in our communications and networking methods such as e-mail, Internet, and social networking platforms. This course also covers best practices and techniques to mitigate security risks while conducting communications as part of your job. Finally this course covers what social engineering is, and how as an end user of corporate computers and devices you can protect yourself and your company from the intelligent ways hackers use social engineering.

Target Audience
End users of computer systems and mobile devices in a corporate environment, individuals interested in fundamentally secure computers, and communications practices

IT Security for End Users: Using Corporate Devices Securely

Course Number:
ds_sfeu_a02_dt_enus
Lesson Objectives

IT Security for End Users: Using Corporate Devices Securely

  • start the course
  • describe characteristics of human error threats to corporate computer security
  • describe characteristics of malicious behavior that threatens corporate computer security
  • identify best practices for protecting your corporate computer against malicious behavior
  • describe characteristics and best practices for using file encryption and access controls to protect your corporate computer
  • describe characteristics and best practices for using system patches to protect your corporate computer
  • describe characteristics and best practices for using antivirus software to protect your corporate computer
  • identify potential physical security threats to corporate mobile devices
  • distinguish between the different types of malware threats
  • identify characteristics of threats to mobile devices via wireless networks
  • identify best practices for securing corporate mobile devices against common physical threats
  • identify best practices for securing corporate mobile devices against common malware threats
  • identify best practices for securing corporate mobile devices against common wireless network threats
  • identify best practices for securing both corporate computers and corporate mobility devices against common threats

Overview/Description
Knowing how to use corporate computers and devices in a secure way helps ensure you don't jeopardize your work, your organization, or your personal security. In this course you'll learn about common threats to corporate computers, including malicious attacks, and best practices for using your computer in ways that prevent these attacks. This course also covers some of the security threats you might face when using corporate mobile devices, and techniques you can use to protect your device and yourself.

Target Audience
End users of computer systems and mobile devices in a corporate environment, individuals interested in fundamentally secure computers, and communications practices

IT Security for End Users: Using Corporate Devices Securely

Course Number:
ds_sfeu_a02_dt_enus
Lesson Objectives

IT Security for End Users: Using Corporate Devices Securely

  • start the course
  • describe characteristics of human error threats to corporate computer security
  • describe characteristics of malicious behavior that threatens corporate computer security
  • identify best practices for protecting your corporate computer against malicious behavior
  • describe characteristics and best practices for using file encryption and access controls to protect your corporate computer
  • describe characteristics and best practices for using system patches to protect your corporate computer
  • describe characteristics and best practices for using antivirus software to protect your corporate computer
  • identify potential physical security threats to corporate mobile devices
  • distinguish between the different types of malware threats
  • identify characteristics of threats to mobile devices via wireless networks
  • identify best practices for securing corporate mobile devices against common physical threats
  • identify best practices for securing corporate mobile devices against common malware threats
  • identify best practices for securing corporate mobile devices against common wireless network threats
  • identify best practices for securing both corporate computers and corporate mobility devices against common threats

Overview/Description
Knowing how to use corporate computers and devices in a secure way helps ensure you don't jeopardize your work, your organization, or your personal security. In this course you'll learn about common threats to corporate computers, including malicious attacks, and best practices for using your computer in ways that prevent these attacks. This course also covers some of the security threats you might face when using corporate mobile devices, and techniques you can use to protect your device and yourself.

Target Audience
End users of computer systems and mobile devices in a corporate environment, individuals interested in fundamentally secure computers, and communications practices

Close Chat Live