Learning Objectives:
At the conclusion of this course, the learner will:
- Understand the concept of information security and its importance in personal and professional contexts.
- Familiarize oneself with the principles of computer acceptable use and the responsible use of technology.
- Recognize the security challenges and best practices related to working from home (WFH) environments.
- Gain knowledge about various types of cybercrime, including phishing, and the potential risks they pose.
- Learn how to identify phishing attempts and enhance the ability to detect suspicious emails or messages.
- Explore the most successful phishing campaigns in 2022, such as bank scams, OneDrive scams, Netflix scams, Apple scams, and PayPal scams, to understand their tactics and strategies.
- Develop an understanding of email security measures and how to protect against common threats.
- Comprehend the concept of spear phishing and the targeted nature of such attacks.
- Learn the importance of encrypting sensitive data and methods for implementing data encryption.
- Recognize the risks associated with text message scams and best practices for avoiding them.
- Understand the significance of using secure HTTP connections (https://) for web browsing and online transactions.
- Explore the differences between the surface web, deep web, and dark web, and the potential risks associated with each.
- Acquire knowledge about mobile device security measures to protect personal and organizational data.
- Understand password safety principles and best practices to create strong and secure passwords.
- Recognize the risks and consequences of compromised email accounts and methods for mitigating such incidents.
- Gain insights into social engineering techniques and how to identify and defend against them.
- Understand the concept of ransomware and its potential impact on individuals and organizations.
- Explore the true cost of ransomware attacks, including financial, reputational, and operational consequences.
- Learn about effective ransomware protection measures and strategies to prevent and mitigate attacks.
- Develop an understanding of incident response procedures and the importance of prompt and effective responses to security incidents.
- Comprehend the concept of business continuity and the role it plays in maintaining operations during and after security incidents.
- Understand the do’s and don’ts of social media usage to ensure responsible and secure online presence.
States: AL, KY, LA, MS, MT, NJ, NC Alarm, NC Locksmith, TX