Instructoradmin
TypeOnline Course
DateMar 1, 2019 - Dec 15, 2022
Student Enrolled352
PriceFree
Buy NowBook Now
hacker

There’s little doubt that cyber threats have multiplied dramatically and hackers have become increasingly sophisticated. Organizations are under attack from all directions as cyber crime has become big business. As first line of defense against the bad guys, you as an employee must take personal responsibility to safeguard your company and its information assets.
This training highlights importance of Information Security.

After completing this training you will be able to understand

  • Concept of Information Security
  • Goal of Information Security
  • Company policies and good practices
  • Security threats
  • Dos and Don’ts

 Total Duration: 45 Minutes

Section 1Introduction to Information Security
Lecture 1What is Information SecurityFree Preview

What is Information Security

Information security is the state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this.

It is a process that moves through phases; building and strengthening itself along the way. Information Security is about securing information from unauthorized access. In addition, it is also the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. Information can be stored on any format – physical or electronic.

Importance of security awareness

Employee awareness is a critical element of security. Employees need to understand the value of protecting customer and colleague information and their role in keeping it safe. Employees also need a basic grounding in other risks and how to make good judgments online.

The best security technology in the world can’t help an organization unless employees understand their roles and responsibilities in safeguarding sensitive data and protecting company resources”

Lecture 2Goals of Information Security
Lecture 3Information Security Process
Section Quiz
Section 2IT Security Threats
Lecture 4Quiz Explanation
Lecture 5IT Security Threats
Lecture 6Social Engineering
Lecture 7Phishing
Lecture 8Physical Security
Lecture 9Desktop SecurityFree Preview

Threats – Desktop Security


How often do you leave your house without locking your doors?

Rarely, right?

You are effectively leaving your front door unlocked when you leave your computer unattended without securing your desktop

The primary security consideration when talking about desktop security has to be users. As a user on a network, you have unparalleled access to your organizations resources, and this access can create vulnerability in security if you, our employee is not careful.

While most users don’t intentionally cause damage to their network, there are unintended consequences when users find themselves ignoring best practice and opening emails and attachments from unverified sources.

Lecture 10Wireless Network Security
Lecture 11Password Security
Lecture 12Malware
Section Quiz
Section 3Company Policies
Lecture 13Quiz Explanation
Lecture 14Good Practices
Lecture 15System AccessFree Preview

Company Policies – System Access

System access refers to the collective procedures by which authorized users access a computer system and unauthorized users are kept from doing so. To make this distinction a little more realistic, however, understand that user access security limits even authorized users to those parts of the system that they are explicitly permitted to use (which, in turn, is based on their “need-to-know”). After all, there is no reason for someone in Staff Payroll to be given clearance to confidential student records.

Let’s go through the following incident.


Read! Think! Understand!

Kim approached Fred cautiously. As the security manager, she knew how important it was to gather information completely before jumping to conclusions. “Fred, my review of our computer logs shows that you have been logging in and looking at confidential student information. I couldn’t understand why someone in Food Services would need to be browsing through individual student test scores, so I thought I’d come by and ask you.”

Fred looked up at Kim as he if was surprised to be entertaining such a question. “Are you forgetting that I’m authorized to access student records?”

“You’re authorized to access specific elements that relate to a student’s free- and reduced-price lunch eligibility,” Kim clarified. “That’s the limit of your need-to-know.”

“I didn’t know that my access was limited,” Fred asserted honestly. “I figured that if my password got me into a file, it was fair game.”

Kim paused, realizing that it might be reasonable for Fred to have assumed that he was allowed to read a file if his password gave him access. “Hmm, I see your point, Fred, but in truth you shouldn’t be accessing student record information that isn’t related to your legitimate educational duties. I’m not going to make a big deal of it this time, but from now on, limit your browsing to the free- and reduced-price lunch information. In the meantime, I’m going to send a memo out to staff reminding them what need-to-know really means.”

“And you might want to reconsider how our password system works,” Fred added. “It would have been very clear to me that I had no business in a file if my password wouldn’t get me in.”

If you have been given access to a particular system, please remember it is for you and no sharing of UserID and password is allowed. You are responsible for safeguarding your user account and password.

In later sections, secure password tips will be provided.

Lecture 16Anti Virus & Malware Protection
Lecture 17Backup & Synch
Lecture 18Software Licenses
Lecture 19Internet and Email Use
Lecture 20Internal Network Protection
Section 4Recap Dos and Donts
Lecture 21Dos
Lecture 22Donts
Section 5Summary
Lecture 23Summary
Lecture 24Certification Quiz