Website: http://www.btstraining.com
Toll Free: 1-877-Info2Day
Email: info@btstraining.com
Hands-On
Security Awareness
 
Course Description
This extensive Hands-On course will describe the importance of securing information, and identify the different ways to guard yourself against social engineering exploits.
This course will also cover the security practices related to computers, mobile devices, networks, and the Internet.

Teach techs to maintain the security of the files and folders stored on your computing devices, identify and protect information against risks associated with the cyber world, identify potential security incidents, ways to respond in the event of a possible breach, and measures to prevent a security breach.

Also identify methods to keep the cloud and virtualized environments secured and much more...
Students Will Learn
Target Audience
This course is a must for anyone who intends to use computers at home or in an office and or networking environment.
Prerequisites
Students should understand fundamental computer concepts, such as how to run applications, manage files, and use a web browser.
Course Outline


Lesson 1: Securing Information

A: Examine Information Security
B: Implement Physical Security Measures
C: Examine Cyber Security

 
Lesson 2: Guarding Against Social Engineering Exploits

A: Identify Social Engineering Exploits
B: Counteract Social Engineering Exploits
C: Evolve Social Engineering Organization Policies

 
Lesson 3: Identifying Security Measures

A: Strengthen Desktop Security
B: Strengthen Software Security
C: Strengthen Browser Security
D: Strengthen Network Security
E: Secure Wireless Networks
F: Strengthen Mobile Security

 
Lesson 4: Maintaining File System Security

A: Implement File System Security in Windows
B: Back Up and Restore Data
C: Dispose of Data Securely

 
Lesson 5: Guarding Against Attacks

A: Protect a Computer from Security Threats
B: Protect Computers from Virus Attacks
C: Protect Computers from Social Network Threats

 
Lesson 6: Handling Security Breaches

A: Identify Incidents
B: Respond to Incidents

 
Lesson 7: Identifying Cloud Computing And Virtualization Security Methods

A: Fundamentals of Cloud Computing
B: Fundamentals of Virtualization

 
Appendix A: Security and Privacy Regulations
 

 

Delivery Method
Instructor-Led with numerous Hands-On labs and exercises.
Equipment Requirements
(This apply's to our hands-on courses only)
BTS always provides equipment to have a very successful Hands-On course. BTS also encourages all attendees to bring their own equipment to the course. This will provide attendees the opportunity to incorporate their own gear into the labs and gain valuable training using their specific equipment.
Course Length
3 Days

Website: http://www.btstraining.com
Toll Free: 1-877-Info2Day
Email: info@btstraining.com