Font size:

Description:

This is a bundled training package. It contains training for each of the bundled items below:

Course Price
Introduction to Information Security $74.95
Using your Desktop Computer and Mobile Devices Safely $74.95
Using E-mail, the Internet, and Social Media Safely in a Corporate Environment $74.95

Bundle Price: $139.00
Total Savings: $85.85


Introduction to Information Security

Information security plays an important part in the daily work of all users, from the office user to the remote user, regardless of their role in the organization. This course examines corporate security and how it affects end users, along with the best ways to secure your work environment, whether you work in an office, on the go, or at home. This course also examines security issues surrounding e-mail, the Internet, and social engineering.
  • describe the role of the end user in maintaining information security
  • recognize policies for creating a secure workspace environment
  • recognize policies for remote users
  • recognize your role in maintaining information security in the workplace
  • differentiate between workplace and remote user security policies

Using your Desktop Computer and Mobile Devices Safely

Making sure that your desktop computer, laptop, smartphone, PDA, or tablet is secured is essential in today's ever-changing business world whether you're working in your office, at home, in a hotel, or on the go. Protecting information and computer systems against malicious attacks is paramount for any organization, and every end user, regardless of their job role, has a responsibility to use their desktop computer and mobile devices safely. This course examines the types of threats that desktop computers and mobile devices may face, and effective ways to secure them.
  • recognize security threats to desktop computers
  • secure desktop computers against security threats
  • recognize security threats to mobile devices
  • secure mobile devices against security threats
  • secure desktop computers against security threats
  • secure mobile devices against security threats

Using E-mail, the Internet, and Social Media Safely in a Corporate Environment

E-mail has become the most used communications medium in corporate networks today, with this high usage, comes an ever increasing need to understand the security considerations involved and how the end user can help in making sure E-mail security is maintained. Social networking, and the use of social media websites has added another level of complexity to network security as users are able to open security holes if the wrong type of information is made public. This course examines the ethical use of E-mail, guidelines for using E-mail safely, and how to deal with issues as they arise. This course also examines social networking, social media, the proper use of the Internet at work, and the security issues that can arise from posting or discussing corporate information on social media sites.
  • identify the guidelines for safely using e-mail in a corporate environment
  • recognize how to handle an unsolicited e-mail in the workplace
  • recognize the guidelines for using the Internet and social media safely in a corporate environment
  • determine which e-mail safety guidelines have not been followed, given a scenario
  • determine how to handle an unsafe online activity in the workplace, given a scenario
  • use a social media site safely in the workplace
Register Now
Information Security for End Users e-learning bundle
  • Course ID:
    252366
  • Duration:
    3 hours
  • Price:
    $139