Your Career
Training Marketplace

Questions? Call Toll-Free: 1-866-540-9677

Course ID: 252366

e-Learning Bundle

Information Security for End Users

When you register for training with, you are also supporting local education. Find out how.

  • Instant Access
    From Anywhere
  • Unlimited
  • 6-12 Months
    To Complete


Information security plays an important part in the daily work of all users, from the office user to the remote user, regardless of their role in the organization. This course examines corporate security and how it affects end users, along with the best ways to secure your work environment, whether you work in an office, on the go, or at home. This course also examines security issues surrounding e-mail, the Internet, and social engineering.
  • describe the role of the end user in maintaining information security
  • recognize policies for creating a secure workspace environment
  • recognize policies for remote users
  • recognize your role in maintaining information security in the workplace
  • differentiate between workplace and remote user security policies
Making sure that your desktop computer, laptop, smartphone, PDA, or tablet is secured is essential in today's ever-changing business world whether you're working in your office, at home, in a hotel, or on the go. Protecting information and computer systems against malicious attacks is paramount for any organization, and every end user, regardless of their job role, has a responsibility to use their desktop computer and mobile devices safely. This course examines the types of threats that desktop computers and mobile devices may face, and effective ways to secure them.
  • recognize security threats to desktop computers
  • secure desktop computers against security threats
  • recognize security threats to mobile devices
  • secure mobile devices against security threats
  • secure desktop computers against security threats
  • secure mobile devices against security threats
E-mail has become the most used communications medium in corporate networks today, with this high usage, comes an ever increasing need to understand the security considerations involved and how the end user can help in making sure E-mail security is maintained. Social networking, and the use of social media websites has added another level of complexity to network security as users are able to open security holes if the wrong type of information is made public. This course examines the ethical use of E-mail, guidelines for using E-mail safely, and how to deal with issues as they arise. This course also examines social networking, social media, the proper use of the Internet at work, and the security issues that can arise from posting or discussing corporate information on social media sites.
  • identify the guidelines for safely using e-mail in a corporate environment
  • recognize how to handle an unsolicited e-mail in the workplace
  • recognize the guidelines for using the Internet and social media safely in a corporate environment
  • determine which e-mail safety guidelines have not been followed, given a scenario
  • determine how to handle an unsafe online activity in the workplace, given a scenario
  • use a social media site safely in the workplace

Join The 50,000+ Companies That Have Purchased Training from

  • 50K+ Companies Trained

    Including 90% Of Fortune 500 Companies Have Purchased Training With

  • 300K+ Courses & Videos

    Live Instructor-Led (Classroom & Virtual), Self-Paced E-learning & Custom OnSite Training Solutions From Leading Training Providers

  • 800+ Expert Instructors

    Industry-Leading Subject Matter Experts (SMEs).Tenured &
    Award-Winning Instructor Network

Get the latest industry news, recommended courses, & promotions from sent straight to your inbox.