Every registration supports local education. TrainUp Gives Back
Logo

Your Career Training Marketplace

Questions? Call Toll-Free: 1-866-540-9677


When you register for training with TrainUp.com, you are also supporting local education. Find out how.
  • Instant Access ImageInstant Access
    From Anywhere
  • Unlimited Viewing ImageUnlimited
    Viewing
  • calendar Image 6-12 Months
    To Complete

Description

The advancement in corporate communications and social networking has opened countless opportunities and new ways for people to perform their jobs. But just as our IT communications options have advanced, so have the security threats posed by these advancements. In this course you'll learn about the common threats to corporate computers and devices that exploit vulnerabilities in our communications and networking methods such as e-mail, Internet, and social networking platforms. This course also covers best practices and techniques to mitigate security risks while conducting communications as part of your job. Finally this course covers what social engineering is, and how as an end user of corporate computers and devices you can protect yourself and your company from the intelligent ways hackers use social engineering.

Learning Objectives
  • Start the course
  • Identify the threats to corporate security that can result from unsecured communications technologies
  • Identify the potential threats from unsecured e-mail usage
  • Describe best practices for ethical and safe e-mail use
  • Identify the common security threats to corporate systems and infrastructure from using unsecured webmail access at work
  • Identify best practices for securely accessing webmail services
  • Describe the common corporate security risks of Internet usage
  • Identify secure corporate Internet usage best practices
  • Identify characteristics and risks of social engineering scams
  • Describe techniques to avoid being a victim of social engineering scams
  • Identify risks to corporate systems from unsecured social networking activities
  • Identify best practices when using social networking platforms
  • Identify best practices for securely using corporate e-mail, access webmail, Internet use, and social networking activities
  • Audience

Get the latest industry news, recommended courses, & promotions from TrainUp.com sent straight to your inbox.