Upload
nguyennguyet
View
215
Download
1
Embed Size (px)
Citation preview
SCP - Security Awareness Program
Course Introduction 2m Course Introduction
Lesson 1 - Security Awareness Overview 11m Security Awareness Overview
What is Security?
Security Risks
How This Affects You
What is Security Awareness?
What does this cover?
The Weakest Link
Reducing Risk
Lesson 1 Review
Lesson 2 - Social Engineering 14m Social Engineering
What is this?
Why is it Effective?
Primary Methods
Social Engineering Defense
Lesson 2 Review
Lesson 3 - Identity Theft 18m Identity Theft
What is Identity Theft?
What Follows?
How an Identity is Stolen
Identity Theft Defense
Online Defense
If You Have Been Targeted
If Your Identity Has Been Stolen
Contact Information
Lesson 3 Review
Lesson 4 - Data Classification 15m Data Classification
Viewing and Sharing Data
Need for Data Classifications
Classification Systems
Other Institutions
Your Role
Consequences
Dumpster Diving
Information Disposal
Lesson 4 Review
Lesson 5 – Backups 15m Backups
Why Backups are Important
Types of Backups
What to Backup
Where to Store Backups
How to Perform Backups
Windows Backup Utility
Backup Management
Lesson 5 Review
Lesson 6 – Passwords 22m Passwords
Common Password Policies
Weak Passwords
Strong Passwords
Password Development
Strong Passwords (Cont.)
Multiple Passwords
Beyond the Password
Lesson 6 Review
Lesson 7 - Viruses, Worms, and Trojans 22m Viruses, Worms, and Trojans
What are these things?
My Computer Caught a Virus?
My Computer has a Worm?
My New Trojan Horse
Spyware
Signs You May Have Spyware
File Attachments
Extension Examples
File Attachments (Cont.)
Antivirus
Manual Scanning
Antivirus Best Practices
Lesson 7 Review
Lesson 8 - Secure Computer Use 31m Secure Computer Use
Physical Security
Desktop Security
Laptop Security
Screensavers
Encryption
Mobile Phone / PDA Security
Personal Firewalls
Patching and Updates
Electronic Disposals
Lesson 8 Review
Lesson 9 - Secure Internet Use 53m Secure Internet Use
Email Overview
Email Formats
Email Encryption
SPAM
SPAM Blockers
Email Attachments
Long Filename Examples
Unsafe Files in Outlook
Email Hoaxes and Spoofing
Email Security
Email Virus Found
To Cut Down on SPAM
Web Browsing Overview
Web Sites
Pop-ups
Web Browser Settings
Web Browsing
Instant Messaging
IM Risks
IM Best Practices
Lesson 9 Review
Lesson 10 - Intellectual Property and Software Piracy 14m Intellectual Property and Software Piracy
Intellectual Property
Copyright
Online Copyright
Software Piracy
Types of Software Piracy
Software Piracy is Theft
Individual Risks
Corporate Risks
Lesson 10 Review
Lesson 11 - Security Policy and Incident Response 14m Security Policy and Incident Response
Security Policies
Security Policy Contents
Example User Account Statements
Example Internet Access Statements
Example Email Use Statements
Why Policies Matter
Defining an Incident
Responding to an Incident
Incident Response Checklist
Lesson 11 Review
Lesson 12 - Education and Continual Awareness 10m Education and Continual Awareness
Education is the Key
Education and Continual Awareness (Cont.)
For Individuals
For Organizations
SCP Certifications
For Organizations (Cont..)
Lesson 12 Review
Course Closure
Total Duration: 3 hrs 49m