3
SCP - Security Awareness Program Course Introduction 2m Course Introduction Lesson 1 - Security Awareness Overview 11m Security Awareness Overview What is Security? Security Risks How This Affects You What is Security Awareness? What does this cover? The Weakest Link Reducing Risk Lesson 1 Review Lesson 2 - Social Engineering 14m Social Engineering What is this? Why is it Effective? Primary Methods Social Engineering Defense Lesson 2 Review Lesson 3 - Identity Theft 18m Identity Theft What is Identity Theft? What Follows? How an Identity is Stolen Identity Theft Defense Online Defense If You Have Been Targeted If Your Identity Has Been Stolen Contact Information Lesson 3 Review Lesson 4 - Data Classification 15m Data Classification Viewing and Sharing Data Need for Data Classifications Classification Systems Other Institutions Your Role Consequences Dumpster Diving Information Disposal Lesson 4 Review Lesson 5 Backups 15m Backups Why Backups are Important Types of Backups What to Backup

SCP - Security Awareness Program - itSM Solutions · SCP - Security Awareness Program ... Lesson 1 - Security Awareness Overview 11m Security Awareness Overview ... Patching and Updates

Embed Size (px)

Citation preview

Page 1: SCP - Security Awareness Program - itSM Solutions · SCP - Security Awareness Program ... Lesson 1 - Security Awareness Overview 11m Security Awareness Overview ... Patching and Updates

SCP - Security Awareness Program

Course Introduction 2m Course Introduction

Lesson 1 - Security Awareness Overview 11m Security Awareness Overview

What is Security?

Security Risks

How This Affects You

What is Security Awareness?

What does this cover?

The Weakest Link

Reducing Risk

Lesson 1 Review

Lesson 2 - Social Engineering 14m Social Engineering

What is this?

Why is it Effective?

Primary Methods

Social Engineering Defense

Lesson 2 Review

Lesson 3 - Identity Theft 18m Identity Theft

What is Identity Theft?

What Follows?

How an Identity is Stolen

Identity Theft Defense

Online Defense

If You Have Been Targeted

If Your Identity Has Been Stolen

Contact Information

Lesson 3 Review

Lesson 4 - Data Classification 15m Data Classification

Viewing and Sharing Data

Need for Data Classifications

Classification Systems

Other Institutions

Your Role

Consequences

Dumpster Diving

Information Disposal

Lesson 4 Review

Lesson 5 – Backups 15m Backups

Why Backups are Important

Types of Backups

What to Backup

Page 2: SCP - Security Awareness Program - itSM Solutions · SCP - Security Awareness Program ... Lesson 1 - Security Awareness Overview 11m Security Awareness Overview ... Patching and Updates

Where to Store Backups

How to Perform Backups

Windows Backup Utility

Backup Management

Lesson 5 Review

Lesson 6 – Passwords 22m Passwords

Common Password Policies

Weak Passwords

Strong Passwords

Password Development

Strong Passwords (Cont.)

Multiple Passwords

Beyond the Password

Lesson 6 Review

Lesson 7 - Viruses, Worms, and Trojans 22m Viruses, Worms, and Trojans

What are these things?

My Computer Caught a Virus?

My Computer has a Worm?

My New Trojan Horse

Spyware

Signs You May Have Spyware

File Attachments

Extension Examples

File Attachments (Cont.)

Antivirus

Manual Scanning

Antivirus Best Practices

Lesson 7 Review

Lesson 8 - Secure Computer Use 31m Secure Computer Use

Physical Security

Desktop Security

Laptop Security

Screensavers

Encryption

Mobile Phone / PDA Security

Personal Firewalls

Patching and Updates

Electronic Disposals

Lesson 8 Review

Lesson 9 - Secure Internet Use 53m Secure Internet Use

Email Overview

Email Formats

Email Encryption

SPAM

SPAM Blockers

Email Attachments

Long Filename Examples

Page 3: SCP - Security Awareness Program - itSM Solutions · SCP - Security Awareness Program ... Lesson 1 - Security Awareness Overview 11m Security Awareness Overview ... Patching and Updates

Unsafe Files in Outlook

Email Hoaxes and Spoofing

Email Security

Email Virus Found

To Cut Down on SPAM

Web Browsing Overview

Web Sites

Pop-ups

Web Browser Settings

Web Browsing

Instant Messaging

IM Risks

IM Best Practices

Lesson 9 Review

Lesson 10 - Intellectual Property and Software Piracy 14m Intellectual Property and Software Piracy

Intellectual Property

Copyright

Online Copyright

Software Piracy

Types of Software Piracy

Software Piracy is Theft

Individual Risks

Corporate Risks

Lesson 10 Review

Lesson 11 - Security Policy and Incident Response 14m Security Policy and Incident Response

Security Policies

Security Policy Contents

Example User Account Statements

Example Internet Access Statements

Example Email Use Statements

Why Policies Matter

Defining an Incident

Responding to an Incident

Incident Response Checklist

Lesson 11 Review

Lesson 12 - Education and Continual Awareness 10m Education and Continual Awareness

Education is the Key

Education and Continual Awareness (Cont.)

For Individuals

For Organizations

SCP Certifications

For Organizations (Cont..)

Lesson 12 Review

Course Closure

Total Duration: 3 hrs 49m