• Online, Self-Paced
Course Description

Companies that have the greatest chance of fending off IT security attacks are those that have employees who are armed with the knowledge of how to use a company's computers, network, and mobile devices with security in mind. In this course, you'll learn fundamental security concepts that apply to use as an end user, like the role you play in your company's overall IT security. This course also covers some of the most common IT security policies that apply to you as an end user, including policies for secure computer use, mobile device use, and general security policies if you work remotely.

Learning Objectives

IT Security Overview

  • start the course
  • describe what IT security is and what it includes
  • identify the role and purpose of IT security in the corporate environment
  • distinguish between confidentiality, integrity, and availability security objectives
  • identify the end user's role in overall IT security
  • describe general IT policy characteristics

Work Environment Security Policies

  • identify computer and hardware security policy best practices
  • identify mobile device security policy best practices
  • identify e-mail and Internet security policy best practices
  • identify social networking security policy best practices
  • identify password security policy best practices

Remote User Security Policies

  • describe the specific security considerations for remote users
  • identify remote user security policy best practices

Practice: Securing the Work Environment

  • identify fundamental IT security best practices for the work environment

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Systems Architecture