Course Details

Previous Page


IT Security for End Users: IT Security Fundamentals


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Companies that have the greatest chance of fending off IT security attacks are those that have employees who are armed with the knowledge of how to use a company's computers, network, and mobile devices with security in mind. In this course, you'll learn fundamental security concepts that apply to use as an end user, like the role you play in your company's overall IT security. This course also covers some of the most common IT security policies that apply to you as an end user, including policies for secure computer use, mobile device use, and general security policies if you work remotely.

Target Audience
End users of computer systems and mobile devices in a corporate environment, individuals interested in fundamentally secure computers, and communications practices

Prerequisites
None

Expected Duration (hours)
0.9

Lesson Objectives

IT Security for End Users: IT Security Fundamentals

  • start the course
  • describe what IT security is and what it includes
  • identify the role and purpose of IT security in the corporate environment
  • distinguish between confidentiality, integrity, and availability security objectives
  • identify the end user's role in overall IT security
  • describe general IT policy characteristics
  • identify computer and hardware security policy best practices
  • identify mobile device security policy best practices
  • identify e-mail and Internet security policy best practices
  • identify social networking security policy best practices
  • identify password security policy best practices
  • describe the specific security considerations for remote users
  • identify remote user security policy best practices
  • identify fundamental IT security best practices for the work environment
  • Course Number:
    ds_sfeu_a01_dt_enus