Course Details

Previous Page


IT Security for End Users: Using Corporate Devices Securely


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Knowing how to use corporate computers and devices in a secure way helps ensure you don't jeopardize your work, your organization, or your personal security. In this course you'll learn about common threats to corporate computers, including malicious attacks, and best practices for using your computer in ways that prevent these attacks. This course also covers some of the security threats you might face when using corporate mobile devices, and techniques you can use to protect your device and yourself.

Target Audience
End users of computer systems and mobile devices in a corporate environment, individuals interested in fundamentally secure computers, and communications practices

Prerequisites
None

Expected Duration (hours)
0.8

Lesson Objectives

IT Security for End Users: Using Corporate Devices Securely

  • start the course
  • describe characteristics of human error threats to corporate computer security
  • describe characteristics of malicious behavior that threatens corporate computer security
  • identify best practices for protecting your corporate computer against malicious behavior
  • describe characteristics and best practices for using file encryption and access controls to protect your corporate computer
  • describe characteristics and best practices for using system patches to protect your corporate computer
  • describe characteristics and best practices for using antivirus software to protect your corporate computer
  • identify potential physical security threats to corporate mobile devices
  • distinguish between the different types of malware threats
  • identify characteristics of threats to mobile devices via wireless networks
  • identify best practices for securing corporate mobile devices against common physical threats
  • identify best practices for securing corporate mobile devices against common malware threats
  • identify best practices for securing corporate mobile devices against common wireless network threats
  • identify best practices for securing both corporate computers and corporate mobility devices against common threats
  • Course Number:
    ds_sfeu_a02_dt_enus