Mile2 C)SA1 + C)SA 2 – Security Awareness 1+2

Cursul de certificare Mile2® Certified Security Awareness 1 + 2, este destinat tuturor celor care folosesc un computer cu internet. Participanții vor învăța amenințările de securitate inerente la locul de muncă actual, precum și contramăsurile asociate acestora.

Cui i se adresează?

Cui i se adresează?

Acest curs este conceput pentru:

  • Utilizatori finali
  • Angajați
  • Manageri

Ce vei învăța?

Ce vei învăța?

Angajații vor învăța că veriga cea mai slabă în orice program de securitate este un departament slab instruit. Cursul Certified Security Awareness învață conștientizarea generală a securității, precum și modul de a dezvolta o cultură de securitate puternică în cadrul comunității companiei.

Cerințe preliminare:

Cerințe preliminare:

Nu sunt cerințe preliminare.

Agenda cursului:

Materialele de curs sunt în limba Engleză. Cursul include:

  • Individual Course Access
  • Online Course Video
  • E-Book
  • E-Lab Guide
  • Exam Prep
  • Exam
  • Cyber Range Access

Agenda cursului:

Materialele de curs sunt în limba Engleză. Cursul include:

  • Individual Course Access
  • Online Course Video
  • E-Book
  • E-Lab Guide
  • Exam Prep
  • Exam
  • Cyber Range Access

C)SA 1 – Agenda:

Module 1 – Basic Security Awareness

  • What is it and why it’s needed? End User Risk Trends
  • Who, What and How are people the target
  • What are the losses associated to end user hacks?
  • The policies are as good as the employee who embraces them

 

Module 2 – Social Engineering

Phishing

  • mail, via phone, social websites are common

Spear Phishing

  • Example: Fake email sample
  • Social media
  • Personification

 

Module 3 – Data Classification and corporate use (Safe Guarding)

Corporate

  • Sensitive, internal or public classification
  • Objectives of securing data (IP, Compliance/legislature)

Personal vs. Business Use

  • Segregating personal use with business use

Data management

  • Business standard for deleting data
  • Personal standard of data dumping (old phones/hard drives and usb)
  • Did you know that I can unearth deleted docs from a USB drive from a standard Forensics app off of the internet?
  • How to delete and get rid of your old data

 

Module 4 – End User Best Practices

Internet utilization

  • Hot spots, public places & roaming risks

Safe Web Site surfing

  • Discerning safe secure sites (never go to a site link indirectly)
  • Locks and HTTPS

Computer Usage

  • Using computer in non-admin mode
  • Ransomware

Password management

Removable Devices

Mobile, Smart Phones and Tablets (risks associated with mobile devices)

  • Device always locked
  • Device should always be trackable

C)SA2 – Agenda:

Chapter 1 – Creating a Cyber Security Culture

  1. Non-malware Attack Statistics 2017 (Carbon Black)
  2. Cyber Security Culture
  3. Requirements for Successful CSC
  4. Steps to Create CSC
  5. Key People for a Successful CSC and Their Roles
  6. How Various Departments are Related to the CSC Program
  7. Leadership Skills
  8. Techniques Used by Successful Leaders
  9. Yearly Training and Drills

 

Chapter 2 – Social Engineer Attacks: Executive Management and Assets

  1. Techniques used by Hackers
  2. Why Executives are Pinpointed as Targets
  3. Whaling Attacks
  4. Recent Successful Whaling Attacks
  5. Whaling Mitigation
  6. Intellectual Property
  7. IP Categories
  8. IP Legally Defined Categories
  9. Keeping IP Safe
  10. Keeping IP Safe – Recommendation

 

Chapter 3 – Incident Preparedness and Management Planning

  1. Incident Mitigation
  2. Incident Mitigation
  3. Cyber Insurance
  4. Cyber Insurance Gaps
  5. Incident Preparedness Steps
  6. Preparation Step
  7. Identification Step
  8. Crisis Management
  9. Post Crisis Management
  10. Post Crisis Management
  11. General Recommendation for Post Crisis

 

Chapter 4 – Laws and Global Compliance Standards

  1. Laws & Standards
  2. Laws & Standards
  3. 12 PCI DSS Requirements
  4. Laws & Standards
  5. SOX Most Important Sections
  6. Laws & Standards
  7. Data Classification
  8. Objectives of Data Classification
  9. Personal vs. Business Use
  10. Personal vs. Business Use
  11. Business Standard for Deleting Data
  12. Mobile Device Security Risks
  13. Mobile Device Security
  14. BYOD Challenges
  15. BYOD Policy

Programe de certificare

Programe de certificare

Acest curs îi pregătește pe participanți pentru susținerea examenelor C)SA1 + C)SA2 și obținerea certificării de Certified Security Awareness 1 + 2.

Mile2 C)SA1 + C)SA 2 – Security Awareness 1+2

Detalii curs

Durată

365
zile

Preț

550 EUR

Modalități de livrare

Studiu individual

Nivel de specializare

1. Entry

Roluri asociate

Security Engineer