IT Security for End Users: IT Security Fundamentals

End users of computer systems and mobile devices in a corporate environment, individuals interested in fundamentally secure computers, and communications practices

Prerequisite
None

Expected Duration
51 minutes

Description
Companies that have the greatest chance of fending off IT security attacks are those that have employees who are armed with the knowledge of how to use a company’s computers, network, and mobile devices with security in mind. In this course, you’ll learn fundamental security concepts that apply to use as an end user, like the role you play in your company’s overall IT security. This course also covers some of the most common IT security policies that apply to you as an end user, including policies for secure computer use, mobile device use, and general security policies if you work remotely.

Objective

IT Security Overview

  • start the course
  • describe what IT security is and what it includes
  • identify the role and purpose of IT security in the corporate environment
  • distinguish between confidentiality, integrity, and availability security objectives
  • identify the end user’s role in overall IT security
  • describe general IT policy characteristics

Work Environment Security Policies

  • identify computer and hardware security policy best practices
  • identify mobile device security policy best practices
  • identify e-mail and Internet security policy best practices
  • identify social networking security policy best practices
  • identify password security policy best practices

Remote User Security Policies

  • describe the specific security considerations for remote users
  • identify remote user security policy best practices

Practice: Securing the Work Environment

  • identify fundamental IT security best practices for the work environment

MONTHLY SUBSCRIPTION

$129/month
 

ANNUAL SUBSCRIPTION

$1295/year

Multi-license discounts available for Annual and Monthly subscriptions.