Course Outline

Lesson 1: Identifying Security Compliance Measures for Government

  • Determine Organizational Compliance Requirements and Resources
  • Determine Legal Compliance Requirements and Resources

Lesson 2: Recognizing and Addressing Social Engineering Attacks

  • Identify Social Engineering Attacks
  • Protect Against Social Engineering Attacks

Lesson 3: Securing Devices for Government

  • Maintain Physical Security of Devices
  • Implement Secure Authentication Methods
  • Safeguard Data
  • Prevent Malware Attacks
  • Use Wireless Devices Securely

Lesson 4: Using the Internet Securely for Government

  • Navigate the Web Safely
  • Secure Email Usage
  • Utilize Social Networks Securely
  • Access Cloud Services Securely
  • Ensure Secure Remote Work Practices

Requirements

To ensure your success in this course for government, you should have experience with the fundamental use of standard end-user technology, including desktop, laptop, or tablet computers; mobile devices; and essential internet functions, such as web browsing and email.

 7 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories