Course Outline

Lesson 1: Identifying Security Compliance Measures for Government

  • Identify Organizational Compliance Requirements and Resources for Government Operations
  • Identify Legal Compliance Requirements and Resources for Government Entities

Lesson 2: Recognizing and Addressing Social Engineering Attacks in Government Settings

  • Recognize Social Engineering Attacks Targeting Government Personnel
  • Defend Against Social Engineering Attacks to Protect Government Information

Lesson 3: Securing Devices for Government Use

  • Maintain Physical Security of Government-issued Devices
  • Use Secure Authentication Methods for Government Systems
  • Protect Government Data on All Devices
  • Defend Against Malware to Ensure the Integrity of Government Information
  • Use Wireless Devices Securely in Government Settings

Lesson 4: Using the Internet Securely for Government Operations

  • Browse the Web Safely to Protect Government Data
  • Use Email Securely to Maintain Confidentiality and Integrity of Government Communications
  • Use Social Networks Securely to Prevent Compromises in Government Accounts
  • Use Cloud Services Securely for Efficient and Protected Government Operations
  • Work from Remote Locations Securely to Ensure Continuity and Security of Government Work

Requirements

To ensure your success in this course for government, you should have prior experience with the fundamental use of standard end-user technology. This includes proficiency with desktop, laptop, or tablet computers; mobile devices; and essential internet functions, such as web browsing and email communication.
 7 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories