Course Outline
Lesson 1: Identifying Security Compliance Measures for Government
- Determine Organizational Compliance Requirements and Resources
- Determine Legal Compliance Requirements and Resources
Lesson 2: Recognizing and Addressing Social Engineering Attacks
- Identify Social Engineering Attacks
- Protect Against Social Engineering Attacks
Lesson 3: Securing Devices for Government
- Maintain Physical Security of Devices
- Implement Secure Authentication Methods
- Safeguard Data
- Prevent Malware Attacks
- Use Wireless Devices Securely
Lesson 4: Using the Internet Securely for Government
- Navigate the Web Safely
- Secure Email Usage
- Utilize Social Networks Securely
- Access Cloud Services Securely
- Ensure Secure Remote Work Practices
Requirements
To ensure your success in this course for government, you should have experience with the fundamental use of standard end-user technology, including desktop, laptop, or tablet computers; mobile devices; and essential internet functions, such as web browsing and email.
Testimonials (5)
Explaining in detail regarding RHDS.
Murat Kumburlu - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
I learned a lot and gained knowledge can use at my work!
Artur - Akademia Lomzynska
Course - Active Directory for Admins
General course information
Paulo Gouveia - EID
Course - C/C++ Secure Coding
Trainer willing to answer questions and give bunch of examples for us to learn.
Eldrick Ricamara - Human Edge Software Philippines, Inc. (part of Tribal Group)
Course - Security Testing
It opens up a lot and gives lots of insight what security