Identifying the Need for Security
Identify Security Compliance Requirements
- Consequences of Non-compliance
Recognize Social Engineering
- Social Engineering Goals
- Types of Social Engineering Attacks
Securing Devices
Maintain Physical Security of Devices
- Digital Breadcrumbs
Use Passwords for Security
- Two-Step Authentication
- Password Managers
- Biometrics
Protect Your Data
- Data Backup
- Mobile Device Considerations
Identify and Mitigate Malware
- Malware Types
- Malware Sources and Effects
Use Wireless Devices Securely
- Wi-Fi Security Techniques
- Organizational and Personal Devices
Using the Internet Securely
Browsing the Web Securely
- URL Structure
- HTTP vs. HTTPS
- Suspicious URL’s
Using Email Securely
- Email Attachments
- Common Phishing Techniques
Using Social Networking Securely
- Common Social Networking Security Risks
Using Cloud Services Securely
- Cloud Service Risks
- IoT (Internet of Things) Device Considerations