Complete Computer security Awareness Training

Learn about the measures that you must take to ensure that your computer and the data stored over it remain secure

Security Awareness

Our Client

What is Computer Security ?

Computer security training should be the top priority of businesses that use computers or Internet-connected devices (IoTs) in their workplace. Even those who use mobile phones and tablets for work need computer security.

Fortunately, basic computer security is easy. Several measures such as password protection, two factor authentication, access control and email hygiene can be implemented easily.

But if your business depends heavily on technology; you would need to put in place more complex measures. This is because such dependence increases your vulnerability to cyber attacks. Today’s criminals are known to use vicious tools such as ransomware to disrupt businesses.

To protect the privacy of your computer files, and ensure that your computer is available when you need to use it, you need to ensure that your computer is secure at all times.

As you go through this course, we’ll introduce you to simple measures that you need to take to help secure your computer against threats, such as viruses.

We’ve divided this course into two parts.

  1. In Part 1, you’ll be introduced to malicious software and other threats to your system and data
  2. In Part 2, you’ll cover other important computer security topics, such as choosing strong passwords, using the Internet safely, and making sure that your computer is physically sure.

Course Description

CategoryInformation Security
Course NameSecuring your computer
Duration30 mins
Certificate IncludedYes
Languages English
Course TypeInteractive online training
NarrationYes
FormatLM-light, SCORM 1.2
Supported DevicesDesktop/Laptop, Tablet, Phone
Last UpdatedJune 30, 2021

What you’ll learn

  • How to deal with malware and other threats to your computer and data
  • How to use social networks safely
  • Phishing and spear phishing
  • Good password practices, including choosing strong passwords, and protecting them
  • How to keep yourself safe when surfing the Internet 
  • Protecting your computer from physical threats

Curriculum

Securing your computer Part -1 

  1. Securing your computer Part -1
  2. Structure of this course
  3. What is Malware?
  4. What has malware looked like in the past?
  5. Malware of note from last year
  6. How does malware spread?
  7. Are all websites safe?
  8. Anatomy of a drive-by download
  9. How criminals poison search results
  10. What are Scareware pop-ups
  11. Rogue security software
  12. How to deal with attachments?
  13. Scanning files and attachments
  14. Shared disks spread malware
  15. Network security
  16. Using social networks at work
  17. Why do social media websites pose a threat?
  18. Using smartphones
  19. Mobile malware is here in force
  20. Cloud computing affects everybody
  21. Peer to peer messaging and instant messaging
  22. Spotting if you’ve been infected
  23. Introduction to phishing
  24. Phishing – A definition
  25. How a phishing attack works
  26. Example – Your account must be reactivated
  27. Example – Help us to help you
  28. Example – Take part in a survey
  29. Example – Update your account details
  30. Spear phishing – Why hack the computer when I can hack the person?
  31. Examples of spear phishing
  32. How NOT to get phished?
  33. A key precaution – Keep your software updated

Securing your computer Part -2

  1. Securing your computer Part -2
  2. Structure of this course
  3. Choosing strong passwords
  4. How do criminals get your password?
  5. Rule #1: Don’t use (undisguised) common words
  6. Rule #2: Use a combination of character types
  7. Longer passwords are better
  8. Rule #3: Use the longest password that you can remember
  9. Pop quiz: Some poor choices
  10. Our password standard
  11. Use more than one password
  12. Protecting your passwords
  13. Change your password frequently
  14. No more sticky notes!
  15. Don’t save passwords
  16. Password manager
  17. Don’t share passwords
  18. Passwords and email don’t mix
  19. Shoulder surfing
  20. Social engineering
  21. Writing down your passwords
  22. Safe use of the Internet
  23. Use your judgment
  24. Checking links – Method 1
  25. Checking links – Method 2
  26. Sending sensitive information
  27. What is SSL?
  28. A very important warning!
  29. Check to see if SSL is enabled
  30. The address pane
  31. The lock icon
  32. Physically secure your computer
  33. Access control
  34. External devices
  35. How to safeguard data from fire
  36. Flooding and liquid spillage
  37. Electric interruptions or surges

Why emPower

100s of customers

  • 14+ Years of experience in working with small to large businesses from different industries
  • 95% customer retention

Customer Experience

  • 24x7 dedicated support and toll free number
  • 99%+ guaranteed uptime

Extremely Cost-effective

  • As low as $0.99/user/yr
  • We will match or better the price of your current LMS

Effective Courses

  • Each course is 20-40 min long to ensure engagement with quizzes and certificate
  • SCORM 1.2 Compliant

Implementation

  • No setup costs
  • We deploy your customized solution in less than 48 hours

Our Achievements

Here you can review some statistics about our Education Center

Individual Users
0
Organizations
0
Certificates
0

Start Your Certification Course Today

Use of mobile devices for everyday work inherently increases the risk of a security breach. Major security issues include mobile malware or viruses, use of the device in other people’s networks, firewalls, wireless networks, shoulder surfing, etc.

If you allow workers to bring in or use mobile devices for work, you need to put in place serious mobile device security measures. Beginning from inventory management, you need to have processes for mobile use, management of mobile applications, access management and data security over mobile devices.

To start with, enforce a BYOD policy. Along with this, you need to put in place mobile security measures such as application control, encryption, data backup, and remote wipe and control over devices that carry sensitive data.

Even in normal day-to-day use, mobile devices can put you at higher risk of a security breach. Major challenges include loss or theft of your devices, failure to encrypt data, lack of password protection, mobile malware, and fake apps.

Mobile device security policies need to be robust, and comprehensive in defining security practices. At bare minimum, your policies need to cover password security, secure use of apps, data encryption, remote wipe and device inventory.