IT Security Awareness for Employees and Individuals
What you'll learn
- Understand the Golden Rules for Security – what you have to do
- Learn how the Internet works and Attackers use simple technologies to trick you
- Recognize common Attack Schemes
- Technical Rules and practical behavioral Guidelines
Requirements
- None, just be interested in your IT / Computer / Internet Security!
Description
IT Security Awareness for Employees and Individuals
- The pragmatic complete Guide to Internet and Computer Security -
Am I secure? What I can do for IT security as an employee and individual. As a manager: Follow ISO/IEC 27001 and ISO/IEC 27002 that requires security awareness training for your team and employees.
Anyone who works with computers or mobile digital devices should understand the basics of the internet, to be able to behave correctly. This course explains the background to how the internet works and which schemes attackers use to trick users.
The courses describes technical countermeasures as well as the correct user behavior plus guides users to recognize common attacking schemes.
How do Cyber criminals think? What are the dangers? What do I have to watch out for? Are cookies bad?
The course will answer these questions and more:
Introduction & Motivation
What actually is "Security"? - Trying to understand In-/Security
Internet Basics: The Internet...and the Cloud
Basic Attacking Scheme
Users as the weak point: Recognizing Attack Schemes & Phishing (Part 1)
Users as the weak point: Recognizing Attack Schemes & Phishing (Part 2)
Users as the weak point: Recognizing Attack Schemes & Phishing (Part 3)
Example: The ideal (Banking-)Trojan
Technical Security: Hacking
E-Mail Security
Insert: Online Shopping
Insert: The 'better' (more secure) Operating system?
Insert: 'Hacking' outside of PCs and mobile Devices
Insert: Disposing, Passing on, Selling Devices
Authentication & Passwords
Backup - Do we need that?
The Golden Security Rules
Instructor Frank Hissen, Computer Scientist and Security Expert, teaches IT security for over 20 years and works for companies of all sizes as IT Security Consultant and Software Engineer.
.
Who this course is for:
- Every individual using computers and mobile devices – for private or business purposes
Instructor
Frank Hissen successfully studied Computer Science at Darmstadt University of Technology (Germany) focusing on IT security. For over 25 years, he works as IT consultant and software engineer; for over 20 years, he also works in various positions as security expert in IT development and consulting projects of large businesses but also medium-sized companies.
In the area of IT security, Mr. Hissen is specialized in applied and technical IT security. He developed and implemented security solutions and accompanied processes for secure product and software development.
In the area of cryptography and encryption, Mr. Hissen developed security solutions as Senior Solution Engineer at SECUDE before he became self-employed in 2009. Since then he works as freelancing expert in the area of web and cloud application security. He creates secure conceptual designs of system architectures but also takes care of their secure implementation and corresponding security requirements.
Mr. Hissen worked in various projects among others for Deutsche Telekom AG, SECUDE, Allianz AG and SAP Research.