Certified Security Awareness 1

The mile2 vendor neutral Certified Security Awareness 1 certification course is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

Description

Employees will learn that the weakest link in any security program is a poorly trained department.  This course teaches general security awareness as well as how to develop a strong security culture within your company’s community. The Social Engineering portion of the class is designed to teach the participants the skills used by Social Engineers to facilitate the extraction of information from an organization using technical and non-technical methods.

Computer fraud, black-hat hacking, cyber-terrorists; these phrases describe an innovative generation of criminals that use over-the-wire technology to attack us, steal from us and terrorize us. However, the best tool in their arsenal is not new. It is only used by the most experienced, the most dangerous, boldest hackers.

The mile2 Certified Security Awareness 1 program is innovative and trains students on how attacks are performed, the skills necessary to perform an attack, how to train people to identify an attack but most importantly:  how to train internal targets so that the training is effective and lasts.

 

Target audience

  • Anyone
  • End User
  • Company Employee
  • Basic Computer User

Other information

Mile2 is: 

  • ACCREDITED by the NSA CNSS 4011-4016
    MAPPED to NIST / Homeland Security NICCS's Cyber Security Workforce Framework
    APPROVED on the FBI Cyber Security Certification Requirement list (Tier 1-3)

Detailed Syllabus

Upon completion, the Certified Security Awareness 1 candidate
will not only be able to competently take the C)SA1 exam but will also understand basic cybersecurity knowledge to keep companies’ IP and IT infrastructure safe.

COURSE DETAILS

Module 1 - Basic Security Awareness 

What is it and why it’s needed?
End User Risk Trends

  • Who, What and How are people the target 
  • What are the losses associated to end user hacks?
    • The policies are as good as the employee who embraces them

 Module 2 - Social Engineering

Phishing

  • mail, via phone, social websites are common

Spear Phishing 

  • Example: Fake email sample

Social media

Personification 

 Module 3 - Data Classification and corporate use (Safe Guarding)

Corporate 

  • Sensitive, internal or public classification 
  • Objectives of securing data (IP, Compliance/legislature)

Personal vs. Business Use

  • Segregating personal use with business use

Data management

  • Business standard for deleting data
  • Personal standard of data dumping (old phones/hard drives and usb)
  • Did you know that I can unearth deleted docs from a USB drive from a standard Forensics app off of the internet? 

How to delete and get rid of your old data

 Module 4 - End User Best Practices

Internet utilization 

  • Hot spots, public places & roaming risks

Safe Web Site surfing

  • Discerning safe secure sites (never go to a site link indirectly)
  • Locks and HTTPS

Computer Usage

  • Using computer in non-admin mode
  • Ransomware

Password management

Removable Devices

Mobile, Smart Phones and Tablets (risks associated with mobile devices)

  • Device always locked
  • Device should always be trackable 

 

Similar courses

The Certified Professional Ethical Hacker course is the introductory training to mile2's line of penetration testing courses and certifications.

More Information

Basic computers skills including email and internet.

More Information

When a business is hit by a natural disaster, cyber crime or any other disruptive tragedy, how should the organization react? What if the network infrastructure is taken down? Will the business be able to continue operations? How much will it cost if the business is down during repairs? The answer is found in the vendor neutral Certified Disaster Recovery Engineer certification course.

More Information

The Certified Information Systems Security Manager certification course is designed to teach towards and certify a information systems professional high standard of excellence in following areas:

More Information

The Certified Information Systems Security Officer course is designed for forward-thinking security professionals that want the advanced skillset necessary to manage and consult businesses on information security

More Information

The Certified Penetration Testing Engineer course trains students on the 5 key elements of penetration testing: information gathering, scanning, enumeration, exploitation and reporting.

More Information

The mile2 Certified Security Sentinel training is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

More Information

The Certified Vulnerability Assessor course trains students to be proficient in conducting vulnerability assessments The vendor-neutral Certified Vulnerability Assessor certification course helps students understand the importance of vulnerability assessments by providing intricate knowledge and skills in the Vulnerability Assessment arena.

More Information

This course is for those who have never used a computer and those who have some computer experience but no formal qualification proving their knowledge or skills. Participants will learn introductory topics in areas such as Microsoft Windows 7 and the Internet; how to create documents and spreadsheets send email and back-up files. Introduction to Microsoft Word & Microsoft Excel for users with no previous knowledge, or limited experience in the use of these applications.

More Information

This evening instructor-led course provides students with the knowledge and skills to work with a computer system. This course focuses on the key aspects of a computer system and the features of various Windows operating systems. In addition, this course offers the students the skills/knowledge to work with Microsoft Word 2016 and Microsoft® Excel 2016 . The most current version of Microsoft Office will be used.

More Information

Get Certified at your own pace with these Mile 2 Cyber Security Ultimate Self-Study and Certification Bundles.Everything you need to pass 1 mile2 certification on your own time and at your own pace!

More Information

The Mile2® vendor-neutral Certified Security Awareness 1 certification course is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the countermeasures associated with these attacks.

More Information

This Introductory course to bring users attending our in-classroom or Live Online training sessions, their Basic Computing Skills up to speed. This course can be modified to fit a full day's duration, depending on the requirements of the participants.

More Information

This course is for those who have never used a computer, those who have no computer skills, and those who have some computer experience but no formal training proving their knowledge or skills. Participants will learn introductory topics in Microsoft Windows, Understanding use of Internet; and Basic Microsoft Word Skills. Introduction to Microsoft Word & Microsoft Excel for users with no previous knowledge, or limited experience in the use of these applications.

More Information