CoursesIT Security AwarenessLength: 0.5 Days Cost: $310 + GST Version: Miscellaneous  = Scheduled class  = Guaranteed to run  = Fully booked Click on the dates to book online Centre | Mar | Apr | May | Jun |
---|
Auckland | 09 | -- | -- | -- | Hamilton | 09 | -- | -- | -- | Christchurch | -- | 13 | -- | -- | Wellington | -- | -- | -- | -- | Virtual Class | -- | -- | -- | -- |
Can't find a class in your area? Contact our sales team and request a class date. Not sure about the version of your software? Click here to find out. Want to know if this course is right for you? Assess your skills level with our online Skills Assessment tool. About this CourseThis course is designed to raise your awareness to protect your pc, yourself, your business from internet risks and threats. AudienceThis show-and-tell course is designed for end-users, so anyone in an organisation who uses a computer. PrerequisitesNo specific prerequisites. At Course CompletionYou will understand the various internet risks and threats to your personal safety, businesses and computers. You will be aware of internet behaviour that will lower your risk, know how to manage your personal information and business information carefully as well as use technology to reduce nuisances, and raise the alarm when appropriate. Course OutlineOnline Security v Online Safety Ensuring our computers are secure, but we are protected against the risks and threats that come with Internet use. Leading Internet Risks and Threats Be aware of the internet risks and threats to personal safety, businesses and computers. Steps to Help Protect Yourself and the Business Know the behaviours and best practice to manage the risks. Passwords Best Practice for Passwords. Social Engineering What is it and why we should understand it. Spam, Scam and Phishing What are these terms and how do they present themselves. Protect Your Computer Four valuable steps. External Devices Things to consider when using external devices. Privacy How to protect your privacy on the internet. ICT Security Policies Best Practice examples of ICT Security Policies. Print this page
|