{"id":14,"date":"2012-06-07T03:52:33","date_gmt":"2012-06-07T03:52:33","guid":{"rendered":"http:\/\/112.109.118.49\/cdr\/wordpress\/?page_id=14"},"modified":"2012-06-07T14:51:44","modified_gmt":"2012-06-07T14:51:44","slug":"security-awareness","status":"publish","type":"page","link":"https:\/\/cyberdefenseresearch.com\/?page_id=14","title":{"rendered":"Security Awareness"},"content":{"rendered":"<p align=\"left\">One-day training sessions (8 Hours)<\/p>\n<p align=\"left\">This course is designed to train employees at all levels of the organization. Some of the topics include:<\/p>\n<ul>\n<li>\n<div align=\"left\">Your company security policies and how they affect you<\/div>\n<\/li>\n<li>\n<div align=\"left\">Homeland security, you, and the corporation<\/div>\n<\/li>\n<li>\n<div align=\"left\">What is a firewall and why your company has one<\/div>\n<\/li>\n<li>\n<div align=\"left\">Identifying Suspect Processes and Applications<\/div>\n<\/li>\n<li>\n<div align=\"left\">User threats against systems<\/div>\n<\/li>\n<li>\n<div align=\"left\">Cyber Crime and Federal laws<\/div>\n<\/li>\n<li>\n<div align=\"left\">Regulatory Issues (GLB, HIPAA, SOX)<\/div>\n<\/li>\n<li>\n<div align=\"left\">Securing your home computer<\/div>\n<\/li>\n<li>\n<div align=\"left\">What you don&#8217;t know can hurt you<\/div>\n<\/li>\n<li>\n<div align=\"left\">Cookies and Spyware<\/div>\n<\/li>\n<li>\n<div align=\"left\">E-mail security<\/div>\n<\/li>\n<li>\n<div align=\"left\">Recognizing Phishing attacks<\/div>\n<\/li>\n<li>\n<div align=\"left\">Denial of Service attacks<\/div>\n<\/li>\n<li>\n<div align=\"left\">Spam<\/div>\n<\/li>\n<li>\n<div align=\"left\">Appropriate browser settings for optimal security<\/div>\n<\/li>\n<li>\n<div align=\"left\">Incident response<\/div>\n<\/li>\n<li>\n<div align=\"left\">Cyber Crime trends<\/div>\n<\/li>\n<li>\n<div align=\"left\">Regulatory, civil and criminal laws regarding computer networks and the Internet<\/div>\n<\/li>\n<li>\n<div align=\"left\">You and the U.S. Patriot Act<\/div>\n<\/li>\n<li>\n<div align=\"left\">How to detect if your system has been compromised<\/div>\n<\/li>\n<li>\n<div align=\"left\">Reporting your security concerns<\/div>\n<\/li>\n<li>\n<div align=\"left\">Malicious software and how it gets on your computer and in your network<\/div>\n<\/li>\n<li>\n<div align=\"left\">Virus software, what it is, how to detect it, and how to get rid of it<\/div>\n<\/li>\n<li>\n<div align=\"left\">Network worms, what they are, how to detect them, and how to get rid of them<\/div>\n<\/li>\n<li>\n<div align=\"left\">Trojan horses, what they are, how to detect them, and how to get rid of them<\/div>\n<\/li>\n<li>\n<div align=\"left\">How malicious software gets on your system<\/div>\n<\/li>\n<li>\n<div align=\"left\">The WWW (Wild Wild Web)<\/div>\n<\/li>\n<li>\n<div align=\"left\">What makes a network secure<\/div>\n<\/li>\n<li>\n<div align=\"left\">What makes a network vulnerable<\/div>\n<\/li>\n<li>\n<div align=\"left\">Recognizing social engineering attacks<\/div>\n<\/li>\n<li>\n<div align=\"left\">How and why to construct a strong password<\/div>\n<\/li>\n<li>\n<div align=\"left\">The how&#8217;s and why&#8217;s of identity theft and ways to minimize the risk<\/div>\n<\/li>\n<\/ul>\n<table width=\"100%\" border=\"0\" cellspacing=\"1\" cellpadding=\"1\">\n<tbody>\n<tr>\n<td width=\"45%\">Security awareness training includes numerous demonstrations and training manuals for each employee. Security awareness training can be molded to fit your organizational needs.<\/td>\n<td width=\"55%\">\n<div align=\"center\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cyberdefenseresearch.com\/images\/books.jpg\" alt=\"\" width=\"175\" height=\"131\" border=\"1\" \/><\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>One-day training sessions (8 Hours) This course is designed to train employees at all levels of the organization. Some of the topics include: Your company security policies and how they affect you Homeland security, you, and the corporation What is &hellip; <a href=\"https:\/\/cyberdefenseresearch.com\/?page_id=14\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":28,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-14","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/14","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14"}],"version-history":[{"count":0,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/14\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=\/wp\/v2\/pages\/28"}],"wp:attachment":[{"href":"https:\/\/cyberdefenseresearch.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}