Lesson 1: Identifying Security Compliance Measures
• Identify Organizational Compliance Requirements and Resources
• Identify Legal Compliance Requirements and Resources
Lesson 2: Recognizing and Addressing Social Engineering Attack
• Recognize Social Engineering Attacks
• Defend Against Social Engineering Attacks
Lesson 3: Securing Devices
• Maintain Physical Security of Devices
• Use Secure Authentication Methods
• Protect Your Data
• Defend Against Malware
• Use Wireless Devices Securely
Lesson 4: Using the Internet Securely
• Browse the Web Safely
• Use Email Securely
• Use Social Networks Securely
• Use Cloud Services Securely
• Work from Remote Locations Securely