What are the topics covered in this course?

Lesson 1: Identifying Security Compliance Measures
• Identify Organizational Compliance Requirements and Resources
• Identify Legal Compliance Requirements and Resources

Lesson 2: Recognizing and Addressing Social Engineering Attack
• Recognize Social Engineering Attacks
• Defend Against Social Engineering Attacks

Lesson 3: Securing Devices
• Maintain Physical Security of Devices
• Use Secure Authentication Methods
• Protect Your Data
• Defend Against Malware
• Use Wireless Devices Securely

Lesson 4: Using the Internet Securely
• Browse the Web Safely
• Use Email Securely
• Use Social Networks Securely
• Use Cloud Services Securely
• Work from Remote Locations Securely