C)SAP - Certified Security Awareness Principles

 

COURSE BENEFITS

 

The mile2 vendor neutral Certified Security Awareness Principles certification course is intended for anyone that uses a computer on the internet.

 

Attendees will understand the security threats as well as the countermeasures associated with these attacks.

 

Employees will learn that the weakest link in any security program is a poorly trained department. 

 

This course teaches general security awareness as well as how to develop a strong security culture within your company’s community.

 

The Social Engineering portion of the class is designed to teach the participants the skills used by Social Engineers to facilitate the extraction of information from an organization using technical and non-technical methods.

 

Computer fraud, black-hat hacking, cyber-terrorists; these phrases describe an innovative generation of criminals that use over-the-wire technology to attack us, steal from us and terrorize us.

 

However, the best tool in their arsenal is not new. It is only used by the most experienced, the most dangerous, boldest hackers.

 

The mile2 Certified Security Awareness Principles program is innovative and trains students on how attacks are performed, the skills necessary to perform an attack, how to train people to identify an attack but most importantly:  how to train internal targets so that the training is effective and lasts.

 

WHAT'S INCLUDED IN THE COURSE KIT?

  • Individual Course Access
  • Course Video
  • Physical, Printed Course book
  • Exam Prep Guide
  • Exam Simulator
  • Exam

C)SAP - Certified Security Awareness Principles - Electrical Course Kit & Exam

£860.00Price
  • Module 1 - Basic Security: How to secure a computer for personal internet use

    • What are the Risks?
    • Known Risks
    • Did You Know?
    • What are the Risks?
    • Things you NEED to know!
    • The “Hacker”
    • What is Identity Theft?
    • Fighting Identity Theft
    • Practice
    • Demo
    • Don’t Panic!

    Module 2 - User Awareness

    • Overview
    • User Attacks
    • User Awareness
    • Passwords
    • Generating Passwords
    • Keeping Track Of Passwords
    • eWallet
    • Encryption Tools
    • Other Password Options
    • Windows Administrator Account
    • Demo
    • Windows Processes
    • Task Manager
    • Processes Tab
    • Searching Processes
    • Web Research
    • Process Information
    • Bad Processes
    • Removing Suspect Processes
    • Start-Up Tuners
    • Downloads
    • The User
    • E-Mail Links
    • Demo

    Module 3 - Implementing Countermeasures

    • Overview
    • Internet Protection Solutions
    • Choosing a Package
    • Free Anti-Virus & Spyware
    • Free Anti-Malware & Anti Spyware
    • Updating
    • Scheduling a Scan?
    • Demo
    • Patch Management
    • Demo
    • Internet Anonymizers
    • How They Work
    • Demo

    Module 4 - Essential Security Awareness for Everyone

    • Why Are You Here?
    • The Employer’s Liability
    • Steps to an Effective Security Program
    • Starting at the Top
    • Why This All Matters
    • Areas of Concern
    • What’s In This For Me?
    • Course Format

    Module 5 - Using the Internet at Work

    • Module Objectives
    • Why Can’t I Just Do What I Want?
    • Internet Acceptable Use Policy
    • The Internet at Work
    • Internet Basics
    • Internet Threats
    • Internet Access
    • Your Web Browser
    • ActiveX & Java
    • Media Files
    • E-Mail
    • Chat
    • Web Storage
    • Web Proxies
    • P2P
    • Spyware
    • Countermeasures
    • Demo

    Module 6 - Accessing the Company's Network Through Your Assigned Computer

    • Module Objectives
    • What’s a LAN?
    • Logging In
    • Installing Applications
    • OS Utilities
    • Network Drives
    • Sharing
    • Removable Storage
    • Email Attachments
    • Virus Scanner
    • Management Software
    • Monitoring
    • Demos

    Module 7 - Accessing the Corporate Network Remotely

    • Module Objectives
    • Work from Home
    • Your Home PC
    • From Your House to Work
    • Wireless
    • Hot Spots
    • Web Access for Email
    • Profile Management
    • VPNs
    • Demo

    Module 8 - Social Engineering

    • Introduction
    • What is Social Engineering?
    • Definition of Social Engineering
    • Goals of Social Engineering
    • Types of Social Engineering
    • Attacks by Phone
    • Dumpster Diving
    • On-Line Social Engineering
    • On-Line Social Engineering
    • Persuasion
    • Social Engineering Roles
    • Reverse Social Engineering
    • What We Cover
    • Examples of our labs

    Module 9 - Understanding and Manipulating our Target

    • Outline
    • Introduction
    • How are People Motivated?
    • Avoiding Pain
    • Pursuing Pleasure
    • Baselining
    • How to Read a Person
    • Body Movements
    • What About Over the Phone?
    • Re-Framing
    • Putting on the Right “Spin”
    • Marketing
    • Alter Perceptions of Pain or Pleasure
    • Saving-Face
    • Verbal Judo
    • Putting It All Together
    • Practice
    • Summary

    Module 10 - Researching Our Target

    • Outline
    • Introduction
    • Google Hacks
    • Google Hacks Continued
    • Other Research Techniques
    • Dumpster Diving
    • Email Addresses
    • Current SOPs
    • Vendor Agreements
    • Inter-Office Memos
    • Shoulder Surfing
    • Eavesdropping
    • E-mail
    • Telephone Calls
    • Cubicles/Office Areas
    • Restaurants and Bars
    • Job Descriptions
    • Conclusion

    Module 11 - Methods of Deception

    • Outline
    • Introduction
    • Impersonation in Person
    • The Job Interview
    • The Inspector
    • Delivery Person
    • Vendors/Contractors
    • Impersonation on the Phone
    • Help Desk
    • IT Staff
    • Asking for Help
    • Summary

©2019 by Oddfellows Services Ltd t/a OFS.

Registered in England Number 11987380

Registered Office : International House, 24 Holborn Viaduct, London, EC1A 2BN, London, United Kingdom.

Email : operations@ofsec.co.uk

Telephone : +44 (0) 203 787 4785