The weakest point in security is people. Your security can be ???technically perfect???, but a single user can leave your whole network open to attack, just by writing their password on a sticky note and leaving it stuck to the bottom of their keyboard. The media covers story after story about blunders like this that cause companies to lose both reputation and money while customers and employees risk identity theft.
Even with all the news coverage events like this get, many users don't pay much attention to keeping their computers secure. That's why it's up to security professionals, management, and IT staff like you to take responsibility for training end-users on security.
The simple way to train end-users on security practices -
The CBT Nuggets End-User Security training videos are an easy way to train end-users on security practices they can apply right away. Video lessons hold students' attention and make learning easy. The videos allow students to train at your company's convenience, not when an outside trainer or busy IT security staff member is available. Lessons can even be rewatched as needed, to refresh a student's knowledge at no additional cost to the company. And James Conrad, our expert instructor, has a style that is fun, interesting, and easy to learn from, while still giving complete instruction.
How will users learn to protect their computer?
The End-User Security On The Job Training Series covers a lot of ground:
Software Threats: Your company's employees learn about the well-known nasties: Viruses, Worms, Trojans, Adware, and Spyware. First students find out what these are and how they can harm computers and entire networks. Then, students learn simple ways to protect computers against these threats. They are also reminded to work with IT staff so that any protection they want to add to their computer doesn't conflict with the company's current security practices.
E-mail Scams, Phishing, and Secure Passwords: Employees learn ways to recognize and avoid e-mail scams and attempts to "phish" confidential personal and company information from them. The training also covers ways to create stronger, more secure passwords so a password can't be guessed, and so it's difficult to discover using hacking tools and other automated methods.
Wireless Networks and File Sharing: In addition, the training covers basic wireless security considerations for end-users, so they know whether or not it's safe to use their company laptop or PDA at their favorite public wireless hot-spot, or even their home network. The training also covers file sharing, to show users how information becomes widely available when it is stored and shared on a company network. Plus, they learn how storing vital information in these files can be dangerous.
Physical Security: Last but not least, users learn about one of the most neglected areas in computer security - physical security. They are taught about the danger of leaving laptops and other portable equipment in their car or in areas where theft is a high-risk. The training covers how to physically protect computer equipment from unauthorized access. Plus, students also learn how malicious people use social engineering to gain access to systems they are not authorized to view, how employees can recognize this, and what steps can be taken to protect against it.
IT pros may come with basic security competency, but end-users often don't. Each of these security topics is covered in detail in these short, topic-focused videos. Employees can watch each video as necessary to develop and maintain a baseline of computer security awareness and skills.
What can training my end-users on security protect against?
Not training end-users on basic security practices leaves a company's systems vulnerable to attack, exploit, and data theft.
By training end-users, your company can save the vast amount of time and money it costs to mitigate and recover from an attack. It saves reputations and jobs. It also prevents IT Security professionals against headache after headache of dealing with viruses, adware, and other problems. And by protecting against identity theft, training end-users in security can save customers and employees from the pain of rebuilding their lives after personal and financial information was stolen.
This training will save your company more money than any other training program CBT Nuggets offers. That's how important it is.
On The Job Training Series: End-User Security contains these videos:
- Brief Intro
- Viruses
- Worms and Trojans
- Adware and Spyware
- Combatting Viruses, Adware/Spyware
- Email Part 1 - Threats and Prevention
- Email Part 2 - Scams and Inappropriate Uses
- Phishing Examples
- Phishing Symptoms and Response
- Wireless Overview and Vulnerabilies
- Wireless Security
- Sharing: Workgroups
- Sharing: Domains
- Physical Security: Protecting laptops, handhelds, thumbdrives
- Social Engineering
- Good Password Choices
- Firewall
- Security Updates (Windows Update)
Download: 167 MB / 50.54 MB
http://rapidshare.com/files/183242916/CBT_Nugget_OnTheJob.End.User.Sec.part3.rar
http://rapidshare.com/files/183246356/CBT_Nugget_OnTheJob.End.User.Sec.part1.rar
http://rapidshare.com/files/183249630/CBT_Nugget_OnTheJob.End.User.Sec.part2.rar
1 comment:
If you need an all in one solution then I would look at something like unified threat management also known as a UTM.Cyberoam firewall is the only UTM firewall that embeds user identity in firewall rule matching criteria, enabling enterprises to configure policies and identify users directly by the username rather than through IP addresses. Cyberoam’s powerful hardware firewall provides stateful and deep packet inspection, access control, user authentication, network and application-level protection.
The ICSA-certified Cyberoam firewall is available along with VPN, gateway anti-virus and anti-spyware, gateway anti-spam, intrusion prevention system, content filtering, bandwidth management and multiple link management, providing comprehensive security to small, medium and large enterprises, including remote and branch offices. Cyberoam is a Check Mark Level 5 certified UTM solution.
Key Features
1.Stateful Inspection Firewall
2.Centralized management for multiple security features
3.Embeds user identity in rule-matching criteria
4.Multiple zone security
5.Granular IM, P2P controls
6.ICSA certified
Post a Comment