-
Duration
9.30am - 1pm
-
Description
Security for IT Users is a new course for module 1 ECDL syllabus 5. The course will cover all aspects of IT security including internet use, system security, identify theft and password policies.
-
Prerequisites
A basic understanding of Microsoft Windows.
-
Agenda
Exercise Details Topic 1 System performance security - Introduction to spam and the different types of malicious programs that can enter your computer.
- Understanding that anti-virus software can help protect your computer against malicious programs.
Topic 2 Information security - Understand that usernames and passwords limit the level of access you have to information on a computer.
- Understand that information can be at risk from unauthorised access and therefore passwords and PIN numbers help protect your data.
Topic 3 Technology security - Looking at public networks, wireless networks and Bluetooth connectivity.
- Know that portable devices are vulnerable and prone to loss or theft.
Topic 4 Guidelines and procedures - Know where to find the guidelines and procedures for the secure use of IT within your organisation.
- Understand the IT security checks you should carry out.
Topic 5 Data security
- Looking at the importance of creating backup copies of files.
- Know how to safely store your personal data.
-
Goals and objectives
Goals
- To consolidate the information learned from reading the manual – ‘Security for IT Users’.
- To aid the learner in preparation for the Module 1 ECDL examination.
ObjectivesAfter attending this Security for IT Users workshop you will be able to:
- Understand what ‘spam’ is, how it can be received and how anti-spam software can protect your computer.
- Understand what a malicious program is and how it can enter a computer system.
- Understand anti-virus and anti-spyware software can help protect your computer from malicious programs.
- Understand what a hacker is and how they can infiltrate a computer system.
- Understand how a firewall helps protect the computer against unauthorised access.
- Know you can receive hoax emails.
- Identify hoax emails and take appropriate action.
- Know the purpose of passwords and PIN numbers.
- Respect the confidentiality of the data you have access to.
- Know what phishing is and how to avoid identify theft.
- Understand what a public network is.
- Be aware that wireless networks may be visible or accessible to other users.
- Know what Bluetooth connectivity is.
- Be aware that portable devices are vulnerable to loss or theft.
- Understand the IT security guidelines and procedures for your organisation.
- Know how to prevent data theft.
- Understand the importance of creating backups of your data.
-
Costs
External attendees: £55 plus VAT per candidate.