print
Course Name
Computer Security Awareness Training (CSAT)

Contact Hours: 3

Course Description

provides employees with the critical knowledge and tools to prevent the destructive impact that hackers, viruses, and improper PC maintenance can have on your organization`s productivity, as well as protecting your organization`s critical assets and valuable intellectual property.

More than ever before with today`s "wireless" and "anywhere" offices, proper cyber security protocol has become "must have" training for organizations large and small, government and commercial. Managers everywhere are recognizing that this training is not an expense - - it is a cost savings.


Outcome


  • Understand the necessities and responsibilities of security
  • Realize Information Technology security goals and protection from intrustions
  • Learn proper use of the internet, email, and your computer
  • Recognize sensitive information and how to correctly protect the information
  • Learn how your organization controls remote and local access and understand the importance of strong passwords
  • Identify different types of malicious logic and infections
  • Recognize physical threats and realize the importance of backing-up data
  • Adopt safeguards for the personal desktop
  • Understand the three objectives of FISMA
  • Lots more!



Assessment

Assessment is based on successful completion of the CSAT training course



Outline

 Introduction to Information Security

  • Change your perception: security is a necessity - not a burden.

  • Be a learner: Understand security threats and vulnerabilities.

  • Be proactive: Adopt good security habits.

  • Seek help and advice: Advanced technologies require educated users.

  • Computer Security is YOUR responsibility.


Module 2: Information Security Program


  • Identify the goals of IT security.

  • Learn about your responsibilities and where to get help when you need computer assistance, or when you experience security problems.

  • Learn how your organization protects its IT resources from malicious intrusions.

  • Find out where you can get more training.


Module 3: Using IT Resources


  • Understand the responsibilities that accompany use of Government and Corporate IT resources.

  • Learn where to access your organization's policies and guidance that address appropriate use.

  • Learn about the proper use of the Internet and e-mail, and about proper personal use of your computer.


Module 4: Information Management


  • Recognize different types of sensitive information that must be protected at your organization (e.g., proprietary, Privacy Act, and confidential financial records).

  • Learn how to safely manage sensitive information (electronic and paper) in different environments.


Module 5: Local and Remote Access


  • Learn how your organization controls local and remote access.

  • Recognize the risks and responsibilities associated with user access.

  • Understand the importance of password protection and how to create strong passwords.

  • Review remote access requirements.


Module 6: Internet Safety


  • Identify different types of malicious logic.

  • Recognize signs and symptoms of a malicious logic infection.

  • Recognize the different ways that malicious logic may be proliferated.

  • Identify prevention and protection strategies.


Module 7: Physical Security and Back-ups


  • Recognize physical threats and understand how they make our IT assets vulnerable.

  • Learn about safeguards you can apply in and outside the office.

  • Understand the importance of backing up data.


Module 8: Computer Basics


  • Review your current computer security habits in light of threats and vulnerabilities.

  • Review safeguards that can be easily adopted to help ensure the security of your desktop computer.


Module 9: FISMA


  • Learn about the two sources of FISMA.

  • Recognize the three objectives of FISMA.

  • Understand the importance of securing government information systems.

  • Understand the importance of risk assessments and security plans in securing government systems


Course Summary and Take-Home Points


  • Review what you have learned

  • Take final quiz or exam (optional)

  • Print our a certificate of completion

  • Quick reference sheet


Other: Resources, Glossary, and Security News


  • Information Technology Security Home Page

  • Security Policies and Guidelines

  • Frequently Asked Questions about the Computer Security Awareness Training Program

  • Federal and Private Security Organizations

  • Help Resources