Introduction to Information Security
- Change your perception: security is a necessity - not a burden.
- Be a learner: Understand security threats and vulnerabilities.
- Be proactive: Adopt good security habits.
- Seek help and advice: Advanced technologies require educated users.
- Computer Security is YOUR responsibility.
Module 2: Information Security Program
- Identify the goals of IT security.
- Learn about your responsibilities and where to get help when you need computer assistance, or when you experience security problems.
- Learn how your organization protects its IT resources from malicious intrusions.
- Find out where you can get more training.
Module 3: Using IT Resources
- Understand the responsibilities that accompany use of Government and Corporate IT resources.
- Learn where to access your organization's policies and guidance that address appropriate use.
- Learn about the proper use of the Internet and e-mail, and about proper personal use of your computer.
Module 4: Information Management
- Recognize different types of sensitive information that must be protected at your organization (e.g., proprietary, Privacy Act, and confidential financial records).
- Learn how to safely manage sensitive information (electronic and paper) in different environments.
Module 5: Local and Remote Access
- Learn how your organization controls local and remote access.
- Recognize the risks and responsibilities associated with user access.
- Understand the importance of password protection and how to create strong passwords.
- Review remote access requirements.
Module 6: Internet Safety
- Identify different types of malicious logic.
- Recognize signs and symptoms of a malicious logic infection.
- Recognize the different ways that malicious logic may be proliferated.
- Identify prevention and protection strategies.
Module 7: Physical Security and Back-ups
- Recognize physical threats and understand how they make our IT assets vulnerable.
- Learn about safeguards you can apply in and outside the office.
- Understand the importance of backing up data.
Module 8: Computer Basics
- Review your current computer security habits in light of threats and vulnerabilities.
- Review safeguards that can be easily adopted to help ensure the security of your desktop computer.
Module 9: FISMA
- Learn about the two sources of FISMA.
- Recognize the three objectives of FISMA.
- Understand the importance of securing government information systems.
- Understand the importance of risk assessments and security plans in securing government systems
Course Summary and Take-Home Points
- Review what you have learned
- Take final quiz or exam (optional)
- Print our a certificate of completion
- Quick reference sheet
Other: Resources, Glossary, and Security News
- Information Technology Security Home Page
- Security Policies and Guidelines
- Frequently Asked Questions about the Computer Security Awareness Training Program
- Federal and Private Security Organizations
- Help Resources