Social Engineering and Security for End Users

Cybersecurity Seminar

  • Duration 1 days
  • Price $395
  • Certifications N/A
  • Exams N/A
Course Overviewremove_circle_outline

It is well known that the most prevalent vulnerability to personal computers and company/organization networks is the human being. Every end user of a computer--whether tied to a network or not--presents the most likely access point for hackers to enter computers and networks. Training these end users on the basics of threats and actions they may take to avoid opening the computer or network to external--or internal--threats is essential for system and network security.

This half-day seminar covers fundamentals, threats, vulnerabilities, and awareness in network security for end-users. The seminar includes lecture, guided discussion, and tabletop scenario-based exercises leading to a greater understanding of common social engineering and associated issues. Active attendee participation is essential to enrichment of the seminar program.

Seminar Delivery Options

Training may be held via three training options:

  • Live in-class training in Tempe, AZ
  • Live, instructor-led remote training via high-definition videoconference (may be in conjunction and interactive with a live class)
  • Private or Onsite classes for companies/organizations (requires minimum of 8 students)
Target Studentadd_circle_outline

This seminar is designed for organization and corporate end users of computer systems that are part of a network, but does not require the attendee to be an IT professional.


The successful seminar attendee will be able to:

  • Understand fundamental information security principles
  • Identify components of the Threat Landscape
  • Identify the techniques and tools of Social Engineering
  • Be familiar with various types of malware
  • Understand software, hardware, network, and wireless threat vectors and vulnerabilities
  • Develop countermeasures for physical threats and vulnerabilities
  • Be familiar with types of training and procedures are necessary to maintain computer and network security compliance
  • Be familiar with basic plans for responding to security incidents at the user level.
Course Outlineadd_circle_outline

Session 1: Security Fundamentals

  • The Information Security Cycle
  • Information Security Controls
  • Authentication Methods

Session 2: Identifying Security Threats and Vulnerabilities

  • Social Engineering
  • Malware
  • Software-based Threats
  • Network-based Threats
  • Wireless Threats and Vulnerabilities
  • Physical Threats and Vulnerabilities

Supplement: Compliance and Operational Security

  • Security Awareness and Training

Supplement: Managing Security Incidents

  • Responding to Security Incidents at the User Level

No specific prerequisites are required for this seminar.

Students should have a fundamental knowledge of computers and networks at the end user level.

This course does not require computers or electronic devices.

Students should bring a writing instrument to the seminar to take notes and complete exercises in the seminar participant guide.

  • Click below to see more class dates with course versions
  • See More Dates

Have questions? Let us help you.