Lesson 1: Identifying the Need for Security
Topic A: Identify Security Compliance Requirements
Topic B: Recognize Social Engineering
Lesson 2: Securing Devices
Topic A: Maintain Physical Security of Devices
Topic B: Use Passwords for Security
Topic C: Protect Your Data
Topic D: Identify and Mitigate Malware
Topic E: Use Wireless Devices Securely
Lesson 3: Using the Internet Securely
Topic A: Browse the Web Safely
Topic B: Use Email Securely
Topic C: Use Social Networking Securely
Topic D: Use Cloud Services Securely

About Course

To ensure success in this course, students should have experience with the basic use of conventional end-user technology, including desktop, laptop, or tablet computers, cell phones, and basic Internet functions such as web browsing and email. To obtain much of this prerequisite knowl- edge, students should consider taking the Using Microsoft Windows 8.1
8 hours (inclusive of the time required to complete the Certified CyberSAFE credential process).
CyberSAFE is accompanied by the Certified CyberSAFE credential process. This brief online credential covers 20 questions, and is included as part of the course-ware.
  • Instructors should have experience teaching introductory technology courses, such as CompTIA’s A+. The ability to deliver course content to a varied audience (experience level, familiarity with technology, etc.) is key. Modern Classroom Certified Trainer (MCCT) is a suggested prerequisite, to ensure your instructors are expert in all training modalities, as well as utilizing the Logical Operations digital platform.