Cybersecurity Awareness for Employees: Security Awareness Essentials

In our digital world today, attackers seem to be lurking behind every click of the mouse or tap on the screen. Many people forget that they are the keepers of their own security safety and the security safety of the institutions for which they are employed. In this interactive online course, we learn about the who, what, how, and why of security attacks. We discuss the potential losses associated with a successful security breaches by hackers and will understand the different way in which those security breaches can occur. Finally, we cover important actions you can take within your organization to limit security risks.

Request a demo

Course Details

Learning Objectives

By the End of This Course, You Will Be Able To:

  • Identify who the targets are, what makes them targets, and how they are targeted
  • Identify three primary attacks targeting employees
  • Describe potential losses from end-user hacks
  • Define an Acceptable Use Policy (AUP) and its components
  • List the impacts of cyber-attacks on small- and medium-sized businesses (SMBs)
  • Evaluate the advantages and disadvantages of “Bring Your Own Device” (BYOD)
  • Explain jailbreaking and rooting
  • Recall the benefits of antivirus software

Specs

Course Level Fundamental
Languages English
Compatibility Audio, Video, MobileReady

Hanna Haddad

Hanna has been in the Information Technology industry for over 11 years mastering disciplines in Cyber Security, Virtualization, Internet Technology and Information Systems. Hanna is bilingual and works as both a consultant and master mile2 instructor in the United States, Europe and Asia. Hanna has a long history in the INFOSEC industry. He1€™s been involved in high level projects that not only range from securing virtualization environments, but also implementing complex controls to ensure network security. Hanna has many expertise and has been involved in the following disciplines for over 10 years in both the private and public sector:
  • Microsoft Systems: AD, DNS, DHCP, MS Exchange, SQL, ISA, TMG, SCCM, VDI
  • VMWare: ESXi, vSphere, VSAN, Horizon View
  • Cisco: Switching, Routing, Firewall (ASA), VOIP
  • Security: Penetration Testing, Vulnerability Assessment, Incident Handling
  • Linux: used Linux (Ubuntu, Fedora, Debian) for Penetration testing
  • Firewall: Palo Alto, Astaro, ASA, Fortinet, Forefront
  • Storage: SAN, NAS, VSAN (VMWare SAN)
  • Disaster Recovery and Business Continuity
Hanna is a mile2 master instructor and has obtained the following certifications with Mile2, Microsoft, EC-Council and Comptia (The is not an exhaustive list of courses Hanna can teach):
  • Mile2: CPTE - Certified Penetration Testing Engineer, CPEH - Certified Professional Ethical Hacker, CIHE 1 Certified Incident Handling Engineer, CDRE 1 Certified Disaster Recovery Engineer, CDFE 1 Certified Digital Forensics Examiner
  • Microsoft Certifications: Microsoft Certified Solutions Associate, Microsoft Certified Trainer, Microsoft1® Certified IT Professional (MCITP), Microsoft1® Certified Technology Specialist (MCTS), Microsoft Certified Solutions Expert in Private Cloud (MCSE), Microsoft Certified Solutions Expert in Server Infrastructure (MCSE)
  • EC-Council Certifications: Certified Ethical Hacker (E | CEH), Certified EC-Council Instructor (CEI), Certified Security Analyst (E | CSA), Disaster Recovery Professional (E | DRP)
  • CompTIA Certifications: Security+
Hanna is responsible for developing Cloud Security courses, Comptia+ Cloud+ and Mile1s Certified Professional Ethical Hacker.

Course Applies To

Demos + Pricing

Learn more about our courses, get pricing, and see our platform.

Trusted by 24,000+ Industry Leaders