Cybersecurity Awareness for Employees: End-User Best Practices

We live in a busy, busy world. When it is so easy to connect to the internet and access vast amounts of information, it is easy to forget the dangers that lie in wait. From hotspots to password management, this interactive online course will walk you through end-user best practices. We will also discuss the importance of administrative rights, define types of physical attacks against privacy, and recommend ways to protect against malwares and viruses.

Request a demo

Course Details

Learning Objectives

At the end of this course, you will be able to:
  • Identify insecure hotspots in public places and the risks involved in roaming
  • Differentiate between free and commercial VPN tunnels
  • Recognize legitimate and secure websites
  • Explain the importance of administrative rights
  • Select the correct method to stop the spread of a virus
  • Recommend ways to protect against malwares and viruses
  • List the dos and don’ts of password creation
  • Name solutions for password management
  • Define different types of physical attacks against privacy and provide solutions to mitigate this risk

Specs

Course Level Fundamental
Languages English
Compatibility Audio, Video, MobileReady

Hanna Haddad

Hanna has been in the Information Technology industry for over 11 years mastering disciplines in Cyber Security, Virtualization, Internet Technology and Information Systems. Hanna is bilingual and works as both a consultant and master mile2 instructor in the United States, Europe and Asia. Hanna has a long history in the INFOSEC industry. He1€™s been involved in high level projects that not only range from securing virtualization environments, but also implementing complex controls to ensure network security. Hanna has many expertise and has been involved in the following disciplines for over 10 years in both the private and public sector:
  • Microsoft Systems: AD, DNS, DHCP, MS Exchange, SQL, ISA, TMG, SCCM, VDI
  • VMWare: ESXi, vSphere, VSAN, Horizon View
  • Cisco: Switching, Routing, Firewall (ASA), VOIP
  • Security: Penetration Testing, Vulnerability Assessment, Incident Handling
  • Linux: used Linux (Ubuntu, Fedora, Debian) for Penetration testing
  • Firewall: Palo Alto, Astaro, ASA, Fortinet, Forefront
  • Storage: SAN, NAS, VSAN (VMWare SAN)
  • Disaster Recovery and Business Continuity
Hanna is a mile2 master instructor and has obtained the following certifications with Mile2, Microsoft, EC-Council and Comptia (The is not an exhaustive list of courses Hanna can teach):
  • Mile2: CPTE - Certified Penetration Testing Engineer, CPEH - Certified Professional Ethical Hacker, CIHE 1 Certified Incident Handling Engineer, CDRE 1 Certified Disaster Recovery Engineer, CDFE 1 Certified Digital Forensics Examiner
  • Microsoft Certifications: Microsoft Certified Solutions Associate, Microsoft Certified Trainer, Microsoft1® Certified IT Professional (MCITP), Microsoft1® Certified Technology Specialist (MCTS), Microsoft Certified Solutions Expert in Private Cloud (MCSE), Microsoft Certified Solutions Expert in Server Infrastructure (MCSE)
  • EC-Council Certifications: Certified Ethical Hacker (E | CEH), Certified EC-Council Instructor (CEI), Certified Security Analyst (E | CSA), Disaster Recovery Professional (E | DRP)
  • CompTIA Certifications: Security+
Hanna is responsible for developing Cloud Security courses, Comptia+ Cloud+ and Mile1s Certified Professional Ethical Hacker.

Course Applies To

Demos + Pricing

Learn more about our courses, get pricing, and see our platform.

Trusted by 24,000+ Industry Leaders