Hi everyone! Although I have created many cyber security awareness courses (see introduction to my FISSEA presentation) for use in the education sector, here is my first course created for Cybrary.it is available on demand here.
Why Create an End User Awareness Course?
I created the End User Awareness course because of my interest in helping to build a platform to provide no cost or low cost educational programming in the cyber space for small business owners, nonprofit professionals, civil servants employed in federal, state and local governments and parents.
Introduction to End User Awareness Course
This is an introduction series to cyber and information security for end users. Its designed to teach the principles and practices that mobile, desktop and gaming device users need to keep themselves safe, both at work and at home. By presenting best practices, and case studies along with exercises to apply knowledge, you will learn not only why security tactics are used but how it is done.
Relevant Experience and Certifications
I am a change agent and management expert specializing in data and technology with a specific focus on extraction, transformation and loading, audits and investigations for improved performance. I have a PhD, MBA and Masters in Ed Psychology. I have spent a number of years in database administration, data migration, analytics and cyber security. I have a number of certifications: Computer Hacking Forensic Investigator, Certified Fraud Examiner (because of the intersection between fraud and data manipulation and Certified Block Chain Professional.
End User Awareness Course Syllabus
Emphasis on Cyber & Data Security
Instructor Name: Tonya Mead, PhD Instructor Contact: https://www.linkedin.com/in/tonyafoustmead Skype: live: tonya_1270 | Instructor Website: https://ishareknowledge.com Course Creation Date: May/30/2019 |
Course Description and Goals
Course Description: This is an introduction series to cyber and information security for end users. Its designed to teach the principles and practices that mobile, desktop and gaming device users need to keep themselves safe, both at work and at home. By presenting best practices, and case studies along with exercises to apply knowledge, you will learn not only why security tactics are used but how it is done.
Pre-requisItes: None
Who is this course For?
Everyone, Beginners, Business, Government and Nonprofit Professionals, Small Business, College Kids and Parents
Course Goals: By the end of this course, students should be able to:
- Learn computer usage and mobile device trends
- Apply knowledge toward enhance mobile device security
- Apply knowledge toward enhanced password protection
- Learn social engineering tactics and security measures
Course Outline
Module 1 | Introduction
Lesson 1.1: Introduction and Trends in Computer Usage (9:38)
Lesson 1.2: Cyber Threats and Case Studies (7:40)
Module 2 | Mobile Device Security
Lesson 2.1: Trends in Mobile Device Use and Applied Knowledge (7:45)
Lesson 2.2: Applied Knowledge (5:55)
Module 3 | Enhanced Privacy Measures for Desktop and Mobile Devices
Lesson 3.1: Applied Knowledge (7:45)
Module 4 | Social Engineering Prevention Tips
Lesson 4.1: Case Studies, Applied Knowledge and Prevention Tips (10:18)