Cyber awareness course

Shared Knowledge LLC creates End User Awareness Course for Cybrary

Hi everyone! Although I have created many cyber security awareness courses (see introduction to my FISSEA presentation) for use in the education sector, here is my first course created for Cybrary.it is available on demand here.

Why Create an End User Awareness Course?

I created the End User Awareness course because of my interest in helping to build a platform to provide no cost or low cost educational programming in the cyber space for small business owners, nonprofit professionals, civil servants employed in federal, state and local governments and parents.

Introduction to End User Awareness Course

This is an introduction series to cyber and information security for end users. Its designed to teach the principles and practices that mobile, desktop and gaming device users need to keep themselves safe, both at work and at home. By presenting best practices, and case studies along with exercises to apply knowledge, you will learn not only why security tactics are used but how it is done.

Relevant Experience and Certifications

I am a change agent and management expert specializing in data and technology with a specific focus on extraction, transformation and loading, audits and investigations for improved performance.  I have a PhD, MBA and Masters in Ed Psychology. I have spent a number of years in database administration, data migration, analytics and cyber security. I have a number of certifications: Computer Hacking Forensic Investigator, Certified Fraud Examiner (because of the intersection between fraud and data manipulation and Certified Block Chain Professional.

End User Awareness Course Syllabus

Emphasis on Cyber & Data Security

Instructor Name: Tonya Mead, PhD   Instructor Contact:
https://www.linkedin.com/in/tonyafoustmead
Skype: live: tonya_1270
Instructor Website:  https://ishareknowledge.com Course Creation Date: May/30/2019

Course Description and Goals

Course Description: This is an introduction series to cyber and information security for end users. Its designed to teach the principles and practices that mobile, desktop and gaming device users need to keep themselves safe, both at work and at home. By presenting best practices, and case studies along with exercises to apply knowledge, you will learn not only why security tactics are used but how it is done.

Pre-requisItes: None

Who is this course For?

Everyone, Beginners, Business, Government and Nonprofit Professionals, Small Business, College Kids and Parents

Course Goals: By the end of this course, students should be able to:

  • Learn computer usage and mobile device trends
  • Apply knowledge toward enhance mobile device security
  • Apply knowledge toward enhanced password protection
  • Learn social engineering tactics and security measures

Course Outline

Module 1 | Introduction

Lesson 1.1: Introduction and Trends in Computer Usage (9:38)

Lesson 1.2: Cyber Threats and Case Studies (7:40)

Module 2 | Mobile Device Security

Lesson 2.1: Trends in Mobile Device Use and Applied Knowledge (7:45)

Lesson 2.2: Applied Knowledge (5:55)

Module 3 | Enhanced Privacy Measures for Desktop and Mobile Devices

Lesson 3.1: Applied Knowledge (7:45)

Module 4 | Social Engineering Prevention Tips

Lesson 4.1: Case Studies, Applied Knowledge and Prevention Tips (10:18)