CyberSAFE - Securing Assets for End-Users

CertNexus | CyberSAFE | Securing Assets for End-Users

CyberSAFE - Securing Assets for End-Users

Vendor:  CertNexus

Upcoming classes: See Class Calendar

Class Overview

This CertNexus CyberSAFE (SAFE: Securing Assets for End-Users) certification training is ideal for any end-user of a company that uses any form of computing device because everyone in a company is responsible for security, and anyone can put the organization at risk. Malicious actors can attack and infiltrate an organization through anyone and keeping systems safe from intrusion and attacks is critical.

CyberSAFE helps ensure that your end users can identify some of the most common risks associated with using conventional end-user technology. Additionally, this training will help the student understand security compliance considerations, social engineering, malware, and various other data-security-related concepts. This training also provides your end-users with solutions for how to safely protect themselves and your organization from some of the most prevalent security risks.

During this training, the student will participate in discussions, case studies, and hear the experiences of the instructor and fellow students to explore the hazards and pitfalls of technology and learn how to use that technology safely and securely.

Class Details

Objectives



To empower your team members, at every level, to protect your organization’s devices and operate them safely to help protect your enterprise.

You will:
- Identify security compliance measures.
- Address social engineering attempts.
- Secure devices such as desktops, laptops, tablets, smartphones, and more
- Use the Internet securely

Prerequisite Knowledge Advisory

Basic knowledge of:
- digital technology (i.e., desktop, laptop, etc.)
- internet functions (web browsing, etc.)
- email

Exam Required for CyberSAFE Certification



Exam: CBS-410
Proctor: CHOICE platform

CyberSAFE Certification Training Class Outline



Lesson 1: Identifying Security Compliance Measures
Lesson 2: Recognizing and Addressing Social Engineering Attacks
Lesson 3: Securing Devices
Lesson 4: Using the internet Securely

Share by: