Cybersecurity Awareness for Employees: Security Awareness Essentials

In our digital world today, attackers seem to be lurking behind every click of the mouse or tap on the screen. Many people forget that they are the keepers of their own security safety and the security safety of the institutions for which they are employed. In this interactive online course, we learn about the who, what, how, and why of security attacks. We discuss the potential losses associated with a successful security breaches by hackers and will understand the different way in which those security breaches can occur. Finally, we cover important actions you can take within your organization to limit security risks.

Request a demo

Course Details

Learning Objectives

At the end of this course, you will be able to:
  • Identify who, what, and why hackers are targeting
  • List three main attacks that target employees
  • Name the possible losses associated with end-user hacks
  • Define an Acceptable Use Policy and what it consists of
  • Anticipate the ramifications of a cyber-attack on small- and medium-sized businesses (SMBs)
  • Compare and contrast the pros and cons of “Bring Your Own Device”
  • Define jailbreaking and rooting
  • Explore antivirus solutions

Specs

Course Level Fundamental
Languages English
Compatibility Audio, Video, MobileReady

Hanna Haddad

Hanna has been in the Information Technology industry for over 11 years mastering disciplines in Cyber Security, Virtualization, Internet Technology and Information Systems. Hanna is bilingual and works as both a consultant and master mile2 instructor in the United States, Europe and Asia. Hanna has a long history in the INFOSEC industry. He1€™s been involved in high level projects that not only range from securing virtualization environments, but also implementing complex controls to ensure network security. Hanna has many expertise and has been involved in the following disciplines for over 10 years in both the private and public sector:
  • Microsoft Systems: AD, DNS, DHCP, MS Exchange, SQL, ISA, TMG, SCCM, VDI
  • VMWare: ESXi, vSphere, VSAN, Horizon View
  • Cisco: Switching, Routing, Firewall (ASA), VOIP
  • Security: Penetration Testing, Vulnerability Assessment, Incident Handling
  • Linux: used Linux (Ubuntu, Fedora, Debian) for Penetration testing
  • Firewall: Palo Alto, Astaro, ASA, Fortinet, Forefront
  • Storage: SAN, NAS, VSAN (VMWare SAN)
  • Disaster Recovery and Business Continuity
Hanna is a mile2 master instructor and has obtained the following certifications with Mile2, Microsoft, EC-Council and Comptia (The is not an exhaustive list of courses Hanna can teach):
  • Mile2: CPTE - Certified Penetration Testing Engineer, CPEH - Certified Professional Ethical Hacker, CIHE 1 Certified Incident Handling Engineer, CDRE 1 Certified Disaster Recovery Engineer, CDFE 1 Certified Digital Forensics Examiner
  • Microsoft Certifications: Microsoft Certified Solutions Associate, Microsoft Certified Trainer, Microsoft1® Certified IT Professional (MCITP), Microsoft1® Certified Technology Specialist (MCTS), Microsoft Certified Solutions Expert in Private Cloud (MCSE), Microsoft Certified Solutions Expert in Server Infrastructure (MCSE)
  • EC-Council Certifications: Certified Ethical Hacker (E | CEH), Certified EC-Council Instructor (CEI), Certified Security Analyst (E | CSA), Disaster Recovery Professional (E | DRP)
  • CompTIA Certifications: Security+
Hanna is responsible for developing Cloud Security courses, Comptia+ Cloud+ and Mile1s Certified Professional Ethical Hacker.

Course Applies To

Demos + Pricing

Learn more about our courses, get pricing, and see our platform.

Trusted by 24,000+ Industry Leaders