Awareness

Information Security Awareness for EndUsers

Attendees will become familiar with the basics of information security and will enhance their awareness about the importance of corporate information security as well. They will learn their duties and responsibilities as a contributor to a corporate ISMS.

Information Security Awareness for EndUsers

Information Security Awareness for EndUsers

Who should attend ?

Users of information systems.

Prerequisites

None.

Course Syllabus

  • Role of user in information security
  • Contribution of user to corporate Information Security Management System (ISMS)
  • Access to computers
  • Password security
  • E-mail security
  • Security while accessing the Internet
  • Virus protection
  • Setup, use and disposal of storage media
  • File access and sharing
  • Information backup
  • Social engineering
  • User responsibilities in computer incidents

Duration

3 Hours.

Benefits

Attendees will become familiar with the basics of information security and will enhance their awareness about the importance of corporate information security as well. They will learn their duties and responsibilities as a contributor to a corporate ISMS.

Course Tutor

Muharrem Aydın

Computer Engineer, Cyber Security Expert, IT Lawyer

After 10 years of software engineering experience with titles of software developer, product manager, and integration architect, I have been working in cyber security domain for last 10 years. I am not only a cyber security expert but also the head and kick-starter of a cyber security consultancy unit.

In security field, I have performed dozens of penetration tests for institutes from different sectors: finance, military, state agencies, and telcos.

I have consulted different companies in security field which includes global banks such as ING Bank, HSBC, CitiBank.

In addition, I am an adjunct instructor in a university and teaching cyber security for years.

I involved in technical areas and has taken responsibilities in:

  • Penetration tests (Pentests) and security audits
  • Cyber security training & consultancy
  • Source code analysis & secure software development
  • Cyber security incident response
  • Information security management system (ISMS) consultancy Open source cyber security systems, such as OpenVAS, OSSEC, OSSIM, Snort, Suricata, mod security

I’m creating my courses by using my know-how and 10 years of experience. As a result, our first course “Hacking Web Applications and Penetration Testing: Fast Start!” has gained “Best Seller” reputation in its category.

I have risen a lot of cyber security experts from scratch, and you are the next.