C)SAP - Certified Security Awareness Principles
Home Courses Categories CyberSecurity

C)SAP – Certified Security Awareness Principles

C)SAP – Certified Security Awareness Principles

Duration: 1 day
Format: Instructor-led classroom, Live Online Training
Prerequisites: None – This is an entry level course
Student Materials: Student workbook
CPEs: 16 Hours
Who Should Attend: Anyone, End User, Company Employee, Basic Computer User
Training Date: August 3, 2017
Venue: Media Rotana, Dubai, UAE
IT SEC Academy offers C)SAP - Certified Security Awareness Principles Training
With Certification
AED6,995
E-Book Course Material
2 Days Instructor Lead Course
Register Now
For Government or Large Organization
Special pricing & Discounts are available for government and large organizations.
Special pricing can be applied for public, private and customized training.
Request for Quotation

The mile2 vendor neutral Certified Security Awareness Principles certification course is intended for anyone that uses a computer on the internet. Attendees will understand the security threats as well as the counter measures associated with these attacks. Employees will learn that the weakest link in any security program is a poorly trained department.This course teaches general security awareness as well as how to develop a strong security culture within your company’s community. The Social Engineering portion of the class is designed to teach the participants the skills used by Social Engineers to facilitate the extraction of information from an organization using technical and nontechnical methods.

Computer fraud, blackhat hacking, cyberterrorists; these phrases describe an innovative generation of criminals that use overthewire technology to attack us, steal from us and terrorize us. However, the best tool in their arsenal is not new. It is only used by the most experienced, the most dangerous, boldest hackers. 
The mile2 Certified Security Awareness Principles program is innovative and trains students on how attacks are performed, the skills necessary to perform an attack, how to train people to identify an attack but most importantly:  how to train internal targets so that the training is effective and lasts. 

Module 1 – Basic Security: How to secure a computer for personal internet use

What are the Risks?
Known Risks Did You Know?
What are the Risks?
Things you NEED to know!
The “Hacker”
What is Identity Theft?
Fighting Identity Theft
Practice
Demo
Don’t Panic!

Module 2 – User Awareness

Overview
User Attacks
User Awareness
Passwords
Generating Passwords
Keeping Track Of Passwords
eWallet
Encryption Tools
Other Password Options
Windows Administrator Account
Demo
Windows Processes
Task Manager
Processes Tab
Searching Processes
Web Research
Process Information
Bad Processes
Removing Suspect Processes
Start-Up Tuners
Downloads
The User
E-Mail Links
Demo

Module 3 – Implementing Countermeasures

Overview
Internet Protection Solutions
Choosing a Package
Free Anti-Virus & Spyware
Free Anti-Malware & Anti Spyware
Updating
Scheduling a Scan?
Demo
Patch Management
Demo
Internet Anonymizers
How They Work Demo

Module 4 – Essential Security Awareness for Everyone

Why Are You Here?
The Employer’s Liability
Steps to an Effective Security Program
Starting at the Top
Why This All Matters
Areas of Concern
What’s In This For Me?
Course Format

Module 5 – Using the Internet at Work

Module Objectives
Why Can’t I Just Do What I Want?
Internet Acceptable Use Policy
The Internet at Work
Internet Basics
Internet Threats
Internet Access
Your Web Browser
ActiveX & Java
Media Files
E-Mail
Chat
Web Storage
Web Proxies
P2P Spyware
Countermeasures
Demo

Module 6 – Accessing the Company’s Network Through Your Assigned Computer

Module Objectives
What’s a LAN?
Logging In Installing Applications
OS Utilities
Network Drives
Sharing
Removable Storage
Email Attachments
Virus Scanner
Management Software
Monitoring
Demos

Module 7 – Accessing the Corporate Network Remotely

Module Objectives
Work from Home
Your Home PC
From Your House to Work
Wireless
Hot Spots
Web Access for Email
Profile Management
VPNs
Demo

Module 8 – Social Engineering Remotely

Introduction
What is Social Engineering?
Definition of Social Engineering
Goals of Social Engineering
Types of Social Engineering
Attacks by Phone
Dumpster Diving
On-Line Social Engineering
Persuasion
Social Engineering Roles
Reverse Social Engineering
What We Cover
Examples of our labs

Module 9 – Understanding and Manipulating our Target

Outline
Introduction
How are People Motivated?
Avoiding Pain
Pursuing Pleasure
Baselining
How to Read a Person
Body Movements
What About Over the Phone?
Re-Framing
Putting on the Right “Spin”
Marketing
Alter Perceptions of Pain or Pleasure
Saving-Face
Verbal Judo
Putting It All Together
Practice Summary

Module 10 – Researching Our Target

Outline
Introduction
Google Hacks
Google Hacks Continued
Other Research Techniques
Dumpster Diving
Email Addresses
Current SOPs
Vendor Agreements
Inter-Office Memos
Shoulder Surfing
Eavesdropping
E-mail
Telephone Calls
Cubicles/Office Areas
Restaurants and Bars
Job Descriptions
Conclusion

Module 11 – Methods of Deception

Outline
Introduction
Impersonation in Person
The Job Interview
The Inspector
Delivery Person
Vendors/Contractors
Impersonation on the Phone
Help Desk
IT Staff Asking for Help
Summary

Upon completion, the Certified Security Awareness Principles candidate will not only be able to competently take the CSAP exam but will also understand basic cyber security knowledge to keep companies IP and IT infrastructure safe.

The Certified Security Awareness Principles exam is taken online through Mile2’s Assessment and Certification System(“MACS”), which is accessible on your mile2.com account. The exam will take 1 hour and consists of 25 multiple choice questions.