1 – Identifying the Need for Security
- Identify Security Compliance Requirements
- Recognize Social Engineering
2 – Securing Devices
- Maintain Physical Security of Devices
- Use Passwords for Security
- Protect Your Data
- Identify and Mitigate Malware
- Use Wireless Devices Securely
3 – Using the Internet Securely
- Browse the Web Safely
- Use Email Securely
- Use Social Networking Securely
- Use Cloud Services Securely