K2's 2022's Biggest Security and Privacy Concerns

K2's 2022's Biggest Security And Privacy Concerns

Course Information

4

CPE Credits

4-Hour Course
Information Technology (4 Credits)

No

Prerequisites

Basic

Program Level

No

Preparation

Course Information

4

CPE Credits

4-Hour Course
Information Technology
(4 Credits)

No

Prerequisites

Basic

Program Level

No

Preparation

Major Topics

Small businesses have unique and specific technology needs, including those around remote access. Whether team members need remote access to desktops, data, voice services, instant messaging, or Cloud-based services, sometimes the list of available options can be overwhelming!

In this course, you will learn about practical solutions for facilitating remote access in small businesses. Among other items, included in this program is a detailed review of various solutions to provide remote access to a desktop, how to work securely from remote locations, key considerations when selecting Cloud-based solutions, and how to facilitate communication and collaboration in remote environments.

K2-Remote-Access-Small-Businesses-Skills-Header

Course Description

Technology is a business-critical business capability in today’s day and age. Any interruption to an organization’s ability to use its information system poses a significant risk to its viability. Data breaches, cyber-attacks, and ransomware are examples of the most significant existential risks facing businesses today. There are threat actors worldwide that entirely focus on stealing organizational data, stealing economic resources, and disrupting commerce.

K2-Biggest Security-Privacy-Concerns-Skills-Header

They use complex social engineering attacks, pervasive phishing messages, intricate malware, and other highly effective techniques. For example, publically reported data breaches now exceed 100k annually. These breaches resulted in releasing the personal information of millions of people worldwide, billions of dollars of compromised organizational assets, and putting countless people in harm’s way.

This course covers recent major security breaches, including Solarwinds, Ubiquity, Colonial Pipeline, Tecnimont SpA, Citrix, and LabCorp. It will discuss how these breaches occurred, why they occurred, and how organizations can prevent similar incidents from impacting them. Each case study examines a different form of security vulnerability and how to avoid it.

The topics will include social engineering, auditing processes for IT Security systems, forensic accounting, password, two-factor authentication, and improvements for managerial oversight. Participants will gain real-world knowledge from the mistakes of other organizations and, from that experience, develop their own security best practices for their organizations.

Learning Objectives

Upon completing this course, you should be able to:

K2-Biggest Security-Privacy-Concerns-Skills-Learning-Objectives-Header

Who is the course for?

Professionals who are interested in improving security procedures.

Instructional Delivery Method

Group-live demo and discussion.

Facebook
Twitter
LinkedIn