Risk Management When Online
Risk Management When Online
This course introduces students to operational security practices in the cyberspace domain; securing cyber technology such as Ipads, smartphones, laptops, and desktops to keep these devices from broadcasting the user's activities and patterns of interaction in the cyberspace domain; understanding social engineering methods and awareness on how to prevent becoming the victim of a phishing and/or social engineering attempt; best practices for interacting with social media platforms; and best practices to surf the World Wide Web without leaving footprints that can be used to compromise your private life and your enterprise. The course also addresses the ethical and legal aspects associated with activities conducted in the cyberspace domain.
Cybercriminals are masking their intrusion under the pretense of normal Internet traffic and they know they can count on the click-happy Internet user that will, without thinking, click on a url link sent to him/her by email or text. The goal is to compromise the individual's cyber technology device (phone, Ipads, laptops, etc.) with the malware. Then, the infected device becomes under the control and command of the hacker and it is used to penetrate the holly grail of the organization assets, intellectual property, and username/password/credit card information, or to control the computer to execute a denial of service attack, and other cybercrimes.
Our nation does not have a technological problem when it comes to cyber security. It has a behavioral problem the operator is the weakest link in the security chain. It is the manner in which the operator visits all websites, opens an email with an embedded URL (regardless whether the sender is a known or unknown subject), uses portable devices, and analysis the incoming and outgoing network traffic what it is causing this wave of cyber attacks.
- The ethical and legal aspects associated with activities conducted in the cyberspace domain
- Operational security in the cyberspace domain , and best practices for personal and work related use of cyber technology
- Utilization of open source tools to transform personal and work related cyber technology into stealth devices
- The social engineering tactics used by hackers and other individuals with malicious intents
- Critical thinking skills applied to the handling of cyber technology
- Handling cyber technology while on travel (domestically and internationally)
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.