K2's Securing Your Data - Practical Tools for Protecting Your Data
Course Information
4
CPE Credits
4-Hour Course
Information Technology (4 Credits)
Basic Understanding of Computer Operations
Prerequisites
Intermediate
Program Level
No
Preparation
Course Information
4
CPE Credits
4-Hour Course
Information Technology
(4 Credits)
Basic Understanding of Computer Operations
Prerequisites
Intermediate
Program Level
No
Preparation
Major Topics
Small businesses have unique and specific technology needs, including those around remote access. Whether team members need remote access to desktops, data, voice services, instant messaging, or Cloud-based services, sometimes the list of available options can be overwhelming!
In this course, you will learn about practical solutions for facilitating remote access in small businesses. Among other items, included in this program is a detailed review of various solutions to provide remote access to a desktop, how to work securely from remote locations, key considerations when selecting Cloud-based solutions, and how to facilitate communication and collaboration in remote environments.
Course Description
Security is not optional and yesterday’s security techniques are not working to minimize today’s security threats. Therefore, now is the time for you to tune up what you know about protecting sensitive data.
In this program, you will learn about the latest tools and techniques for securing your data, including encryption, virus protection, secure communications, electronic signatures, secure authentication, and more. You will also learn how to implement a very practical, five-step approach to securing your PC and the types of questions you should be asking of your staff to ensure server-based information remains protected. Extensive demonstrations will be used by your K2 instructor to teach the techniques and concepts presented.
Security failures, such as a breach of client or customer data, are costly – they can even drive your company out of business. What are the security tools you need and how do you use them to secure your sensitive data and systems? Can you afford to take the risk of attempting to manage today’s threats by using yesterday’s techniques? Participate in this program to learn how you can implement viable and practical solutions to mitigating today’s security threats.
Learning Objectives
Upon completing this course, you should be able to:
- Assess the relevant security risks in your organization
- Identify specific tools and techniques to protect sensitive data
- List five specific steps to improve PC security
- Implement security procedures to improve organizational security
Who is the course for?
Business professionals seeking to secure sensitive data.
Instructional Delivery Method
Group-live demo and discussion using color computer projection.