Security Awareness
Security in business
General user security
IT staff security
Risk management processes
Threats and risk assessment
Security practices
Corporate espionage
Internal threats
Theft of corporate property
Security on the road
People, processes and technology
Safeguarding corporate assets
Customer expectations
Business partner expectations
User identification and authentication
Authorization to use resources
Reporting security incidents
Security administration overview
Manager and owner responsibilities
Security administration
Code of conduct for employees
Monitoring systems and networks
User IDs and passwords
Selecting passwords
Password policies
Checking password security
Expiration dates
Accounts without passwords
User accountability
Data classification
Data and paper documents
Responsibilities of users/owners
Overview of the process
User and owner responsibilities
Using the process to manage information systems
Corporate monitoring policy
Network and Internet usage
Monitoring for unusual activities
Understanding viruses
Types of viruses
Understanding how viruses propagate
Pseudo viruses
Antivirus programs
Protecting yourself against viruses

Business partners
Social engineering
Hackers and crackers
Recruitment techniques
Supervisors and management
When and how to report suspicions
Gathering evidence
Physical and information assets
Whom to call
The incident report
Gathering evidence
Laptop securityŚCorporate standards
Sensitive documents and travel documents
Lost documents or equipment