Computer Security

This lesson describes ongoing threats to computer security and emphasizes the importance of protecting an employer's digital property. Any data that audience members generate using the employer's resources is deemed to be the property of the employer. This includes, but is not limited to, all of the data that audience members generate while on their employer's premises, as well as using any of their employer's hardware and software resources.

Course Overview

This lesson describes ongoing threats to computer security and emphasizes the importance of protecting an employer's digital property. Any data that audience members generate using the employer's resources is deemed to be the property of the employer. This includes, but is not limited to, all of the data that audience members generate while on their employer's premises, as well as using any of their employer's hardware and software resources.

Upon successful completion of this course, you should have a better understanding of:

  • Their role in ensuring and maintaining security
  • Methods that are frequently used to protect software and data on corporate devices
  • The need for and approaches to ensuring security online
  • Procedures and best practices necessary to ensure the physical security of commonly-used devices

Course Topics

  • Introduction and Employee Responsibilities
  • Protecting Company Information
  • Online Security
  • Protecting Company Hardware