<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="12480" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/logicaloperations-cs" lastchanged="2025-01-28T11:51:02+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>CyberSAFE</title><productcode>CS</productcode><vendorcode>LG</vendorcode><vendorname>Logical Operations</vendorname><fullproductcode>LG-CS</fullproductcode><version>1</version><objective>&lt;p&gt;Students will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect themselves and their organizations from those risks.&lt;/p&gt;</objective><essentials>&lt;p&gt;To ensure success in this course, students should have experience with the basic use of conventional end-user technology, including desktop, laptop, or tablet computers, cell phones, and basic Internet functions such as web browsing and email.&lt;/p&gt;</essentials><audience>&lt;p&gt;This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.&lt;/p&gt;</audience><outline>&lt;p&gt;&lt;strong&gt;Lesson 1: Identifying the Need for Security&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Topic A: Identify Security Compliance Requirements Topic B: Recognize Social Engineering&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lesson 2: Securing Devices&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Topic A: Maintain Physical Security of Devices Topic B: Use Passwords for Security&lt;/li&gt;&lt;li&gt;Topic C: Protect Your Data&lt;/li&gt;&lt;li&gt;Topic D: Identify and Mitigate Malware Topic E: Use Wireless Devices Securely&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;
&lt;strong&gt;Lesson 3: Using the Internet Securely&lt;/strong&gt;
&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Topic A: Browse the Web Safely Topic B: Use Email Securely&lt;/li&gt;&lt;li&gt;Topic C: Use Social Networking Securely Topic D: Use Cloud Services Securely&lt;/li&gt;&lt;/ul&gt;</outline><objective_plain>Students will identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect themselves and their organizations from those risks.</objective_plain><essentials_plain>To ensure success in this course, students should have experience with the basic use of conventional end-user technology, including desktop, laptop, or tablet computers, cell phones, and basic Internet functions such as web browsing and email.</essentials_plain><audience_plain>This course is designed for non-technical end-users of computers, mobile devices, networks, and the Internet, enabling employees of any organization to use technology more securely to minimize digital risks.</audience_plain><outline_plain>Lesson 1: Identifying the Need for Security



- Topic A: Identify Security Compliance Requirements Topic B: Recognize Social Engineering

Lesson 2: Securing Devices



- Topic A: Maintain Physical Security of Devices Topic B: Use Passwords for Security
- Topic C: Protect Your Data
- Topic D: Identify and Mitigate Malware Topic E: Use Wireless Devices Securely

Lesson 3: Using the Internet Securely



- Topic A: Browse the Web Safely Topic B: Use Email Securely
- Topic C: Use Social Networking Securely Topic D: Use Cloud Services Securely</outline_plain><duration unit="d" days="0">0.5 days</duration><pricelist><price country="IT" currency="EUR">450.00</price><price country="CH" currency="CHF">500.00</price><price country="AT" currency="EUR">395.00</price></pricelist><miles/></course>