Coding Station

ICDL Secure Use of IT (IT Security)
I
n this 2-day ’16-hrs ICDL Secure Use of IT (IT Security)’ course, you will learn how to identify data threats from various sources, privacy protection, retention and control principles, the types of malware and protection against them, limits of network security and how to put in place an authentication and authorization process to ensure network security. Learners will also learn about secure data management principles such as how to secure their data securely, destroy data safely and temporary delete data in their social network accounts and cloud services.

Course Objectives

At the end of this course, you should be able to:

  • Understand the key concepts relating to the importance of secure information and data, physical security, privacy and identity theft

  • Protect a computer, device, or network from malware and unauthorized access.

  • Understand the types of networks, connection types, and network specific issues, including firewalls.

  • Browse the World Wide Web; communicate on the Internet securely.

  • Understand security issues related to communications, including e-mail and instant messaging.

  • Back up and restore data appropriately and safely; securely dispose of data and devices.