Information Security Training & Awareness Program (IS-TAP)

 

With more people working remotely, hackers are leveraging this opportunity to ramp up their attacks.  Information Security is more important today than ever before.  Learn how to protect yourself and College of the Canyons from falling victim to cyber crooks.  Attend the Information Security Training & Awareness Program (IS-TAP) to learn about these threats and the effective strategies to mitigate or avoid them.  There is an IS-TAP digital badge available for anyone that attends all 9 workshops in the series.

Information Security
Training & Awareness Program (IS-TAP)

  1. Information Security – Overview
    Overview of Information Security, what it is, why it’s important and what you need to do to keep yourself and your data safe.

  2. Keep it Safe with Passwords
    Discuss password best practices, how to create a strong password and how to manage your passwords.

  3. Email Scams
    Take a closer look at identifying suspicious emails. Learn what red flags you should look for when analyzing emails you receive. Identify the various tactics scammers use via email and the best practices to recognize and avoid these threats.

  4. Securing Mobile Devices
    Take a closer look at our mobile devices and learn why it is important to protect these devices and how to go about doing so.

  5. Social Engineering
    Take a closer look at the inner workings of the most prevalent tool used by scammers, why it is so popular and how to recognize the threat and protect against it.

  6. Hacking / Scamming Tactics
    Examine various methods and tactics scammers and hackers use to get you to give up your information and take actions that you wouldn't normally do. Recognizing these tactics is vital to avoiding the threats before they can take advantage of you.

  7. Being Web Wise
    Take a closer look at the threats that abound on the web, how to detect them and best practices to avoid them.

  8. Connect with Care
    Take a look at the threats involved with connecting to public/open WiFi networks as well as connecting USB devices to our computers and the best practices to avoid these threats, such as using Virtual Private Networks (VPN).

  9. Protecting your Home and Personal Life
    We will turn our attention to your home and personal life. We'll look into how to secure your home network and devices.