Other Online Certificates and Courses

Online Registration
Call UsCall us at:

email usSend email to:


Identity theft continues to grow. Now more than 50 percent of identity theft occurs in the workplace. Learn to addresses both private and workplace concerns. You will receive information about the basic, common sense steps necessary to protect your identity and assets. Then develop comprehensive expertise in how to deter data theft, detect fraud, and minimize the impact of any damage inflicted.

One month, George Vroustouris, instructor.


Unit 1: Personal Identity Security
Section 1. a: Awareness
•    The truth about identity theft
•    Various types of identity theft & fraud
•    The real impact of identity fraud
•    How & where identity theft happens
Section 1.b: Behaviors
•    Improve your identity theft & fraud IQ
•    Protect personal identifiable info (PII)
•    Use different complex passwords
•    Monitor accounts for irregularities
Section 1.c: Controls
•    Recognize, access, & organize your PII
•    Safeguarding your personal digital data
•    Take your privacy and security seriously
                         …your lifestyle is at stake.

Unit 2: Workplace Culture of Security

Section 2.a: Awareness
•    Any organization with data is at risk
•    The cybersecurity threat landscape
•    What is sensitive company data
•    Workplace privacy & security
Section 2.b: Behaviors
•    Practice email, internet, & BYOD safety
•    Check and observe social media policy
•    Detect & deter data & identity theft
•    Report suspicious behaviors & issues
Section 2.c: Controls
•    Adhere to workplace security policies
•    Learn access control responsibilities
•    Take company data security seriously
                 …your livelihood is at stake

Unit 3: Personal Identity Action Plan

Template and Discussion

Unit 4: Workplace Identitiy Action Plan

Template and Discussion

 Question MarkAbout online learning

Online learning is a fun, enjoyable and very productive way to learn. Millions of people are learning online each year. You will engage with the instructor and other participants. You will get to know your instructor and other participants. You may make friends. It’s easy. It’s fun.

GearsHow the Course Works

It is easy to participate in your online course. After you register, you will be given a web address to go to get into your online classroom. You will have a password and use your email address and password to gain access.

Once inside the online classroom, here’s what you can expect.

CalendarParticipate when you want

You can participate any time of day or evening. The online classroom is open 24 hours a day, 7 days a week.
There are no live real-time requirements or meetings. You decide when you participate.
For the best learning, participants should log into the course on 2-3 different days of the week.

ChecklistWhat you will do

For each Unit, you will:

  • Read the print readings (about 20 pages a week)

  • Have the option of accessing the online readings

  • Listen to the audio presentation for the Unit and view the slides

  • Have the option of taking a self-quiz to see how much you have learned

  • Engage in written online discussion with your instructor and other participants

For best learning, you should make one or more comments at 2-3 different times each week.
The content (readings, audio lectures, slides) and self quizzes are accessible for the entire course, so you can work ahead, or go back and review again, at your convenience.

Next offering(s):
-Next session coming soon-


Ave. hours 16; 1.6 CEUs/ILUs

About your instructor

As a Nationally Certified Identity Protection Advisor® (CIPA), UIT trainer, public speaker, and adjunct instructor at Harper College, George Vroustouris starts every day studying the identity theft crisis, cyber risks, and issues around our privacy rights. George believes we all have the right to privacy and we deserve the peace of mind that our personal data is protected. He provides his community and his clients with the vetted resources, protection and comprehensive training needed, to secure and manage their identity, reputation and digital assets.

Course Objectives 

The objectives of this course are as follows: 

- To develop an understanding of the realities and damaging impact of sensitive information theft – identity fraud.
- To develop expertise in how to deter data theft, detect fraud, and minimize the impact of any damage inflicted.
- To develop an understanding that people are the weakest link when it comes to data security as they often trade privacy for convenience. Recognize a role in managing and protecting Personal Identifiable Information (PII) and in the security and survival of your workplace.
- To create an understanding about the fraudulent acquisition of our PII, the primary data source for over 80% of identity fraud.
- To provide vetted information from trusted resources helps you develop a heightened sense of risk awareness to this serious threat. Provide best practices that adjust behaviors allowing students to identify, inventory, organize, and secure sensitive data, both personally and in the workplace.

Course Outcomes

After successfully completing the course you will:

- Have a comprehensive knowledge of the types of identity theft and sensitive data breaches
- Know how to constantly analyze cyber security threats and maintain risk awareness.
- Know how to design and adopt new best practices to detect and defend against fraud.
- Know how to securely organize and manage your Personal Identifiable Information (PII), and adhere to workplace data security policies.

Completion Requirements