Identity theft continues to grow. Now more than 50 percent of identity theft occurs in the workplace. Learn to addresses both private and workplace concerns. You will receive information about the basic, common sense steps necessary to protect your identity and assets. Then develop comprehensive expertise in how to deter data theft, detect fraud, and minimize the impact of any damage inflicted.
One month, George Vroustouris, instructor.
Agenda
Unit 1: Personal Identity Security
Section 1. a: Awareness
• The truth about identity theft
• Various types of identity theft & fraud
• The real impact of identity fraud
• How & where identity theft happens
Section 1.b: Behaviors
• Improve your identity theft & fraud IQ
• Protect personal identifiable info (PII)
• Use different complex passwords
• Monitor accounts for irregularities
Section 1.c: Controls
• Recognize, access, & organize your PII
• Safeguarding your personal digital data
• Take your privacy and security seriously
…your lifestyle is at stake.
Unit 2: Workplace Culture of Security
Section 2.a: Awareness
• Any organization with data is at risk
• The cybersecurity threat landscape
• What is sensitive company data
• Workplace privacy & security
Section 2.b: Behaviors
• Practice email, internet, & BYOD safety
• Check and observe social media policy
• Detect & deter data & identity theft
• Report suspicious behaviors & issues
Section 2.c: Controls
• Adhere to workplace security policies
• Learn access control responsibilities
• Take company data security seriously
…your livelihood is at stake
Unit 3: Personal Identity Action Plan
Template and Discussion
Unit 4: Workplace Identitiy Action Plan
Template and Discussion
About online learning
Online learning is a fun, enjoyable and very productive way to learn. Millions of people are learning online each year. You will engage with the instructor and other participants. You will get to know your instructor and other participants. You may make friends. It’s easy. It’s fun.
How the Course Works
It is easy to participate in your online course. After you register, you will be given a web address to go to get into your online classroom. You will have a password and use your email address and password to gain access.
Once inside the online classroom, here’s what you can expect.
Participate when you want
You can participate any time of day or evening. The online classroom is open 24 hours a day, 7 days a week.
There are no live real-time requirements or meetings. You decide when you participate.
For the best learning, participants should log into the course on 2-3 different days of the week.
What you will do
For each Unit, you will:
Read the print readings (about 20 pages a week)
Have the option of accessing the online readings
Listen to the audio presentation for the Unit and view the slides
Have the option of taking a self-quiz to see how much you have learned
Engage in written online discussion with your instructor and other participants
For best learning, you should make one or more comments at 2-3 different times each week.
The content (readings, audio lectures, slides) and self quizzes are accessible for the entire course, so you can work ahead, or go back and review again, at your convenience.
Course Objectives
The objectives of this course are as follows:
- To develop an understanding of the realities and damaging impact of sensitive information theft – identity fraud.
- To develop expertise in how to deter data theft, detect fraud, and minimize the impact of any damage inflicted.
- To develop an understanding that people are the weakest link when it comes to data security as they often trade privacy for convenience. Recognize a role in managing and protecting Personal Identifiable Information (PII) and in the security and survival of your workplace.
- To create an understanding about the fraudulent acquisition of our PII, the primary data source for over 80% of identity fraud.
- To provide vetted information from trusted resources helps you develop a heightened sense of risk awareness to this serious threat. Provide best practices that adjust behaviors allowing students to identify, inventory, organize, and secure sensitive data, both personally and in the workplace.
Course Outcomes
After successfully completing the course you will:
- Have a comprehensive knowledge of the types of identity theft and sensitive data breaches
- Know how to constantly analyze cyber security threats and maintain risk awareness.
- Know how to design and adopt new best practices to detect and defend against fraud.
- Know how to securely organize and manage your Personal Identifiable Information (PII), and adhere to workplace data security policies.