This second part of a two-course suite course builds on the knowledge imparted in the first part.
The course begins by describing practices and techniques that will create a cyber security culture.
The second chapter builds on the coverage of social engineering in the first part, and describes social engineering attacks and countermeasures in detail.
The third chapter covers planning and preparation for a security incident.
The course concludes with information on relevant laws and global compliance standards.
The course is for all users of information technology systems, particularly those who will go on to more advanced education in computer security.