CONNECTIONS

IDAHO
ITD HOME
IDAHO DMV
ITD NEWS
HIGHWAY SAFETY
IDAHO STATE POLICE

TRAVEL SERVICES
STATE OF IDAHO


NATIONAL
AASHTO
AAMVA
AAA of IDAHO
FEDERAL HIGHWAYS
FEDERAL AVIATION
IDAHO STATE POLICE
NHTSA
NTSB
TRB
U.S. DOT

 

Idaho Transportation
Department

Public Affairs Office
P.O. Box 7129
Boise, ID 83707
208.334.8005
Fax: 208.334.8563
Email


Digital security courses available online

ITD employees who want to learn techniques for making their digital world more secure and less vulnerable to intruders can take advantage of limited-term, online training.

A number of courses are offered as part of the State of Idaho’s Information Security Awareness Campaign. Internet-based classes range from 15 minutes to 10 hours and are provided by the Information Security University, explains Forrest L. Anderson of ITD’s Information Services.

Courses were developed by redsiren, the world’s largest privately held provider of IT security management solutions. Based in Pittsburgh, redsiren delivers cost-effective security education solutions to meet the awareness requirements and education needs of all employees.

“I would encourage employees to take advantage of these training opportunities as time and workloads permit. These will only be available to us during the Security Awareness campaign, through April,” Anderson explains.

The campaign is supported by Idaho’s Information Technology and Management Council (ITRMC).

Classes remaining on the schedule are:

February

Information Privacy Essentials (15-45 minutes): The possibility of someone attacking our computers or our company’s networks might seem less realistic or frightening than thieves breaking into our homes at night. However, the Internet sites that we often visit, our company’s networks and our personal and work computers do in fact contain valuable information. And, as a result, there are those who will want to gain access to that information, in order to benefit themselves, to harm us or just to prove that they can. Information Security Essentials discusses the basic steps an individual can use to lower the risk of becoming a victim of an information security incident. Continuing Professional Education Credits Estimate: .25.

Home User Security (3 hours): (Course description not available)

Access Control Systems & Methods (1.8 hours): Access Control Systems and Methods explore controls aimed at protecting information from unauthorized destruction, change, and disclosure. It focuses on measures designed to ensure that the "right" people for example, authorized employees and business partners are allowed to access information assets. Important methods and tools to identify and authenticate users are discussed, as well as strategies to administer the authentication process. Continuing Professional Education Credits Estimate: 1.8.

Fighting Malware (8 hours): Since the release of wild and virulent viruses in the mid-1980s, the world of malicious software has experienced an explosion of hostile code. In addition to viruses, worms, email-enabled virus/worms and Trojan Horses, we have been confronted by pernicious virus hoaxes and chain email. Fighting Malware provides an in-depth look at many types of malicious software and discusses effective countermeasures to fight them. Continuing Professional Education Credits Estimate: 8.1.

Risk Management (3.4 hours): This course describes Risk Management as the process of identifying, measuring, controlling, and minimizing the impact of events that could adversely affect information assets. In addition, risk management involves assessing risks, implementing risk-reducing measures and procedures, monitoring and evaluating performance, and promoting awareness of security-related issues. Continuing Professional Education Credits Estimate: 3.4.

March

Identity Theft Essentials (2.5 hours): Identity theft is a crime that occurs when someone uses your name and a piece of your personal information usually the Social Security number (SSN) to commit fraud or theft. A thief can steal your identity to rent an apartment, buy a cellular phone, drain your bank account, or obtain loans and credit cards, and with your identity, a thief can even hold a job under your name and SSN or commit a crime. When arrested, they give the police fake identification with your name, leaving you with a criminal record. Continuing Professional Education Credits Estimate: 2.5.

Malware Basics (2.5 hours): There seems to be no end to the type and extent of damage caused by malicious software. Staying up-to-date in terms of the latest anti-virus software and other countermeasures is critical to preserving the confidentiality, integrity, and availability of valuable information. Malware Basics introduces malicious software, what it is, the type of damage it can cause, and how to protect against it. Continuing Professional Education Credits Estimate: 2.6.

Firewalls (4 hours): Protecting networks has become a top priority among business owners today, and firewalls often constitute their first line of defense. The primary job of a firewall is to police the connection between networks-often between internal networks and the Internet-and keep those who fail to meet firewall criteria out. Course 232: Firewalls describes the functions of a firewall, explains how firewall rules regulate incoming and outgoing traffic, and compares different firewall configurations. Case studies relate theory to real-world security situations. Continuing Professional Education Credits Estimate: 4.3.

Executives/IT Management (1.8 hours): (Course description not available)

April

Laptop Security Essentials (15 minutes): Laptop theft has increased dramatically in the last few years – literally thousands of laptops are stolen every day. The value of your laptop is more than the sum of the hardware & software; it also concerns the sensitivity of the information you have access to and what you store or carry around on your laptop. For that reason we present a summary of risks and recommendations for protecting your laptop from theft and unauthorized access. Laptop Security reviews the risks associated with laptop use and presents seven tips that users can follow in order to help ensure the security of their laptops and the privacy of their and their employer’s information on their laptop. Continuing Professional Education Credits Estimate: .25.

Cybersafety (3 hours): As its title indicates, Cybersafety exposes students to the fundamentals of remaining safe while using information technologies, such as the Internet. Cybersafety is a topic of considerable interest for parents and teachers who wish to keep threats at a distance for themselves, children and students. This course is designed to present the basic elements of common Internet threats and the recommended steps towards prevention and raising awareness. By the end of the course, students should have a foundation, basic understanding of common Cybercrimes and how to prevent falling victim to them. Continuing Professional Education Credits Estimate: 3.

Database Security (3.9 hours): Whether we like it or not, in modern society databases rule our lives. They contain sensitive information about practically anyone who has ever obtained a driver’s license, purchased a newspaper subscription, or opened a credit account. The sheer bulk of personal and proprietary information contained within our databases demands that we pay particular attention to database security. This course provides IT professionals with an introduction to the concepts of database security. It explains the value of Intellectual Property (IP), regulations that govern database design and administration, common database threats and best practices for preventing and/or thwarting attacks. Continuing Professional Education Credits Estimate: 3.9.

Wireless Network Security (10 hours): Wireless Network Security illustrates the major security vulnerabilities in wireless computing and outlines the steps you need to take to protect yourself, your company and your clients should you implement this technology. We cover a broad range of wireless network types but then hone in on WLAN security. We will examine the existing flaws, how they are exploited, and how to plug the holes. You will also be provided with a number of optional hands-on-labs where you can get a feel for exactly what we are talking about. This course will show you the what, why and how of wireless security and will prove to be a valuable resource in your path towards secure wireless computing. The author of this session has personally scanned over 1000 wireless networks in the past few months and has discovered that nearly 70% of them employ NO SECURITY whatsoever. Continuing Professional Education Credits Estimate: 10.

Due Care/Diligence & Negligence (5.5 hors): Understanding Due Care, Due Diligence, & Negligence presents the importance of implementing and up-keeping information security standards in the management of technology assets. A description of each concept is presented along with current formal and informal standards being used internationally. Further, this course examines existing laws in both the United States and in the international community pertaining to the preservation of security and privacy of individuals. The final section reviews case studies and examples relevant to these concepts and their impact in the world. Continuing Professional Education Credits Estimate: 5.5.

(Note: All times are approximate).

For more information about the computer security classes, contact Anderson at Forrest.Anderson@itd.idaho.gov or call 334-8158, or to take a class click here.

TRANSPORTER HOME MILESTONES ARCHIVES