Operational information security
Overview/Description
To demonstrate secure practices for networked and mobile users, and introduce software piracy and social engineering
Target Audience
Business users requiring an introduction to information security best practices
Prerequisites
A basic knowledge of computer concepts and experience of using end-user applications in a business environment
Operational information security