Secure Florida offers...
- Security Alerts
- C-Safe Classes
- News and Info
create an account
|Name of Class||Length||Topics Covered|
|CSAFE||3 - 4 hrs||
Broadly covers the entire range of cybersecurity issues. Topics include malicious software, social engineering, antivirus software, firewalls, passwords, email threats, frauds, and wired & wireless networks.
|The Human Firewall||1 - 3 hrs||
Cybersecurity awareness training for employees and their managers. This provides information on email safety, information security, common scams, and social engineering
|Family Online Safety (Parents)||1 - 1½ hrs|
|Combat Cyberbullying||40 - 45 minutes||
Designed for parents, teachers, and school counselors, this covers the unique features of online bullying and the steps we can take to prevent it.
|Online Safety (Kids)||40 - 45 minutes||
Designed for middle school students, this fits nicely into most school schedules. It covers the Rules for Kids, and explains the reasons behind them.
|Online Safety (Teens)||40 - 45 minutes||
Designed for high school students, this covers the Rules for Kids from a teen perspective.
|Mobile Device & App Security||40 - 45 minutes||
Designed for users of mobile devices; includes safely using apps, securing mobile devices, and ensuring privacy on public Wi-Fi networks.
|Online Safety for Seniors||1-2 hours||Simple steps that the elderly, as well as their families and caregivers, can use to keep themselves and their families safe while still enjoying the benefits of the Internet.|
|Shining the Legal Light||1 hour||Discusses the rules that govern our digital lives. It covers federal and state laws as well as other regulations that tell us what we can and cannot do online.|
|10 Best Practices for Internet Security||1 hour||Explains the reasons behind our 10 Best Practices, and how to implement them.|
|Frauds & Other Email Risks||1 hour||Discusses frauds that originate from emails, websites, and phone calls; focuses on recent trends.|
|Identity Theft||1 hour||Explains both the high-tech and low-tech ways your identity can be stolen, and gives valuable tips on prevention and recovery.|
Don't be a Victim
|1 hour||Describes how social engineering is increasingly used in cyber attacks; provides tips on how to recognize and react to it.|
|Incident Response Planning||1 hour||Outlines some basic incident planning steps every business should take, and some simple questions that every manager needs to know the answers to, before your company is hit with a cyber disaster.|
If you don't see what you are looking for, contact us and let us know what you want. We can work with you to make it happen!