The document provides an agenda for an information security awareness training over two days. Day 1 covers topics such as crown jewels, case studies, and a security survey. Day 2 continues the training with topics on anti-malware software, backups, portable storage devices, passwords, wireless security, phishing, and social media. Definitions and best practices are provided for many of these security topics.
Related topics: