Comptia Security+, Security, Technology

Security+ Course – 3.2 User Training

1. Security Education

There are 2 important components of security training programs.

Security training: this provides users with the knowledge they need to protect the organisations security
Security Awareness:  Keeps the lessons learned at the front of the users mind. EG: posters, email reminders etc…

Security Training Methods

  • instruction in onsite classes
  • as part of new staff induction or orientation
  • education through online providers
  • participation in vendor provided classroom training

Example of training programs

This site offers training modules that customisable.

This site allows you to conduct fake phishing attacks:

Training Content & Frequency

Different roles need different levels of training. i.e.: IT support staff need different training than a receptionist. You need to cater for their needs accordingly.

Training frequency:

  • initial training for new employees
  • update training for employees in roles
  • refresher training on a annual basis



2. Information Classification

Data Classification Policies

These policies assign information into classifications that determine storage, handling and access requirements.

Information classification is based upon:

  • sensitivity of information
  • criticality of information

Classification Levels

Classification guides other security questions, EG: should this data be encrypted?

Information in classifications should be labelled correctly.

Secure Disposal Procedure

When devices are being sold or recycled the drives must be wiped correctly using something like DBAN



3. Compliance Training

Compliance programs ensure that an organisations information security controls are consistent with the laws, regulations and standards that govern the organisations activities. Compliance requirements differ a lot between organisations. EG: a University will have different requirements to a retail shop. Compliance obligations should be covered in security training. EG: if a law requires that employees never write down credit card numbers, employees should be made aware of this in training.

3 types of Compliance Obligations

  1. Laws: these come with civil or criminal penalties for failure to comply. EG: in financial firms there are laws that state they must have an Information Security Officer and a formal Information Security program in place to protect customer information.
  2. Regulations: these are mandatory requirements that an organisation must follow but are not embodied by law.
  3. Standards: these are detailed technical specifications for security and other controls. Organisations may be required to comply with standards by a contract or regulation.



4. User Habits

User habits education programs should address:

  • password security practices
  • data handling procedures (how data is handled and destroyed)
  • Physical security training (no tailgating into buildings)
  • BYOD policies should be covered
  • Appropriate use of social media



5. User Based Threats

This was covered in other chapters:



6. Measuring Security Education

It is important that organisations take steps to measure the effectiveness of their security education efforts. Some methods include:

  • Simulated phishing. this directly measures user awareness
  • Security awareness surveys. EG: “How well does the organisation prepare you to deal with security threats?”, “Do you know where to report a security incident?”

Leave a Reply

Your email address will not be published. Required fields are marked *