Problem
A. Describe the components of an effective user training and awareness program.
B. Evaluate the advantages and disadvantages of integrating security awareness training as an aspect of the performance review process.
C. Explain how Mega-Corp can use security awareness training to protect information assets against social engineering.
D. Differentiate between security awareness training appropriate for IT and that which is appropriate for non-technical users.
E. Recommend a specific employee security awareness training option.
F. Explore the commercial and custom options available to organizations for provision of security awareness training.
G. Recommend ways to ensure PCI compliance.