The document summarizes the objectives of a training program for users.
The objectives are to refresh and improve the skills and knowledge of users. It also aims to enable users to better perform their activities and take advantage of available tools.
The training seeks to highlight best practices for using resources appropriately and privately according to needs. It also wants to spread awareness of security risks and teach mitigation techniques.
The training will provide direction on available options for support and interaction with users.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
The document summarizes the objectives of a training program for users.
The objectives are to refresh and improve the skills and knowledge of users. It also aims to enable users to better perform their activities and take advantage of available tools.
The training seeks to highlight best practices for using resources appropriately and privately according to needs. It also wants to spread awareness of security risks and teach mitigation techniques.
The training will provide direction on available options for support and interaction with users.
The document summarizes the objectives of a training program for users.
The objectives are to refresh and improve the skills and knowledge of users. It also aims to enable users to better perform their activities and take advantage of available tools.
The training seeks to highlight best practices for using resources appropriately and privately according to needs. It also wants to spread awareness of security risks and teach mitigation techniques.
The training will provide direction on available options for support and interaction with users.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
The document summarizes the objectives of a training program for users.
The objectives are to refresh and improve the skills and knowledge of users. It also aims to enable users to better perform their activities and take advantage of available tools.
The training seeks to highlight best practices for using resources appropriately and privately according to needs. It also wants to spread awareness of security risks and teach mitigation techniques.
The training will provide direction on available options for support and interaction with users.
Copyright:
Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 2
nLCLSluAuLS A8A LA ACAuLMlA (LSCuLLA uL lnCLLS)
SL 8LCulL8L 88lnuA8 lnlC8MAClCn 8LLlMlnA8 A LCS uSuA8lCS ln1L8LSAuCS Ln LA ACAuLMlA
SL 8LCulL8L uL LA CAn1luAu uL lLu!C LuMlnCSC AuLCuAuC ? CCn CAACluAu uL 8LCuLAClCn Ln lunClCn uL LAS AC1lvluAuLS LSLClllCAS A uLSA88CLLA8
SL 8LCulL8L lMA81l8 ? 1CMA8 LA LnSLRAnZA uL LAS MA1L8lAS A uL MAnL8A LLLC18CnlCA (MuL1lMLulA)C8AL ? LSC8l1A CCn 8lvACluAu ? CCMCuluAu AuLCuAuAS AuLMAS uL SLCu8luAu uL LCS MlSMCS
SL 8LvLL8A uL LA 8LnCvAClCn CCnS1An1L ? 8LCuLAuA uLL vCLuMLn uL Al8L A8A 88lnuA8 un C1lMC CCnlC81 A LCS uSuA8lCS
1CuCS LCS uSuA8lCS 8LCulL8Ln uL 8LC8LAClCn ? LSA8ClMlLn1C CCMC CCMLLMLn1C A SuS AC1lvluAuLS
SL uL8L8A ulSCnL8 uL Cl8CuLAClCnLS C1lMAS Ln 8LLAClCn AL nuML8C uL uSuA8lCS
SL 8LCulL8L uL LA 8LCuLA8lZAClCn C ulSMlnuClCn uL LA CCn1AMlnAClCn ACuS1lCA Lx1L8lC8ln1L8lC8