Cybersecurity Awareness - Electronic Commerce Security

Hours: 1 / Access Length: 180 Days / Delivery: Online, Self-Paced
Retail Price: $129.00

Course Overview:

This course will be deactivated on December 4th, 2020.  No further enrollments will be allowed into this course.

The course will cover the different types of electronic commerce, and the associated risks.  The students will learn how to interact with electronic commerce sites securely, how to secure electronic commerce sites, and have a better understanding of how they connect with business-to-business transactions, business-to-consumer transactions, consumer-to-consumer transactions, and how to secure those transactions. This courses is intended for all employees that engage in personal or professional e-commerce transactions. 

Instructor Biography:

Bob started with the Department of the Interior’s (DOI) National Business Center (NBC) in October 2007.  One of his primary responsibilities was serving as Financial Management Directorate’s (FMDs) subject matter expert (SME) on all security related issues.   Because of his experience, on two separate occasions Bob was called upon and served as the Chief Information Security Officer (CISO) for the National Business Center (NBC). Prior to joining the NBC, Bob worked for 18 years at the U.S. Army Space and Missile Defense Command / Army Forces Strategic Command where Bob served in various capacities to include the Deputy Chief of Staff for Information Management, and as the Senior Information Assurance Manager (SIAM).  One of Bob’s major career accomplishments was serving in the joint missile defense community on the team that stood up the US Ballistic Missile Defense (BMD) network.

Course Outline:

Lesson 1: Overview                           
  • What is electronic commerce?
  • Advantages of electronic commerce.
  • Types of electronic commerce.
Lesson 2: Securing Electronic Commerce Connections                        
  • Business-to-Business 
  • Business-to Consumer Unsecure 
  • Public Key Cryptography 
  • Business-to Consumer Secure 
Lesson 3: Mitigation Controls                        
  • Data-at-Rest Encryption
  • Compliance Laws
  • Electronic Commerce Transaction Examples

Lesson 4: Conclusion                         

  • Next steps

System Requirements:

System Requirements:

Internet Connectivity Requirements:
  • Cable and DSL internet connections are recommended for the best experience.
Hardware Requirements:
  • CPU: 1 GHz or higher
  • RAM: 2 GB or higher
  • Resolution: 1280 x 720 or higher
  • Speakers / Headphones
  • Microphone (Webinar / Live Online sessions)
Operating System Requirements:
  • Microsoft Windows 7 or 10 (Home, Pro)
  • Mac OSX 10 or higher.
  • Latest Chrome OS
  • Latest Linux Distributions

NOTE: While we understand that our courses can be viewed on Android and iPhone devices, we do not recommend the use of these devices for our courses. The size of these devices do not provide a good learning environment for students taking online or live online based courses.

Web Browser Requirements:
  • Latest Google Chrome is recommended for the best experience.
  • Latest Mozilla FireFox
  • Latest Microsoft Edge
  • Latest Apple Safari
Basic Software Requirements (These are recommendations of software to use):
  • Office suite software (Microsoft Office, OpenOffice, or LibreOffice)
  • PDF reader program (Adobe Reader, FoxIt)
  • Courses may require other software that is denoted in the above course outline.

** The course outlines displayed on this website are subject to change at any time without prior notice. **