Identify training needs.

Identification should include

  • login steps
  • FTP
  • print operations
  • systems and information use
  • steps to secure data and access data backups
  • security awareness.