Cyber Security Awareness

Cyber Security Awareness

Dostępne w sprzedaży
Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidents can ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
20191 sezon
DLA WSZYSTKICH
8 odcinków
  • 1. Course Overview

    1. Course Overview

    Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidentscan ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
    Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidentscan ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
    DLA WSZYSTKICH
    4 min
    1 kwi 2019
  • 2. Why should you care about Cybersecurity?

    2. Why should you care about Cybersecurity?

    The modern life we are living is unthinkable without being connected to the internet. The potential financial costs of a data breach are immense and the company's reputation is at risk. Being connected and using the internet so extensively puts us at risk of being hacked. Risks range from financial costs, to loss of intellectual property and career damage.
    The modern life we are living is unthinkable without being connected to the internet. The potential financial costs of a data breach are immense and the company's reputation is at risk. Being connected and using the internet so extensively puts us at risk of being hacked. Risks range from financial costs, to loss of intellectual property and career damage.
    DLA WSZYSTKICH
    4 min
    1 kwi 2019
  • 3. What is "Social Engineering" and why does it matter to me?

    3. What is "Social Engineering" and why does it matter to me?

    Social Engineering refers to psychological manipulation of people into performing actions or divulging confidential information. Nearly all users get at least one phishing mail a day trying to trick them into installing malicious software or leavinga username and password on a suspicious site. You can protect yourself, and your company's data, when you know how to identify phishing emails.
    Social Engineering refers to psychological manipulation of people into performing actions or divulging confidential information. Nearly all users get at least one phishing mail a day trying to trick them into installing malicious software or leavinga username and password on a suspicious site. You can protect yourself, and your company's data, when you know how to identify phishing emails.
    DLA WSZYSTKICH
    15 min
    1 kwi 2019
  • 4. Malware - what is it and what can it do?

    4. Malware - what is it and what can it do?

    Malware is short for "malicious software". Malware includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. These programs can cause your device to crash, can be used to monitor and control your online activity, encrypt your data until you pay a ransom and much more.
    Malware is short for "malicious software". Malware includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. These programs can cause your device to crash, can be used to monitor and control your online activity, encrypt your data until you pay a ransom and much more.
    DLA WSZYSTKICH
    16 min
    1 kwi 2019
  • 5. Password Management

    5. Password Management

    Despite hacks and data breaches becoming commonplace, it seems most people are still picking a password based on convenience rather than security. Nearly all of us are guilty of not using strong passwords, and no wonder - how to remember them all without writing them down?
    Despite hacks and data breaches becoming commonplace, it seems most people are still picking a password based on convenience rather than security. Nearly all of us are guilty of not using strong passwords, and no wonder - how to remember them all without writing them down?
    DLA WSZYSTKICH
    14 min
    1 kwi 2019
  • 6. Use the Internet securely

    6. Use the Internet securely

    Browsers are the main gateway for Internet traffic. This is why many malware programs and cybercriminals in general target browsers first. It's so easy to work while traveling or outside the office. Public Wi-Fi access is practically everywhere, but it also causes serious security challenges you need to be able to handle.
    Browsers are the main gateway for Internet traffic. This is why many malware programs and cybercriminals in general target browsers first. It's so easy to work while traveling or outside the office. Public Wi-Fi access is practically everywhere, but it also causes serious security challenges you need to be able to handle.
    DLA WSZYSTKICH
    10 min
    1 kwi 2019
  • 7. Maintain Physical Security

    7. Maintain Physical Security

    Learn how to protect yourself and your organization's data from threats that arise from loss, theft and espionage.
    Learn how to protect yourself and your organization's data from threats that arise from loss, theft and espionage.
    DLA WSZYSTKICH
    4 min
    1 kwi 2019
  • 8. Moving forward

    8. Moving forward

    Security technology is a race between the good guys and the bad guys. Even after this training and applying what's learned, don't think that your work is done and your responsibility ends!
    Security technology is a race between the good guys and the bad guys. Even after this training and applying what's learned, don't think that your work is done and your responsibility ends!
    DLA WSZYSTKICH
    2 min
    1 kwi 2019
  • Cyber Security Awareness
    20191 sezon
    Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidents can ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
    Twórcy i obsada
    Producenci
    Jörn Oelze
    Obsada
    Alexander Armster-Wikoff
    Wytwórnia filmowa
    Sonic Performance Support GmbH
    Recenzje
    4.0 out of 5 stars

    Jedna ocena klientów z całego świata

    1. 5 star
      0%
    2. 4 star
      100%
    3. 3 star
      0%
    4. 2 star
      0%
    5. 1 star
      0%
    Języki dźwięku
    English
    Napisy
    English [CC]
    Zamawiając lub oglądając, akceptujesz nasze Warunki. Usługa sprzedawana przez firmę Amazon.com Services LLC.

    Opinie