Cyber Security Awareness

Cyber Security Awareness

Disponible para comprar
Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidents can ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
20191 temporada
TODOS
8 episodios
  • 1. Course Overview

    1. Course Overview

    Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidentscan ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
    Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidentscan ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
    TODOS
    4 min
    1 abr 2019
  • 2. Why should you care about Cybersecurity?

    2. Why should you care about Cybersecurity?

    The modern life we are living is unthinkable without being connected to the internet. The potential financial costs of a data breach are immense and the company's reputation is at risk. Being connected and using the internet so extensively puts us at risk of being hacked. Risks range from financial costs, to loss of intellectual property and career damage.
    The modern life we are living is unthinkable without being connected to the internet. The potential financial costs of a data breach are immense and the company's reputation is at risk. Being connected and using the internet so extensively puts us at risk of being hacked. Risks range from financial costs, to loss of intellectual property and career damage.
    TODOS
    4 min
    1 abr 2019
  • 3. What is "Social Engineering" and why does it matter to me?

    3. What is "Social Engineering" and why does it matter to me?

    Social Engineering refers to psychological manipulation of people into performing actions or divulging confidential information. Nearly all users get at least one phishing mail a day trying to trick them into installing malicious software or leavinga username and password on a suspicious site. You can protect yourself, and your company's data, when you know how to identify phishing emails.
    Social Engineering refers to psychological manipulation of people into performing actions or divulging confidential information. Nearly all users get at least one phishing mail a day trying to trick them into installing malicious software or leavinga username and password on a suspicious site. You can protect yourself, and your company's data, when you know how to identify phishing emails.
    TODOS
    15 min
    1 abr 2019
  • 4. Malware - what is it and what can it do?

    4. Malware - what is it and what can it do?

    Malware is short for "malicious software". Malware includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. These programs can cause your device to crash, can be used to monitor and control your online activity, encrypt your data until you pay a ransom and much more.
    Malware is short for "malicious software". Malware includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. These programs can cause your device to crash, can be used to monitor and control your online activity, encrypt your data until you pay a ransom and much more.
    TODOS
    16 min
    1 abr 2019
  • 5. Password Management

    5. Password Management

    Despite hacks and data breaches becoming commonplace, it seems most people are still picking a password based on convenience rather than security. Nearly all of us are guilty of not using strong passwords, and no wonder - how to remember them all without writing them down?
    Despite hacks and data breaches becoming commonplace, it seems most people are still picking a password based on convenience rather than security. Nearly all of us are guilty of not using strong passwords, and no wonder - how to remember them all without writing them down?
    TODOS
    14 min
    1 abr 2019
  • 6. Use the Internet securely

    6. Use the Internet securely

    Browsers are the main gateway for Internet traffic. This is why many malware programs and cybercriminals in general target browsers first. It's so easy to work while traveling or outside the office. Public Wi-Fi access is practically everywhere, but it also causes serious security challenges you need to be able to handle.
    Browsers are the main gateway for Internet traffic. This is why many malware programs and cybercriminals in general target browsers first. It's so easy to work while traveling or outside the office. Public Wi-Fi access is practically everywhere, but it also causes serious security challenges you need to be able to handle.
    TODOS
    10 min
    1 abr 2019
  • 7. Maintain Physical Security

    7. Maintain Physical Security

    Learn how to protect yourself and your organization's data from threats that arise from loss, theft and espionage.
    Learn how to protect yourself and your organization's data from threats that arise from loss, theft and espionage.
    TODOS
    4 min
    1 abr 2019
  • 8. Moving forward

    8. Moving forward

    Security technology is a race between the good guys and the bad guys. Even after this training and applying what's learned, don't think that your work is done and your responsibility ends!
    Security technology is a race between the good guys and the bad guys. Even after this training and applying what's learned, don't think that your work is done and your responsibility ends!
    TODOS
    2 min
    1 abr 2019
  • Cyber Security Awareness
    20191 temporada
    Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidents can ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
    Creadores y reparto
    Productores
    Jörn Oelze
    Reparto
    Alexander Armster-Wikoff
    Estudio
    Sonic Performance Support GmbH
    Comentarios
    4.0 out of 5 stars

    Una calificación global

    1. 5 star
      0%
    2. 4 star
      100%
    3. 3 star
      0%
    4. 2 star
      0%
    5. 1 star
      0%
    Ver todas las reseñas
    Idiomas de audio
    English
    Subtítulos
    English [CC]
    Al hacer un pedido o ver contenido, aceptas nuestros Términos. Vendido por Amazon por Amazon.com Services LLC.

    Comentarios