Cyber Security Awareness

Cyber Security Awareness

Disponível para comprar
Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidents can ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
20191 temporada
TODOS
8 episódios
  • 1. Course Overview

    1. Course Overview

    Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidentscan ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
    Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidentscan ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
    TODOS
    4 min
    1/04/2019
  • 2. Why should you care about Cybersecurity?

    2. Why should you care about Cybersecurity?

    The modern life we are living is unthinkable without being connected to the internet. The potential financial costs of a data breach are immense and the company's reputation is at risk. Being connected and using the internet so extensively puts us at risk of being hacked. Risks range from financial costs, to loss of intellectual property and career damage.
    The modern life we are living is unthinkable without being connected to the internet. The potential financial costs of a data breach are immense and the company's reputation is at risk. Being connected and using the internet so extensively puts us at risk of being hacked. Risks range from financial costs, to loss of intellectual property and career damage.
    TODOS
    4 min
    1/04/2019
  • 3. What is "Social Engineering" and why does it matter to me?

    3. What is "Social Engineering" and why does it matter to me?

    Social Engineering refers to psychological manipulation of people into performing actions or divulging confidential information. Nearly all users get at least one phishing mail a day trying to trick them into installing malicious software or leavinga username and password on a suspicious site. You can protect yourself, and your company's data, when you know how to identify phishing emails.
    Social Engineering refers to psychological manipulation of people into performing actions or divulging confidential information. Nearly all users get at least one phishing mail a day trying to trick them into installing malicious software or leavinga username and password on a suspicious site. You can protect yourself, and your company's data, when you know how to identify phishing emails.
    TODOS
    15 min
    1/04/2019
  • 4. Malware - what is it and what can it do?

    4. Malware - what is it and what can it do?

    Malware is short for "malicious software". Malware includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. These programs can cause your device to crash, can be used to monitor and control your online activity, encrypt your data until you pay a ransom and much more.
    Malware is short for "malicious software". Malware includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. These programs can cause your device to crash, can be used to monitor and control your online activity, encrypt your data until you pay a ransom and much more.
    TODOS
    16 min
    1/04/2019
  • 5. Password Management

    5. Password Management

    Despite hacks and data breaches becoming commonplace, it seems most people are still picking a password based on convenience rather than security. Nearly all of us are guilty of not using strong passwords, and no wonder - how to remember them all without writing them down?
    Despite hacks and data breaches becoming commonplace, it seems most people are still picking a password based on convenience rather than security. Nearly all of us are guilty of not using strong passwords, and no wonder - how to remember them all without writing them down?
    TODOS
    14 min
    1/04/2019
  • 6. Use the Internet securely

    6. Use the Internet securely

    Browsers are the main gateway for Internet traffic. This is why many malware programs and cybercriminals in general target browsers first. It's so easy to work while traveling or outside the office. Public Wi-Fi access is practically everywhere, but it also causes serious security challenges you need to be able to handle.
    Browsers are the main gateway for Internet traffic. This is why many malware programs and cybercriminals in general target browsers first. It's so easy to work while traveling or outside the office. Public Wi-Fi access is practically everywhere, but it also causes serious security challenges you need to be able to handle.
    TODOS
    10 min
    1/04/2019
  • 7. Maintain Physical Security

    7. Maintain Physical Security

    Learn how to protect yourself and your organization's data from threats that arise from loss, theft and espionage.
    Learn how to protect yourself and your organization's data from threats that arise from loss, theft and espionage.
    TODOS
    4 min
    1/04/2019
  • 8. Moving forward

    8. Moving forward

    Security technology is a race between the good guys and the bad guys. Even after this training and applying what's learned, don't think that your work is done and your responsibility ends!
    Security technology is a race between the good guys and the bad guys. Even after this training and applying what's learned, don't think that your work is done and your responsibility ends!
    TODOS
    2 min
    1/04/2019
  • Cyber Security Awareness
    20191 temporada
    Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidents can ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
    Criadores e elenco
    Produção
    Jörn Oelze
    Elenco
    Alexander Armster-Wikoff
    Estúdio
    Sonic Performance Support GmbH
    Avaliações
    4.0 out of 5 stars

    Uma classificação global

    1. 5 star
      0%
    2. 4 star
      100%
    3. 3 star
      0%
    4. 2 star
      0%
    5. 1 star
      0%
    Ler todas as avaliações
    Idiomas do áudio
    English
    Legendas
    English [CC]
    Ao fazer um pedido ou ver, aceita os nossos Termos. Vendido pela Amazon.com Services LLC.

    Comentários