Cyber Security Awareness

Cyber Security Awareness

Available to buy
Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidents can ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
20191 season
ALL
8 episodes
  • 1. Course Overview

    1. Course Overview

    Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidentscan ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
    Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidentscan ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
    ALL
    4min
    Apr 1, 2019
  • 2. Why should you care about Cybersecurity?

    2. Why should you care about Cybersecurity?

    The modern life we are living is unthinkable without being connected to the internet. The potential financial costs of a data breach are immense and the company's reputation is at risk. Being connected and using the internet so extensively puts us at risk of being hacked. Risks range from financial costs, to loss of intellectual property and career damage.
    The modern life we are living is unthinkable without being connected to the internet. The potential financial costs of a data breach are immense and the company's reputation is at risk. Being connected and using the internet so extensively puts us at risk of being hacked. Risks range from financial costs, to loss of intellectual property and career damage.
    ALL
    4min
    Apr 1, 2019
  • 3. What is "Social Engineering" and why does it matter to me?

    3. What is "Social Engineering" and why does it matter to me?

    Social Engineering refers to psychological manipulation of people into performing actions or divulging confidential information. Nearly all users get at least one phishing mail a day trying to trick them into installing malicious software or leavinga username and password on a suspicious site. You can protect yourself, and your company's data, when you know how to identify phishing emails.
    Social Engineering refers to psychological manipulation of people into performing actions or divulging confidential information. Nearly all users get at least one phishing mail a day trying to trick them into installing malicious software or leavinga username and password on a suspicious site. You can protect yourself, and your company's data, when you know how to identify phishing emails.
    ALL
    15min
    Apr 1, 2019
  • 4. Malware - what is it and what can it do?

    4. Malware - what is it and what can it do?

    Malware is short for "malicious software". Malware includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. These programs can cause your device to crash, can be used to monitor and control your online activity, encrypt your data until you pay a ransom and much more.
    Malware is short for "malicious software". Malware includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. These programs can cause your device to crash, can be used to monitor and control your online activity, encrypt your data until you pay a ransom and much more.
    ALL
    16min
    Apr 1, 2019
  • 5. Password Management

    5. Password Management

    Despite hacks and data breaches becoming commonplace, it seems most people are still picking a password based on convenience rather than security. Nearly all of us are guilty of not using strong passwords, and no wonder - how to remember them all without writing them down?
    Despite hacks and data breaches becoming commonplace, it seems most people are still picking a password based on convenience rather than security. Nearly all of us are guilty of not using strong passwords, and no wonder - how to remember them all without writing them down?
    ALL
    14min
    Apr 1, 2019
  • 6. Use the Internet securely

    6. Use the Internet securely

    Browsers are the main gateway for Internet traffic. This is why many malware programs and cybercriminals in general target browsers first. It's so easy to work while traveling or outside the office. Public Wi-Fi access is practically everywhere, but it also causes serious security challenges you need to be able to handle.
    Browsers are the main gateway for Internet traffic. This is why many malware programs and cybercriminals in general target browsers first. It's so easy to work while traveling or outside the office. Public Wi-Fi access is practically everywhere, but it also causes serious security challenges you need to be able to handle.
    ALL
    10min
    Apr 1, 2019
  • 7. Maintain Physical Security

    7. Maintain Physical Security

    Learn how to protect yourself and your organization's data from threats that arise from loss, theft and espionage.
    Learn how to protect yourself and your organization's data from threats that arise from loss, theft and espionage.
    ALL
    4min
    Apr 1, 2019
  • 8. Moving forward

    8. Moving forward

    Security technology is a race between the good guys and the bad guys. Even after this training and applying what's learned, don't think that your work is done and your responsibility ends!
    Security technology is a race between the good guys and the bad guys. Even after this training and applying what's learned, don't think that your work is done and your responsibility ends!
    ALL
    2min
    Apr 1, 2019
  • Cyber Security Awareness
    20191 season
    Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidents can ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
    Creators and Cast
    Producers
    Jörn Oelze
    Cast
    Alexander Armster-Wikoff
    Studio
    Sonic Performance Support GmbH
    Reviews
    4.0 out of 5 stars

    One global rating

    1. 5 star
      0%
    2. 4 star
      100%
    3. 3 star
      0%
    4. 2 star
      0%
    5. 1 star
      0%
    Read all reviews
    Audio languages
    English
    Subtitles
    English [CC]
    By ordering or viewing, you agree to our Terms. Sold by Amazon.com Services LLC.

    Feedback

    Support