
8 episodes
1. Course Overview

1. Course Overview
Most attacks do not start as a technically sophisticated attack. The most successful data breaches and cyber incidentscan ultimately be traced back to human error or carelessness. You need to educate yourself to enjoy the benefits of modern life, be part of the modern workforce, and protect yourself and your employer from serious loss.
2. Why should you care about Cybersecurity?

2. Why should you care about Cybersecurity?
The modern life we are living is unthinkable without being connected to the internet. The potential financial costs of a data breach are immense and the company's reputation is at risk. Being connected and using the internet so extensively puts us at risk of being hacked. Risks range from financial costs, to loss of intellectual property and career damage.
3. What is "Social Engineering" and why does it matter to me?

3. What is "Social Engineering" and why does it matter to me?
Social Engineering refers to psychological manipulation of people into performing actions or divulging confidential information. Nearly all users get at least one phishing mail a day trying to trick them into installing malicious software or leavinga username and password on a suspicious site. You can protect yourself, and your company's data, when you know how to identify phishing emails.
4. Malware - what is it and what can it do?

4. Malware - what is it and what can it do?
Malware is short for "malicious software". Malware includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent. These programs can cause your device to crash, can be used to monitor and control your online activity, encrypt your data until you pay a ransom and much more.
5. Password Management

5. Password Management
Despite hacks and data breaches becoming commonplace, it seems most people are still picking a password based on convenience rather than security. Nearly all of us are guilty of not using strong passwords, and no wonder - how to remember them all without writing them down?
6. Use the Internet securely

6. Use the Internet securely
Browsers are the main gateway for Internet traffic. This is why many malware programs and cybercriminals in general target browsers first. It's so easy to work while traveling or outside the office. Public Wi-Fi access is practically everywhere, but it also causes serious security challenges you need to be able to handle.
7. Maintain Physical Security

7. Maintain Physical Security
Learn how to protect yourself and your organization's data from threats that arise from loss, theft and espionage.
8. Moving forward

8. Moving forward
Security technology is a race between the good guys and the bad guys. Even after this training and applying what's learned, don't think that your work is done and your responsibility ends!
Cyber Security Awareness
20191 season
Creators and Cast
- Producers
- Cast
- Studio
Audio languages
Subtitles
By ordering or viewing, you agree to our Terms. Sold by Amazon.com Services LLC.












