Digital Security Awareness
This course is designed for those interested to learn the basics of digital security, learn how to identify threats, not just digital but also the physical interaction with other people and technology.
About This CourseBeginner
What is Security? To many, security is a belief that they are free from danger in the day-to-day activities they undertake. Many have described security as a warm fuzzy feeling. The goals of this course are for you to learn how to identify threats, not just digital but also the physical interaction we have with other people and technology. Being aware can help make sure you’re not the weakest link.
The Digital Security Awareness course will discuss the topics of the types of security threats, identity theft, data classification, protecting digital information, malware, end to end security, piracy, and security policies.
Security domains will be tackled including access control, telecommunications and network security, information security governance and risk management, software development security, cryptography, security architecture, design, operations security, business continuity, and disaster recovery planning, legal, regulations, investigations and compliance, and physical environmental security.
Our Promise to You
By the end of this course, you will have learned digital security awareness and how to protect yourself from the risks.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about the digital security awareness.
Section 1 - Course Overview
Section 2 - Types Of Security Threats
Types Of Security Threats
Section 3 - Social Engineering
Section 4 - Identity Theft
Section 5 - Data Classification
Types Of Classification
Section 6 - Protecting Your Digital Information
Protecting Your Digital Information
Demo – Backups
Demo – Password Management
Section 7 - Malware
Demo – Knowing Your Extensions
Section 8 - Security From End-To-End
Security From End-To-End
Demo – Encrypting File System
Secure E-mail Use
Secure Web Browsing
Demo – Secure Web Browsing
Section 9 - Piracy
Section 10 - Security Policies
Section 11 - Moving Forward
No Reviews found for this course.