About This Course
Who this course is for:
- Business Managers, Executives, and Professionals
- Critical Infrastructure Owners and Operators
- Ethical Hackers and Cyber Security Professionals
What you’ll learn:
- Types of security threats
- Social engineering
- Identity theft
- Data classification
- Protecting your digital information
- Security from end-to-end
- Security policies
- No prior knowledge is required to take this course
What is Security? To many, security is a belief that they are free from danger in the day-to-day activities they undertake. Many have described security as a warm fuzzy feeling. The goals of this course are for you to learn how to identify threats, not just digital but also the physical interaction we have with other people and technology. Being aware can help make sure you’re not the weakest link.
The Digital Security Awareness course will discuss the topics of the types of security threats, identity theft, data classification, protecting digital information, malware, end-to-end security, piracy, and security policies.
Security domains will be tackled including access control, telecommunications and network security, information security governance and risk management, software development security, cryptography, security architecture, design, operations security, business continuity, and disaster recovery planning, legal, regulations, investigations and compliance, and physical environmental security.
Our Promise to You
By the end of this course, you will have learned digital security awareness and how to protect yourself from risks.
30 Day Money Back Guarantee. If you are unsatisfied for any reason, simply contact us and we’ll give you a full refund. No questions asked.
Get started today and learn more about security awareness.
|Section 1 - Course Overview|
|Section 2 - Types Of Security Threats|
|Types Of Security Threats||00:00:00|
|Section 3 - Social Engineering|
|Section 4 - Identity Theft|
|Section 5 - Data Classification|
|Types Of Classification||00:00:00|
|Section 6 - Protecting Your Digital Information|
|Protecting Your Digital Information||00:00:00|
|Demo – Backups||00:00:00|
|Demo – Password Management||00:00:00|
|Section 7 - Malware|
|Demo – Knowing Your Extensions||00:00:00|
|Section 8 - Security From End-To-End|
|Security From End-To-End||00:00:00|
|Demo – Encrypting File System||00:00:00|
|Secure E-mail Use||00:00:00|
|Secure Web Browsing||00:00:00|
|Demo – Secure Web Browsing||00:00:00|
|Section 9 - Piracy|
|Section 10 - Security Policies|
|Section 11 - Moving Forward|