Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity Awareness Essentials: Protect Your Digital Realm
Section 1: Introduction to Cybersecurity
Course Introduction (2:24)
Cyber Security Introduction (0:46)
What is Cyber Security and the CIA Triad (3:32)
Threat Actors: Who are They? (2:02)
Types of Threat Actors (2:13)
Motivations of Threat Actors (2:45)
Methodologies Employed by Threat Actors (9:53)
Section 2: Secure Networking
Network Security Introduction (0:45)
Introduction to Wired and Wireless Networks (5:51)
Wired Network Vulnerabilities and How to Protect Wired Networks (6:31)
Wireless Network Vulnerabilities and How to Protect Wireless Networks (6:25)
Section 3: Secure E-Mail
E-Mail Security Introduction (0:37)
E-Mail: Overview and Importance (1:10)
Phishing: Techniques, Implications and How to Spot (8:31)
Understanding E-Mail Headers for Verification (5:20)
Section 4: Secure Internet Browsing
Internet Security Introduction (0:46)
Exploring Web-Based Threats (7:43)
Typo Squatting: Risks and Mitigation (2:30)
Watering Hole Attacks: Tactics and Countermeasures (1:23)
Secure Browsing Best Practices (20:42)
Section 5: Device Security & Password Management
Device Security Introduction (0:55)
Securing Computers, Laptops, and Mobile Devices (1:38)
Password Best Practices (4:47)
Multi-Factor Authentication (MFA) (1:45)
Keeping Devices Up-to-Date (7:42)
Best Practices for Protecting Devices from Cyber Attacks (8:48)
Course Conclusion (0:42)
Course Quiz and Certificate of Completion
Course Quiz and Certificate of Completion
Wireless Network Vulnerabilities and How to Protect Wireless Networks
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock