Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity Awareness Essentials: Protect Your Digital Realm
Section 1: Introduction to Cybersecurity
Course Introduction (2:24)
Cyber Security Introduction (0:46)
What is Cyber Security and the CIA Triad (3:32)
Threat Actors: Who are They? (2:02)
Types of Threat Actors (2:13)
Motivations of Threat Actors (2:45)
Methodologies Employed by Threat Actors (9:53)
Section 2: Secure Networking
Network Security Introduction (0:45)
Introduction to Wired and Wireless Networks (5:51)
Wired Network Vulnerabilities and How to Protect Wired Networks (6:31)
Wireless Network Vulnerabilities and How to Protect Wireless Networks (6:25)
Section 3: Secure E-Mail
E-Mail Security Introduction (0:37)
E-Mail: Overview and Importance (1:10)
Phishing: Techniques, Implications and How to Spot (8:31)
Understanding E-Mail Headers for Verification (5:20)
Section 4: Secure Internet Browsing
Internet Security Introduction (0:46)
Exploring Web-Based Threats (7:43)
Typo Squatting: Risks and Mitigation (2:30)
Watering Hole Attacks: Tactics and Countermeasures (1:23)
Secure Browsing Best Practices (20:42)
Section 5: Device Security & Password Management
Device Security Introduction (0:55)
Securing Computers, Laptops, and Mobile Devices (1:38)
Password Best Practices (4:47)
Multi-Factor Authentication (MFA) (1:45)
Keeping Devices Up-to-Date (7:42)
Best Practices for Protecting Devices from Cyber Attacks (8:48)
Course Conclusion (0:42)
Course Quiz and Certificate of Completion
Course Quiz and Certificate of Completion
E-Mail: Overview and Importance
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock