Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Digital Security Awareness Training
Course Introduction
Course Introduction (1:22)
Instructor Introduction (1:34)
Module 00 - Course Overview
Course Overview (0:13)
What is Security Awareness? (0:22)
Security Domains (3:37)
What is Security? (1:34)
Are You at Risk? (2:18)
So What About You? (1:10)
What are the Goals of this Course? (0:34)
What Will We Cover? (0:47)
Surprise! (1:29)
Is it Too Late? (0:44)
Module Review (0:30)
Review Questions: Module 00 – Course Overview
Module 01 - Types of Security Threats
Types of Security Threats (2:21)
Your Computer (3:25)
Your Internet (5:35)
Yourself (3:53)
Your Words (3:00)
Your E-mail (2:53)
Your Home (2:20)
Your Files (4:27)
Module Review (0:40)
Review Questions: Module 01 – Types of Security Threats
Module 02 - Social Engineering
Social Engineering (0:05)
What is Social Engineering? (10:27)
Social Engineering Defense (3:30)
Manipulation (5:37)
Why Does it Work? (2:03)
Fooling People (2:17)
What Else Can Be Done? (3:12)
Personal Precautions (2:19)
Module Review (0:32)
Review Questions: Module 02 – Social Engineering
Module 03 - Identity Theft
Identity Theft (0:30)
What is Identity Theft? Part1 (1:42)
What is Identity Theft? Part2 (0:59)
How Does it Happen? Part1 (2:57)
How Does it Happen? Part2 (2:51)
How to Defend Yourself Part1 (3:03)
How to Defend Yourself Part2 (2:30)
How to Defend Yourself Part3 (4:03)
What Criminals Do with Your Information Part1 (0:38)
What Criminals Do with Your Information Part2 (1:51)
What Criminals Do with Your Information Part3 (1:17)
What Criminals Do with Your Information Part4 (1:09)
How Can You Tell if You’re a Victim? (0:39)
Actions to Take if You are a Victim (1:24)
Contact Information Part1 (1:46)
Contact Information Part2 (0:38)
Module Review (0:30)
Review Questions: Module 03 – Identity Theft
Module 04 - Data Classification
Data Classification (0:48)
Policies for Data Sharing (4:31)
Least Privilege (5:29)
How to Classify Part1 (1:35)
How to Classify Part2 (3:31)
How to Classify Part3 (1:36)
How to Classify Part4 (1:15)
How to Classify Part5 (2:45)
How to Classify Part6 (1:20)
How to Classify Part7 (4:59)
Types of Classifications (1:01)
Jurisdictional Issues (1:19)
Your Involvement (1:49)
What Could Happen? (1:54)
What Type of Policies? (4:44)
How to Destroy Data Part1 (2:56)
How to Destroy Data Part2 (3:22)
Module Review (0:49)
Review Questions: Module 04 – Data Classification
Module 05 - Protecting Your Digital Information
Protecting Your Digital Information (0:43)
Why Do a Backup? (1:30)
Types of Backups (5:24)
What to Backup Part1 (2:07)
What to Backup Part2 (2:18)
What to Backup Part3 (2:27)
Where to Store Backups Part1 (2:07)
Where to Store Backups Part2 (2:26)
How to Perform Backups (2:21)
Demo - Backups (4:24)
Backup Utilities Part1 (3:56)
Backup Utilities Part2 (1:36)
Backup Management Practices (3:21)
Passwords (4:51)
Demo - Password Management (5:23)
Password Management Part1 (4:49)
Password Management Part2 (1:56)
Password Management Part3 (1:12)
Password Management Part4 (1:30)
AAA (3:09)
Module Review (0:44)
Review Questions: Module 05 – Protecting Your Digital Information
Module 06 - Malware
Malware (0:35)
Basic Definitions (7:04)
What to Look For (1:36)
How You Can Get Infected Part1 (4:05)
How You Can Get Infected Part2 (3:42)
Software Detection (8:32)
Hardware Detection (2:16)
Cloud Detection (3:33)
Know the Extensions (3:23)
Demo - Knowing Your Extensions (6:37)
Your Defenses (2:49)
Module Review (0:31)
Review Questions: Module 06 – Malware
Module 07 - Security from End -to -End
Security from End -to -End (1:11)
Physical Security Part1 (5:31)
Physical Security Part1 (2:36)
Home/Workstation Security Part1 (1:51)
Home/Workstation Security Part2 (2:04)
Encryption (1:24)
Demo - EFS (2:21)
Hand Held Electronics (2:05)
Workstation Software (1:13)
Updating the OS and Software (3:25)
Secure E -mail Use Part1 (2:25)
Secure E -mail Use Part2 (1:31)
E -mail Encryption Part1 (0:53)
E -mail Encryption Part2 (3:46)
E -mail Hazards (1:46)
How to Stop SPAM (1:37)
E-mail Attachments (2:34)
Other E -mail Warnings (2:16)
What if You Get Malware from E -mail? (1:58)
How to Avoid SPAM (2:24)
Secure Web Browsing Part1 (6:46)
Secure Web Browsing Part2 (1:43)
Secure Web Browsing Part3 (1:26)
Secure Web Browsing Part4 (4:07)
Demo - Secure Web Browsing (12:06)
Secure Instant Messaging / Social Sites (2:24)
Module Review (0:36)
Review Questions: Module 07 – Security from End-to-End
Module 08 - Piracy
Piracy (0:19)
What is Intellectual Property (1:30)
Copyrights (1:19)
Software Piracy Part1 (4:29)
Software Piracy Part2 (2:09)
Types of Piracy Part1 (1:41)
Types of Piracy Part2 (0:55)
Risks Part1 (1:52)
Risks Part2 (1:12)
Module Review (0:25)
Review Questions: Module 08 – Piracy
Module 09 - Security Policies
Security Policies (0:31)
Security Policies Part2 (2:42)
Security Policies Part3 (4:33)
Why are Policies Important Part1 (1:41)
Why are Policies Important Part2 (1:15)
Defining an Incident (1:46)
Response Teams Part1 (0:51)
Response Teams Part2 (2:02)
Response Checklist Part1 (0:24)
Response Checklist Part2 (1:03)
Module Review (0:44)
Review Questions: Module 09 – Security Policies
Module 10 - Moving Forward
Moving Forward (0:24)
Education and Awareness Part1 (2:32)
Education and Awareness Part2 (1:41)
Individuals (1:45)
Organizations (0:52)
Know the Principles of Security Domains (1:26)
Module Review (0:43)
Review Questions: Module 10 – Moving Forward
Course Closure (2:48)
Review Questions: Module 10 – Moving Forward
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock