Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity: Implement Security Measures to Prevent Attack
Module 1: Getting Started
Lecture 1: Getting Started (0:55)
Module 2: Cybersecurity Fundamentals
Lecture 2: Cybersecurity Fundamentals (2:51)
Case Study (0:25)
Module 3: Types of Malware
Lecture 3: Types of Malware (2:48)
Case Study (0:28)
Module 4: Cyber Security Breaches
Lecture 4: Cybersecurity Breaches (4:13)
Case Study (0:32)
Module 5: Types of Cyber Attacks
Lecture 5: Types of Cyber Attacks (3:20)
Case Study (0:33)
Module 6: Prevention Tips
Lecture 6: Prevention Tips (3:25)
Case Study (0:37)
Module 7: Mobile Protection
Lecture 7: Mobile Protection (2:42)
Case Study (0:31)
Module 8: Social Network Security
Lecture 8: Social Network Security (3:05)
Case Study (0:37)
Module 9: Prevention Software
Lecture 9: Prevention Software (4:21)
Case Study (0:29)
Module 10: Critical Cyber Threats
Lecture 10: Critical Cyber Threats (5:34)
Case Study (0:26)
Module 11: Defense Against Hackers
Lecture 11: Defense Against Hackers (4:27)
Case Study (0:34)
Module 12: Wrapping Up
Lecture 12: Wrapping Up (1:16)
Evaluation
Final Test
Lecture 10: Critical Cyber Threats
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock