Paths

Security Awareness for Business Professionals

Author: Jason Helmick

Cyber-criminals (hackers) will try many different methods to convince you to provide information that will help them steal money, data, and intellectual property from you and your... Read more

Path Courses

Cybercriminals (Hackers) will try many different methods to convince you to provide information that will help them steal money, data, and intellectual property from you and your company. Common everyday communication such as email, websites, and phone calls could potentially be a trick to lure you to exposing information or installing malicious software. In this series, you will learn how to protect your business and yourself by gaining knowledge of cyber-attacks. Learn to identify the attack and how to stop from falling victim. You will also learn how to be more proactive in avoiding these types of attacks and who to notify if one is detected.

Security Awareness: Basic Concepts and Terminology

by Jason Helmick

Jan 15, 2018 / 55m

55m

Start Course
Description

After a cyber attack report, you may not be sure what to do and you’re not exactly sure if your home or office is under attack or who to report it to. In this course, Security Awareness: Basic Concepts and Terminology, you'll learn how to protect your business and yourself from cyber attacks. First, you'll dive into an overview of cyber security terminology. Next, you'll explore the common types of attacks and defenses against them. Finally, you'll discover how to be proactive and avoid getting infected with malicious software or a malicious person. When you're finished with this course, you'll have the necessary skills and knowledge of cyber security needed to prevent a future attack.

Table of contents
  1. Course Overview1m
  2. Introduction to the Course4m
  3. Security: What Are You Protecting?6m
  4. Security: Who Is Helping to Protect?9m
  5. Attacks Defined: Threats, Exploits, and Risks19m
  6. Security: The Proactive Approach8m
  7. How to Report an Attack5m

Security Awareness: Phishing - How Hackers Get Your Secrets

by Jason Helmick

Jan 15, 2018 / 52m

52m

Start Course
Description

Hackers (cybercriminals) will try to lure you to exposing information or installing malicious software by clicking a link or opening an attachment. In this course, Security Awareness: Phishing - How Hackers Get Your Secrets, you'll learn how to protect your business and yourself from malicious attacks. First, you'll gain the knowledge of a specific attack known as phishing. Next, you'll discover how to identify the attack and how to stop from becoming a victim to cybercriminals. Finally, you will explore how to be more proactive in avoiding this type of attack and who to notify if one is detected. When you're finished with this course, you'll have the skills and knowledge of cyber security needed to protect yourself and your company from phishing attacks.

Table of contents
  1. Course Overview1m
  2. Phishing Is About Stealing Money4m
  3. Attacks That Get Personal6m
  4. Attacks at the Office 15m
  5. The Master Plan to Prevent Phishing Attacks 7m
  6. How to Report a Phishing Attack9m
  7. How to Report Phishing Attacks7m

Security Awareness: Malware at Work

by Jason Helmick

Jan 15, 2018 / 1h 13m

1h 13m

Start Course
Description

Cybercriminals are very good at hiding or bundling malicious software and luring you to download and install the software. In this course, Security Awareness: Malware at Work, you'll learn how to protect your business and yourself by gaining knowledge of malware attacks. First, you'll dive into identifying the attack and how to stop from becoming affected by these attacks. Next, you'll explore how to be more proactive in avoiding this type of attack. Finally, you'll discover how to identify who you should notify if a malware attack is detected. When you're finished with this course, you'll have the necessary skills and knowledge of security awareness needed to prevent malware attacks at home and at work.

Table of contents
  1. Course Overview1m
  2. Introduction4m
  3. Disable, Disruption, Collection, and Theft12m
  4. The All-encompassing Term: Malware21m
  5. The Master Plan to Prevent and Remove Malware12m
  6. Malware at the Office12m
  7. How to Report a Malware Incident8m

Security Awareness: Social Networking

by Jason Helmick

Jan 15, 2018 / 57m

57m

Start Course
Description

While social networking is a chance to share information about yourself and your family while staying connected with friends and coworkers, it also allows other people to learn about you, locate you, and know when you’re not in town. In this course, Security Awareness: Social Networking, you'll learn how to protect your business and yourself from these types of attacks. First, you'll explore how to identify social networking attacks. Next, you'll discover how to stop from falling victim when attacks occur. Finally, you'll master how to be more proactive in avoiding this type of attack. When you’re finished with this course, you'll have the skills and knowledge of security awareness needed to protect yourself in the world of social networking.

Table of contents
  1. Course Overview1m
  2. Introduction5m
  3. Social Networking and Its Value to the Office10m
  4. Social Networking Threats from Cybercriminals16m
  5. Social Networking Threats to You and Your Family9m
  6. Social Networking Threats to Your Company13m

Security Awareness: Mobile Devices

by Jason Helmick

Jan 15, 2018 / 57m

57m

Start Course
Description

The evolution of the cell phone offered us mobility with the ability to still communicate with family and with co-workers in the office. In this course, Security Awareness: Mobile Devices, you'll learn how to protect your business and yourself by gaining knowledge of mobile device attacks. First, you'll delve into how to identify those specific attacks. Next, you’ll explore how to stop from becoming a victim of these types of attacks. Finally, you'll discover how to be more proactive in avoiding a mobile device attack. When you’re finished with this course, you'll have the required skills and knowledge of security awareness needed to protect against mobile device attacks.

Table of contents
  1. Course Overview1m
  2. Introduction4m
  3. When You Just Carried Phones6m
  4. The Security Threats You Face15m
  5. Company Owned Mobile Device Security20m
  6. The Master Plan to Protect Mobile Devices8m

Security Awareness: Portable Data Protection and Destruction

by Jason Helmick

Jan 15, 2018 / 58m

58m

Start Course
Description

There are numerous pieces of information about you or your company that are confidential, and how you transport and protect your data plays a big role in its security. In this course, Security Awareness: Portable Data Protection and Destruction, you'll learn how to protect and destroy your portable data when necessary. First, you'll explore how to identify malicious attacks and how to stop from becoming a victim of those attacks. Next, you'll discover how to be more proactive in avoiding this type of attack. Finally, you'll delve into the safest ways to destroy your data when it's needed. When you're finished with this course, you'll have the required skills and knowledge of security awareness to both protect and destroy your portable data.

Table of contents
  1. Course Overview1m
  2. Introduction4m
  3. Dangers to Portable Data 22m
  4. Identifying Sensitive and Confidential Data10m
  5. Safely and Securely Storing Data on Portable Devices12m
  6. Safely and Securely Removing Data from a Device7m

Security Awareness: Identifying Personally Identifiable Information

by Jason Helmick

Jan 15, 2018 / 1h 2m

1h 2m

Start Course
Description

Personally identifiable information (PII) may be an infection from malware, data reconstruction from a lost or stolen device, or a phone call or email. In this course, Security Awareness: Identifying Personally Identifiable Information, you'll learn how to protect your PII from cybercriminals. First, you'll obtain the basic knowledge about malicious attacks. Next, you'll delve into identifying the attacks and how to stop from falling victim. Finally, you'll discover how to be more proactive in avoiding this type of attack. When you’re finished with this course, you'll have the necessary skills and knowledge to protect your personally identifiable information.

Table of contents
  1. Course Overview1m
  2. Introduction3m
  3. The Importance of Privacy15m
  4. Identifying What Is Private12m
  5. How This Information Can Be Leaked29m

Security Awareness: In Practice and Review

by Jason Helmick

Jan 15, 2018 / 1h 0m

1h 0m

Start Course
Description

Cyber attacks and the release of sensitive data are a daily reminder that the actions you take has an impact on you and your company’s security. In this course, Security Awareness: In Practice and Review, you'll solidify the skills to protect your data. First, you'll gain a deeper knowledge of malicious cyber attacks. Next, you'll discover how to identify different types of attacks and how to stop from falling victim to them. Finally, you'll explore how to be more proactive in avoiding this type of attack. When you're finished with this course, you'll have the skills and knowledge of security awareness to protect your personal security, as well as the security of your company.

Table of contents
  1. Course Overview1m
  2. Introduction4m
  3. Good Security Practices Will Protect You and Others 13m
  4. What You Should and Shouldn't Do32m
  5. Security Awareness8m

What you will learn

  • Increasing your awareness of the types of threats that you or your organization will face
  • Identifying ways to protect you and your organization
  • Ensuring your identity is safe and your accounts are secure
  • Building good practices at home and the office
  • How to inform and report when an attack has occurred
  • Preventing and removing malware
  • Storing, protecting, and removing data

Pre-requisites

There are no prerequisites required for this path.