Introduction |
|
Course Overview |
|
00:02:00 |
|
IT Basics |
|
00:03:00 |
|
CIA Triad |
|
00:04:00 |
|
Breach Consequences |
|
00:02:00 |
Cyber Risks |
|
End User Risks |
|
00:02:00 |
|
Remote Access Risks |
|
00:02:00 |
Asset Security |
|
Information Classification |
|
00:03:00 |
|
Protecting Information |
|
00:03:00 |
|
Encryption and Access Control |
|
00:03:00 |
|
Patch Management |
|
00:03:00 |
Best Security Practices |
|
Security Practices – E-Mail and Internet |
|
00:04:00 |
|
Security Practices – Computer & Workstation |
|
00:05:00 |
|
Your Role in IT Security |
|
00:03:00 |
|
Comply with Laws and Regulations |
|
00:05:00 |
Course Test |
|
Course Test – Cyber Security Fundamentals |
|
00:15:00 |