Cyber Security Fundamentals |
|
Security Essentials – Course Overview |
|
00:02:00 |
|
IT Security Basics |
|
00:03:00 |
|
The CIA Security Triad |
|
00:04:00 |
Cyber Threats |
|
End User Security Risks |
|
00:02:00 |
|
E-Mail Phishing Scenario |
|
00:03:00 |
|
Malware Types |
|
00:06:00 |
|
Cyber Breach Consequences |
|
00:04:00 |
Security Best Practices |
|
Computer Security Best Practices |
|
00:05:00 |
|
E-Mail and Internet Security Best Practices |
|
00:04:00 |
Remote Access Security |
|
Remote Access Risks Scenario |
|
00:02:00 |
|
Remote Access User Considerations |
|
00:03:00 |
|
Remote Access Best Practices |
|
00:04:00 |
Conclusion |
|
End User Role in IT Security |
|
00:03:00 |
Test |
|
Security essentials |
|
00:15:00 |