IT Security Awareness for Employees and Individuals - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: IT Security Awareness for Employees and Individuals (/Thread-IT-Security-Awareness-for-Employees-and-Individuals) |
IT Security Awareness for Employees and Individuals - OneDDL - 08-23-2024 Free Download IT Security Awareness for Employees and Individuals Last updated 8/2024 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Language: English | Duration: 2h 9m | Size: 770 MB The pragmatic complete Guide to Internet and Computer Security What you'll learn Understand the Golden Rules for Security - what you have to do Learn how the Internet works and Attackers use simple technologies to trick you Recognize common Attack Schemes Technical Rules and practical behavioral Guidelines Requirements None, just be interested in your IT / Computer / Internet Security! Description IT Security Awareness for Employees and Individuals- The pragmatic complete Guide to Internet and Computer Security -Am I secure? What I can do for IT security as an employee and individual.Anyone who works with computers or mobile digital devices should understand the basics of the internet, to be able to behave correctly. This course explains the background to how the internet works and which schemes attackers use to trick users.The courses describes technical countermeasures as well as the correct user behavior plus guides users to recognize common attacking schemes.How do Cyber criminals think? What are the dangers? What do I have to watch out for? Are cookies bad?The course will answer these questions and more:Introduction & MotivationWhat actually is "Security"? - Trying to understand In-/SecurityInternet Basics: The Internet...and the CloudBasic Attacking SchemeUsers as the weak point: Recognizing Attack Schemes & Phishing (Part 1)Users as the weak point: Recognizing Attack Schemes & Phishing (Part 2)Users as the weak point: Recognizing Attack Schemes & Phishing (Part 3)Example: The ideal (Banking-)TrojanTechnical Security: HackingE-Mail SecurityInsert: Online ShoppingInsert: The 'better' (more secure) Operating system?Insert: 'Hacking' outside of PCs and mobile DevicesInsert: Disposing, Passing on, Selling DevicesAuthentication & PasswordsBackup - Do we need that?The Golden Security RulesInstructor Frank Hissen, Computer Scientist and Security Expert, teaches IT security for over 20 years and works for companies of all sizes as IT Security Consultant and Software Engineer.. Who this course is for Every individual using computers and mobile devices - for private or business purposes Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live No Password - Links are Interchangeable |