Softwarez.Info - Software's World!
IT Security Awareness for Employees and Individuals - Printable Version

+- Softwarez.Info - Software's World! (https://softwarez.info)
+-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone)
+--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials)
+--- Thread: IT Security Awareness for Employees and Individuals (/Thread-IT-Security-Awareness-for-Employees-and-Individuals)



IT Security Awareness for Employees and Individuals - OneDDL - 08-23-2024

[Image: 767c21d2f026d7d3496d0b3d31bc7d3a.jpeg]
Free Download IT Security Awareness for Employees and Individuals
Last updated 8/2024
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 2h 9m | Size: 770 MB
The pragmatic complete Guide to Internet and Computer Security

What you'll learn
Understand the Golden Rules for Security - what you have to do
Learn how the Internet works and Attackers use simple technologies to trick you
Recognize common Attack Schemes
Technical Rules and practical behavioral Guidelines
Requirements
None, just be interested in your IT / Computer / Internet Security!
Description
IT Security Awareness for Employees and Individuals- The pragmatic complete Guide to Internet and Computer Security -Am I secure? What I can do for IT security as an employee and individual.Anyone who works with computers or mobile digital devices should understand the basics of the internet, to be able to behave correctly. This course explains the background to how the internet works and which schemes attackers use to trick users.The courses describes technical countermeasures as well as the correct user behavior plus guides users to recognize common attacking schemes.How do Cyber criminals think? What are the dangers? What do I have to watch out for? Are cookies bad?The course will answer these questions and more:Introduction & MotivationWhat actually is "Security"? - Trying to understand In-/SecurityInternet Basics: The Internet...and the CloudBasic Attacking SchemeUsers as the weak point: Recognizing Attack Schemes & Phishing (Part 1)Users as the weak point: Recognizing Attack Schemes & Phishing (Part 2)Users as the weak point: Recognizing Attack Schemes & Phishing (Part 3)Example: The ideal (Banking-)TrojanTechnical Security: HackingE-Mail SecurityInsert: Online ShoppingInsert: The 'better' (more secure) Operating system?Insert: 'Hacking' outside of PCs and mobile DevicesInsert: Disposing, Passing on, Selling DevicesAuthentication & PasswordsBackup - Do we need that?The Golden Security RulesInstructor Frank Hissen, Computer Scientist and Security Expert, teaches IT security for over 20 years and works for companies of all sizes as IT Security Consultant and Software Engineer..
Who this course is for
Every individual using computers and mobile devices - for private or business purposes
Homepage

[To see links please register or login]



Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live

[To see links please register or login]

No Password - Links are Interchangeable