HOME > IT & Software > IT Security Awareness for Employees and Individuals

IT Security Awareness for Employees and Individuals

SynopsisIT Security Awareness for Employees and Individuals, availabl...
IT Security Awareness for Employees and Individuals  No.1

IT Security Awareness for Employees and Individuals, available at $44.99, has an average rating of 5, with 17 lectures, 1 quizzes, based on 1 reviews, and has 320 subscribers.

You will learn about Understand the Golden Rules for Security – what you have to do Learn how the Internet works and Attackers use simple technologies to trick you Recognize common Attack Schemes Technical Rules and practical behavioral Guidelines This course is ideal for individuals who are Every individual using computers and mobile devices – for private or business purposes It is particularly useful for Every individual using computers and mobile devices – for private or business purposes.

Enroll now: IT Security Awareness for Employees and Individuals

Summary

Title: IT Security Awareness for Employees and Individuals

Price: $44.99

Average Rating: 5

Number of Lectures: 17

Number of Quizzes: 1

Number of Published Lectures: 17

Number of Published Quizzes: 1

Number of Curriculum Items: 18

Number of Published Curriculum Objects: 18

Number of Practice Tests: 1

Number of Published Practice Tests: 1

Original Price: $19.99

Quality Status: approved

Status: Live

What You Will Learn

  • Understand the Golden Rules for Security – what you have to do
  • Learn how the Internet works and Attackers use simple technologies to trick you
  • Recognize common Attack Schemes
  • Technical Rules and practical behavioral Guidelines
  • Who Should Attend

  • Every individual using computers and mobile devices – for private or business purposes
  • Target Audiences

  • Every individual using computers and mobile devices – for private or business purposes
  • IT Security Awareness for Employees and Individuals

    – The pragmatic complete Guide to Internet and Computer Security –

    Am I secure? What I can do for IT security as an employee and individual.

    Anyone who works with computers or mobile digital devices should understand the basics of the internet, to be able to behave correctly. This course explains the background to how the internet works and which schemes attackers use to trick users.

    The courses describes technical countermeasures as well as the correct user behavior plus guides users to recognize common attacking schemes.

    How do Cyber criminals think? What are the dangers? What do I have to watch out for? Are cookies bad?

    The course will answer these questions and more:

    1. Introduction & Motivation

    2. What actually is “Security”? – Trying to understand In-/Security

    3. Internet Basics: The Internetand the Cloud

    4. Basic Attacking Scheme

    5. Users as the weak point: Recognizing Attack Schemes & Phishing (Part 1)

    6. Users as the weak point: Recognizing Attack Schemes & Phishing (Part 2)

    7. Users as the weak point: Recognizing Attack Schemes & Phishing (Part 3)

    8. Example: The ideal (Banking-)Trojan

    9. Technical Security: Hacking

    10. E-Mail Security

    11. Insert: Online Shopping

    12. Insert: The ‘better’ (more secure) Operating system?

    13. Insert: ‘Hacking’ outside of PCs and mobile Devices

    14. Insert: Disposing, Passing on, Selling Devices

    15. Authentication & Passwords

    16. Backup – Do we need that?

    17. The Golden Security Rules

    Instructor Frank Hissen, Computer Scientist and Security Expert, teaches IT security for over 20 years and works for companies of all sizes as IT Security Consultant and Software Engineer.

    .

    Course Curriculum

    Chapter 1: IT Security Awareness for Employees and Individuals

    Lecture 1: Introduction & Motivation

    Lecture 2: What actually is Security? – Trying to understand In-/Security

    Lecture 3: Internet Basics: The Internetand the Cloud

    Lecture 4: Basic Attacking Scheme

    Lecture 5: Users as the weak point: Recognizing Attack Schemes & Phishing (Part 1)

    Lecture 6: Users as the weak point: Recognizing Attack Schemes & Phishing (Part 2)

    Lecture 7: Users as the weak point: Recognizing Attack Schemes & Phishing (Part 3)

    Lecture 8: Example: The ideal (Banking-)Trojan

    Lecture 9: Technical Security: Hacking

    Lecture 10: E-Mail Security

    Lecture 11: Insert: Online Shopping

    Lecture 12: Insert: The better (more secure) Operating system?

    Lecture 13: Insert: Hacking outside of PCs and mobile Devices

    Lecture 14: Insert: Disposing, Passing on, Selling Devices

    Lecture 15: Authentication & Passwords

    Lecture 16: Backup – Do we need that?

    Lecture 17: The Golden Security Rules

    Chapter 2: Course Assessment

    Instructors

  • IT Security Awareness for Employees and Individuals  No.2
    Frank Hissen
    Computer Scientist / IT security expert
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 0 votes
  • 3 stars: 0 votes
  • 4 stars: 0 votes
  • 5 stars: 1 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!