End User Security Awareness (PluralSight)

End User Security Awareness (PluralSight)
English | Size: 179.13 MB
Category: CBTs

End User Security Awareness
by Brien Posey
Level: Beginner
Duration: 1h 10m
Released: August 9th, 2016
This course will help viewers be aware of threats they might face as the world becomes reliant on technology. [Read more…]

Pluralsight – End User Security Awareness

Pluralsight – End User Security Awareness
English | Size: 167.71 MB
Category: Tutorial

Do you have security concerns as more and more of your personal and business information flows through technology? This course will teach you the basic concepts of end user security awareness including how to be proactive on the road, at work, and in your home. [Read more…]

Pluralsight – Achieving Basic Awareness of Information Security Measures (ISO-IEC 27002)

Pluralsight – Achieving Basic Awareness of Information Security Measures (ISO-IEC 27002)
English | Size: 544.38 MB
Category: CBTs

The perfect starting point for Information Security awareness training, this course presents high-level security concepts that apply to everyone who uses technology to manage information.

In business, Information Security is everyone’s responsibility. Everyone in an organization plays a part in establishing good security practices. However, in your personal life, securing your personal information is completely up to you. Nobody else is going to do it for you. Therefore, whether you are concerned about protecting your personal information or your business information, a solid awareness of Information Security Measures is an essential place to start. [Read more…]

CBT Nuggets – End-User Security Awareness

CBT Nuggets – End-User Security Awareness
English | Size: 485.84 MB
Category: E-learning | HACKING | Security | others

Over 500 IT managers and CIOs were surveyed to determine the security awareness needs that end users should be knowledgable of when working in today’s organizations. CBT Nuggets trainer Keith Barker helps learners understand the risks and mitigation techniques associated with these security needs.
[Read more…]

Lynda – Cybersecurity Awareness – The Internet of Things (IoT)

Lynda – Cybersecurity Awareness – The Internet of Things (IoT)
English | Size: 95.88 MB
Category: IOT

The Internet of Things (IoT) will change our personal and professional lives forever. By 2020, there are expected to be over 50 billion devices communicating through the internet, ranging from doorbells and thermostats, to cars and washing machines. These devices can make our lives easier and more efficient, but the technology may put our safety and privacy at risk. Knowing about the how the Internet of Things works and what we can do to be safe is important. In this course, Tom Tobiassen provides a basic understanding of IoT, including robots, wearable tech, smart cars, and drones. He discusses the security and privacy implications as well as protective countermeasures that even casual IoT users should know. [Read more…]

Lynda – Cybersecurity Awareness – Security for Cloud Services

Lynda – Cybersecurity Awareness – Security for Cloud Services
English | Size: 111.34 MB
Category: Tutorial

Many organizations are abandoning on-premises hosting in favor of cloud services-however, cloud computing is still a mystery to many. By becoming better acquainted with the various types of cloud offerings-as well as the general security risks involved with each option-companies and organizations can determine if cloud services are right for them. This course covers the different types of cloud service offerings, and presents security advantages and disadvantages as well. Plus, learn about the risks associated with using Skype and Dropbox, as well as risk mitigation strategies. [Read more…]

Lynda – Cybersecurity Awareness – Identifying Personally Identifiable Information

Lynda – Cybersecurity Awareness – Identifying Personally Identifiable Information
English | Size: 144.27 MB
Category: CBTs

As we use our computers to play games, pay for goods and services, and apply for jobs, our online identity is constructed from bits of information that we may or may not be conscious of revealing or sharing. This course discusses different information sources about who we are, what we do, where we are, and with whom we are associated-and how we can protect that information from misuse or corruption. Instructor Jennifer Kurtz explains how personally identifiable information (PII) is formed, and how it is valued and used in the marketplace by legitimate and criminal actors. She also covers the formal and informal capture of PII; goes into the legal and regulatory properties of PII; dives into breach case studies in the medical, financial, educational, government, and commercial sectors; and offers PII protection practices for both individuals and organizations. [Read more…]

Lynda – Cybersecurity Awareness – Cybersecurity While Traveling

Lynda – Cybersecurity Awareness – Cybersecurity While Traveling
English | Size: 86.66 MB
Category: CBTs

Tightly controlled security is a lot tougher when you are on the road. Learn about the various cybersecurity situations you will run into while traveling, and the technology that can be used to help keep you safe. This course reviews the triangle of security, as well as wireless and wired threats and countermeasures. Instructor Jordan Scott designed the training primarily to raise awareness of travel situations commonly encountered while trying to maintain connectivity. This includes accessing open Wi-Fi networks securely, using SSL, setting up VPNs, and more. [Read more…]

Lynda – Cybersecurity Awareness – Building Your Cybersecurity Vocabulary

Lynda – Cybersecurity Awareness – Building Your Cybersecurity Vocabulary
English | Size: 99.57 MB
Category: Tutorial

Cybersecurity can be an intimidating world to navigate. To speak intelligently on the subject, one must have a basic understanding of certain acronyms and terminology-much of which isn’t immediately easy to decode. This practical course was designed to help beginners build their cybersecurity vocabulary, and give them the foundational knowledge they need to approach this subject with confidence. Here, instructor Serge Borso breaks down the vocabulary heard in the cybersecurity industry, and presents scenarios where those words, phrases, and acronyms are used. Upon wrapping up this course, you should have a solid foundation of what cybersecurity is, and what it entails. [Read more…]

Lynda – Cybersecurity Awareness – The Protection and Destruction of Portable Data

Lynda – Cybersecurity Awareness – The Protection and Destruction of Portable Data
English | Size: 101.50 MB
Category: CBTs

Our valued, portable data assets benefit from intentional scrutiny and governance guidelines about how each should be preserved, protected, and destroyed. This course is for anyone who has data assets that are not contained in a locked file cabinet. It may also have relevance to those who have hard copy documents, but who have not considered how those documents should be managed. Here, learn about the different states of data, and how individuals and organizations can protect their portable data that’s at risk. Upon completing this course, you’ll have the knowledge you need to design and implement your own data management plan [Read more…]

Skip to toolbar