O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Digital Security Awareness Training for Business and Home Users

Video Description

The Digital Security Awareness Training for Business and Home Users is a fundamental course on the cyber security awareness that is required to protect the personal data from being exposed to hackers in this age of excessive digitization. The course is designed to give all home users and business professionals the knowledge and tools to protect themselves and their sensitive information from security attacks. It covers many simple ways to prevent security breaches and protect valuable data. The Digital Security Awareness Training for Business and Home Users is a very useful course for those individuals who are involved more-and-more in the technology-driven internet-of-things applications and devices. The one aspect that needs to be taken care of while using the digital applications and gadgets is the data security. The course addresses this aspect to cover all the necessary details that enable the business professionals and individuals to protect their sensitive information from unauthorized access and hacking.

Table of Contents

  1. Course Introduction
    1. Course Introduction 00:01:22
    2. Instructor Introduction 00:01:34
  2. Module 00 - Course Overview
    1. Course Overview 00:00:13
    2. What is Security Awareness? 00:00:22
    3. Security Domains 00:03:37
    4. What is Security? 00:01:35
    5. Are You at Risk? 00:02:19
    6. So What About You? 00:01:10
    7. What are the Goals of this Course? 00:00:34
    8. What Will We Cover? 00:00:47
    9. Surprise! 00:01:29
    10. Is it Too Late? 00:00:45
    11. Module 00 Review 00:00:30
  3. Module 01 - Types of Security Threats
    1. Types of Security Threats 00:02:21
    2. Your Computer 00:03:25
    3. Your Internet 00:05:35
    4. Yourself 00:03:54
    5. Your Words 00:03:01
    6. Your E-mail 00:02:54
    7. Your Home 00:02:20
    8. Your Files 00:04:28
    9. Module 01 Review 00:00:40
  4. Module 02 - Social Engineering
    1. Social Engineering 00:00:06
    2. What is Social Engineering? 00:10:28
    3. Social Engineering Defense 00:03:31
    4. Manipulation 00:05:38
    5. Why Does it Work? 00:02:04
    6. Fooling People 00:02:17
    7. What Else Can Be Done? 00:03:12
    8. Personal Precautions 00:02:19
    9. Module 02 Review 00:00:33
  5. Module 03 - Identity Theft
    1. Identity Theft 00:00:30
    2. What is Identity Theft? Part1 00:01:42
    3. What is Identity Theft? Part2 00:00:59
    4. How Does it Happen? Part1 00:02:57
    5. How Does it Happen? Part2 00:02:52
    6. How to Defend Yourself Part1 00:03:03
    7. How to Defend Yourself Part2 00:02:30
    8. How to Defend Yourself Part3 00:04:04
    9. What Criminals Do with Your Information Part1 00:00:39
    10. What Criminals Do with Your Information Part2 00:01:51
    11. What Criminals Do with Your Information Part3 00:01:17
    12. What Criminals Do with Your Information Part4 00:01:10
    13. How Can You Tell if You’re a Victim? 00:00:39
    14. Actions to Take if You are a Victim 00:01:25
    15. Contact Information Part1 00:01:46
    16. Contact Information Part2 00:00:38
    17. Module 03 Review 00:00:30
  6. Module 04 - Data Classification
    1. Data Classification 00:00:49
    2. Policies for Data Sharing 00:04:32
    3. Least Privilege 00:05:30
    4. How to Classify Part1 00:01:36
    5. How to Classify Part2 00:03:32
    6. How to Classify Part3 00:01:37
    7. How to Classify Part4 00:01:15
    8. How to Classify Part5 00:02:45
    9. How to Classify Part6 00:01:20
    10. How to Classify Part7 00:04:59
    11. Types of Classifications 00:01:02
    12. Jurisdictional Issues 00:01:20
    13. Your Involvement 00:01:49
    14. What Could Happen? 00:01:54
    15. What Type of Policies? 00:04:45
    16. How to Destroy Data Part1 00:02:57
    17. How to Destroy Data Part2 00:03:22
    18. Module 04 Review 00:00:49
  7. Module 05 - Protecting Your Digital Information
    1. Protecting Your Digital Information 00:00:44
    2. Why Do a Backup? 00:01:31
    3. Types of Backups 00:05:24
    4. What to Backup Part1 00:02:08
    5. What to Backup Part2 00:02:18
    6. What to Backup Part3 00:02:28
    7. Where to Store Backups Part1 00:02:07
    8. Where to Store Backups Part2 00:02:26
    9. How to Perform Backups 00:02:22
    10. Demo - Backups 00:04:24
    11. Backup Utilities Part1 00:03:56
    12. Backup Utilities Part2 00:01:37
    13. Backup Management Practices 00:03:22
    14. Passwords 00:04:51
    15. Demo - Password Management 00:05:23
    16. Password Management Part1 00:04:49
    17. Password Management Part2 00:01:56
    18. Password Management Part3 00:01:12
    19. Password Management Part4 00:01:30
    20. AAA 00:03:10
    21. Module 05 Review 00:00:44
  8. Module 06 - Malware
    1. Malware 00:00:35
    2. Basic Definitions 00:07:05
    3. What to Look For 00:01:36
    4. How You Can Get Infected Part1 00:04:05
    5. How You Can Get Infected Part2 00:03:42
    6. Software Detection 00:08:33
    7. Hardware Detection 00:02:16
    8. Cloud Detection 00:03:33
    9. Know the Extensions 00:03:23
    10. Demo - Knowing Your Extensions 00:06:37
    11. Your Defenses 00:02:50
    12. Module 06 Review 00:00:31
  9. Module 07 - Security from End -to -End
    1. Security from End 00:01:12
    2. Physical Security Part1 00:05:32
    3. Physical Security Part2 00:02:37
    4. Home/Workstation Security Part1 00:01:52
    5. Home/Workstation Security Part2 00:02:05
    6. Demo - EFS 00:02:22
    7. Encryption 00:01:24
    8. Hand Held Electronics 00:02:06
    9. Workstation Software 00:01:13
    10. Updating the OS and Software 00:03:25
    11. Secure E -mail Use Part1 00:02:26
    12. Secure E -mail Use Part2 00:01:31
    13. E-mail Encryption Part1 00:00:53
    14. E-mail Encryption Part2 00:03:46
    15. E-mail Hazards 00:01:46
    16. How to Stop SPAM 00:01:37
    17. E-mail Attachments 00:02:34
    18. Other E-mail Warnings 00:02:17
    19. What if You Get Malware from E-mail? 00:01:58
    20. How to Avoid SPAM 00:02:25
    21. Secure Web Browsing Part1 00:06:46
    22. Secure Web Browsing Part2 00:01:43
    23. Secure Web Browsing Part3 00:01:27
    24. Secure Web Browsing Part4 00:04:08
    25. Demo - Secure Web Browsing 00:12:06
    26. Secure Instant Messaging / Social Sites 00:02:24
    27. Module 07 Review 00:00:37
  10. Module 08 - Piracy
    1. Piracy 00:00:19
    2. What is Intellectual Property 00:01:31
    3. Copyrights 00:01:19
    4. Software Piracy Part1 00:04:29
    5. Software Piracy Part2 00:02:10
    6. Types of Piracy Part1 00:01:41
    7. Types of Piracy Part2 00:00:55
    8. Risks Part1 00:01:52
    9. Risks Part2 00:01:12
    10. Module 08 Review 00:00:26
  11. Module 09 - Security Policies
    1. Security Policies 00:00:32
    2. Security Policies Part2 00:02:43
    3. Security Policies Part3 00:04:34
    4. Why are Policies Important Part1 00:01:41
    5. Why are Policies Important Part2 00:01:15
    6. Defining an Incident 00:01:47
    7. Response Teams Part1 00:00:52
    8. Response Teams Part2 00:02:03
    9. Response Checklist Part1 00:00:24
    10. Response Checklist Part2 00:01:03
    11. Module 09 Review 00:00:44
  12. Module 10 - Moving Forward
    1. Moving Forward 00:00:24
    2. Education and Awareness Part1 00:02:33
    3. Education and Awareness Part2 00:01:41
    4. Individuals 00:01:45
    5. Organizations 00:00:53
    6. Know the Principles of Security Domains 00:01:27
    7. Module 10 Review 00:00:43
    8. Course Closure 00:02:48