Cyber Security Awareness Basics, Part 1 of 2: Overview and Threats - 59 minutesSocial Engineering and Identity Theft Overview (04:11) Introduction (00:10) What Is Security (01:35) Are You at Risk? (02:17) Summary (00:08) Types of Threats (09:16) Introduction (00:08) Introduction (03:25) Your Internet (05:34) Summary (00:08) Social Engineering (10:43) Introduction (00:08) What Is Social Engineering? (01:04) How Social Engineering Is Done (09:22) Summary (00:08) Social Engineering Defense (05:53) Introduction (00:08) Manipulation (05:36) Summary (00:08) Social Engineering Precautions (10:08) Introduction (00:08) Why Social Engineering Works (07:33) Personal Precautions (02:18) Summary (00:08) Identify Theft (11:49) Introduction (00:08) What Is Identity Theft? (01:42) Other Possibilities (00:59) How Does It Happen? (02:56) More Identity Theft Methods (05:54) Summary (00:08) Identify Theft Defense (07:28) Introduction (00:08) How to Defend Yourself (02:30) How to Defend Yourself (Cont.) (04:03) Online Credit Card Use (00:37) Summary (00:08) |
Cyber Security Awareness Basics, Part 2 of 2: Protection and Malware - 1:22 hoursMalware Identify Theft Actions (09:03) Introduction (00:08) What Criminals Do with Your Information (01:51) Other Things Criminals Do (01:17) What Criminals Do with Your Information (Cont.) (01:09) How to Know if You're a Victim (00:39) Actions to Take if You Are a Victim (01:24) Fraud Alerts (01:46) Contact Information (00:38) Summary (00:08) Protecting Digital Information (05:09) Introduction (00:10) Passwords (02:07) Hashing (02:43) Summary (00:08) Password Management (09:43) Introduction (00:08) Password Management (04:49) Password Management (Cont.) (01:56) Length and Complexity (02:41) Summary (00:08) Malware Definitions (07:55) Introduction (00:08) Introduction (00:35) Basic Definitions (07:03) Summary (00:08) Malware Infections (21:04) Introduction (00:08) What to Look For (01:35) What to Look for (04:05) How can you get Infected (06:42) Summary (08:32) Malware Detection (18:40) Introduction (00:08) Software Detection (04:07) Personal Firewalls (04:24) Summary (10:00) File Extensions (10:16) Introduction (00:08) Know the Extensions (03:23) Demo: Understanding File Extensions (06:36) Summary (00:08) |