Digital Security Awareness, Part 4 of 4: Security
Interactive

Digital Security Awareness, Part 4 of 4: Security

LearnNow Online
Updated Aug 23, 2018

Course description

This course will explore types of security threats, both digital and physical. First security end to end, piracy and security policies in both physical security and computer security will be covered. Next, a look at encryption followed by intellectual property and types of piracy. It will finish with discussion of Education and awareness of employees.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

There are no prerequisites.


Meet the expert

Kenneth Mayer

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.

Video Runtime

116 Minutes

Time to complete

136 Minutes

Course Outline

Security from End to End and Moving Forward

Security from End to End Part 1 (27:28)

  • Introduction (00:10)
  • Security from End to End (01:12)
  • Physical Security (05:31)
  • Other Things to Think About (02:36)
  • Home/Workstation Security (01:52)
  • Theft (02:03)
  • Encryption (02:21)
  • Demo: Encryption (02:21)
  • Handheld Electronics (03:18)
  • Updates (03:25)
  • Secure E-mail Use (02:25)
  • Summary (00:08)

Security from End to End Part 2 (25:50)

  • Introduction (00:08)
  • E-mail (01:31)
  • Securing E-mail Communication (00:53)
  • E-mail Encryption (03:46)
  • Unknown Senders (01:45)
  • Stopping Spam (01:37)
  • E-mail Attachments (02:34)
  • Other E-mail Worries (02:17)
  • What to Do about E-mail Malware (01:57)
  • How to Avoid SPAM (02:24)
  • Secure Web Browsing (06:45)
  • Summary (00:08)

Security from End to End Part 3 (22:04)

  • Introduction (00:08)
  • Certificates (01:43)
  • Toolbars (01:26)
  • Secure Web Browsing (Cont.) (04:07)
  • Demo: Secure Web Browsing Basics (07:13)
  • Demo: View All Files (04:53)
  • Instant Messages and Social Sites (02:23)
  • Summary (00:08)

Piracy (15:45)

  • Introduction (00:08)
  • Piracy (00:19)
  • What Is Intellectual Property (01:30)
  • Copyright (01:19)
  • Software Piracy (04:28)
  • Live Piracy (02:10)
  • Types of Piracy (01:41)
  • Piracy Is Theft (00:55)
  • Risks (01:51)
  • Financial Losses (01:11)
  • Summary (00:08)

Security Policies (16:36)

  • Introduction (00:08)
  • Security Policies (02:43)
  • Security Policies (Cont.) (04:33)
  • Security Policies as Agreements (01:41)
  • Acceptable Behavior (01:15)
  • Defining an Incident (01:47)
  • Response Teams (00:51)
  • Response Teams (Cont.) (02:02)
  • Response Checklist (00:24)
  • Response Checklist (Cont.) (01:01)
  • Summary (00:08)

Moving Forward (08:35)

  • Introduction (00:08)
  • Education and Awareness (02:33)
  • Education and Awareness (Cont.) (01:41)
  • Individuals (01:44)
  • Organizations (00:53)
  • Security Domains (01:25)
  • Summary (00:08)
;