Learn your way! Get started

Digital Security Awareness, Part 4 of 4: Security

with experts Kenneth Mayer, Mike Biocchi


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 6/7/2021
Level Beginner
Runtime 2h 17m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Digital Security Awareness wraps up with this course on how to think about security from end to end, passwords, security policies as well as what to do moving forward.

Prerequisites

There are no prerequisites.

Meet the experts

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.

Dr. Michael Biocchi completed his PhD and has received his Masters of Science as well as his Bachelor of Computer Science. Michael is a Certified Information Systems Security Professional (CISSP). He is currently a full-time professor teaching a variety of computer science courses. These courses include: Artificial Intelligence, Security and Privacy, Project Management, PHP/MySQL, Distributed Systems, as well as many others. Michael also runs a small consulting business. He works with businesses in developing risk assessment, policy creation, business continuity planning, disaster recovery planning, and security awareness.

Course outline



Security from End to End

Security from End to End Part 1 (34:37)
  • Introduction (00:08)
  • Security from End to End (01:12)
  • Physical Security (05:31)
  • Other Things to Think About (02:36)
  • Home/Workstation Security (01:52)
  • Theft (02:03)
  • Encryption (02:21)
  • Demo: Encryption (16:16)
  • Secure E-mail Use (00:00)
  • Handheld Electronics (02:24)
  • Summary (00:08)
Passwords (28:25)
  • Introduction (00:08)
  • Passwords (02:24)
  • Username (02:17)
  • How Does It Work? (01:36)
  • Password Strength (01:40)
  • Strength Comes from Length (03:29)
  • More Math (03:09)
  • Password Hashing (06:07)
  • Is My Password Hashed? (02:25)
  • Password Management (02:23)
  • Benefits (01:57)
  • Recommendations (00:37)
  • Summary (00:08)
Security from End to End Part 2 (25:50)
  • Introduction (00:08)
  • E-mail (01:31)
  • Securing E-mail Communication (00:53)
  • E-mail Encryption (03:46)
  • Unknown Senders (01:45)
  • Stopping Spam (01:37)
  • E-mail Attachments (02:34)
  • Other E-mail Worries (02:17)
  • What to Do about E-mail Malware (01:57)
  • How to Avoid SPAM (02:24)
  • Secure Web Browsing (06:45)
  • Summary (00:08)
Security from End to End Part 3 (15:33)
  • Introduction (00:08)
  • Certificates (03:10)
  • Secure Web Browsing (Cont.) (04:08)
  • Demo: Secure Web Browsing Basics (05:35)
  • Instant Messages and Social Sites (02:23)
  • Summary (00:08)

Moving Forward

Security Policies (24:09)
  • Introduction (00:08)
  • Security Policies (02:43)
  • Security Policies (Cont.) (04:33)
  • Security Policies as Agreements (01:41)
  • Acceptable Behavior (01:15)
  • Defining an Incident (01:47)
  • Response Teams (00:51)
  • Response Teams (Cont.) (02:02)
  • Response Checklist (00:24)
  • Response Checklist (Cont.) (01:02)
  • Bring Your Own Device (00:34)
  • Benefits (01:00)
  • Issues (02:14)
  • Mobile Device Management (03:42)
  • Summary (00:08)
Moving Forward (08:35)
  • Introduction (00:08)
  • Education and Awareness (02:33)
  • Education and Awareness (Cont.) (01:41)
  • Individuals (01:44)
  • Organizations (00:53)
  • Security Domains (01:25)
  • Summary (00:08)