Learn your way! Get started

Cyber Security Awareness Basics, Part 1 of 2: Overview and Threats

with expert Kenneth Mayer


Watch trailer


Course at a glance


Release date 2/26/2018
Level Beginner
Runtime 0h 59m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

This course will explore types of security threats, both digital and physical. It will start off with an overview, look at types of threats, social engineering and identity theft.

Prerequisites

There are no prerequisites

Meet the expert

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.

Course outline



Social Engineering and Identity Theft

Overview (04:11)
  • Introduction (00:10)
  • What Is Security (01:35)
  • Are You at Risk? (02:17)
  • Summary (00:08)
Types of Threats (09:16)
  • Introduction (00:08)
  • Introduction (03:25)
  • Your Internet (05:34)
  • Summary (00:08)
Social Engineering (10:43)
  • Introduction (00:08)
  • What Is Social Engineering? (01:04)
  • How Social Engineering Is Done (09:22)
  • Summary (00:08)
Social Engineering Defense (05:53)
  • Introduction (00:08)
  • Manipulation (05:36)
  • Summary (00:08)
Social Engineering Precautions (10:08)
  • Introduction (00:08)
  • Why Social Engineering Works (07:33)
  • Personal Precautions (02:18)
  • Summary (00:08)
Identify Theft (11:49)
  • Introduction (00:08)
  • What Is Identity Theft? (01:42)
  • Other Possibilities (00:59)
  • How Does It Happen? (02:56)
  • More Identity Theft Methods (05:54)
  • Summary (00:08)
Identify Theft Defense (07:28)
  • Introduction (00:08)
  • How to Defend Yourself (02:30)
  • How to Defend Yourself (Cont.) (04:03)
  • Online Credit Card Use (00:37)
  • Summary (00:08)