Learn your way! Get started

Cyber Security Awareness Basics, Part 2 of 2: Protection and Malware

with expert Kenneth Mayer


Watch trailer


Course at a glance


Release date 2/26/2018
Level Beginner
Runtime 1h 21m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

This course will explore types of security threats, both digital and physical. It starts with protecting digital information and then discusses types of malware such as viruses, worms, trojans and phishing as well as software detection and finishes with file extensions.

Prerequisites

There are no prerequisites

Meet the expert

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.

Course outline



Malware

Identify Theft Actions (09:03)
  • Introduction (00:08)
  • What Criminals Do with Your Information (01:51)
  • Other Things Criminals Do (01:17)
  • What Criminals Do with Your Information (Cont.) (01:09)
  • How to Know if You're a Victim (00:39)
  • Actions to Take if You Are a Victim (01:24)
  • Fraud Alerts (01:46)
  • Contact Information (00:38)
  • Summary (00:08)
Protecting Digital Information (05:09)
  • Introduction (00:10)
  • Passwords (02:07)
  • Hashing (02:43)
  • Summary (00:08)
Password Management (09:43)
  • Introduction (00:08)
  • Password Management (04:49)
  • Password Management (Cont.) (01:56)
  • Length and Complexity (02:41)
  • Summary (00:08)
Malware Definitions (07:55)
  • Introduction (00:08)
  • Introduction (00:35)
  • Basic Definitions (07:03)
  • Summary (00:08)
Malware Infections (21:04)
  • Introduction (00:08)
  • What to Look For (01:35)
  • What to Look for (04:05)
  • How can you get Infected (06:42)
  • Summary (08:32)
Malware Detection (18:40)
  • Introduction (00:08)
  • Software Detection (04:07)
  • Personal Firewalls (04:24)
  • Summary (10:00)
File Extensions (10:16)
  • Introduction (00:08)
  • Know the Extensions (03:23)
  • Demo: Understanding File Extensions (06:36)
  • Summary (00:08)