Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity Awareness Course (CSAM 2023)
Course Introduction
Course Introduction
Solutions Hub: What do you need help with?
Feedback: Rate you current knowledge
Module 1: Introduction to Cybersecurity
Module Introduction
Introduction to Cybersecurity
Article: Introduction to Cybersecurity
Basic concept and terms: Zombie Attack, Virus and Rootkit
Basic concept and terms: Remote Access Trojan, Malware and Keylogger
Basic concept and terms: Defacement, Cyberstalking, Cyber Attack and Cyber Crime
Basic concept and terms: Exploit, Dumpster Diving and Distributed-Denial-of-Service (DDoS)
Basic concept and terms: Crimeware, Botnet, Brute Force Attack and Advanced Persistent Threat
Basic concept and terms: Adware, Trojan Horse, Spyware and Spoofing
Basic concept and terms: Session Hijacking, Ransomware and Digital Espionage
Basic concept and terms: Cyber Warfare, Click Jack, Backdoor, Account Hijacking
Knowledge Check
Discussion Forum
Module 2: Security Fundamentals
Module Introduction
What is a Password?
Managing your passwords correctly - Password Managers
Practice
Dangers of Default Passwords
Types of Authentication
Article: Password and Authentication
Discussion Forum
Password Attacks 1
Password Attacks 2
Case Study and Tips for Preventing Password Attacks
Knowledge Check
Discussion Forum
Module 3: Social Engineering
Module Introduction
Overview of Social Engineering
Amygdala Hijack, What Do They Want?
Social Engineering Examples
Social Engineering Tricks
Social Engineering Methods - Phishing, Spear Phishing and Whaling
Practice
Social Engineering Methods - Vishing, Smishing, and Impersonation
Social Engineering Methods - Spoofing, Baiting, and Pretexting
Social Engineering Methods - Scareware, Typosquatting and BEC
Cyber Kill Chain and Impact of Social Engineering
Social Engineering Trends and How to Stay Safe
Knowledge Check
Discussion Forum
Module 4: Malware and Cybersecurity Threat and Trends
Module Introduction
Malware and Types of Malware
Types of Malware Continued: Trojans, Spyware, Keyloggers, and Adware
Signs of a Malware Attack, How Malware Spreads and Preventive Measures
Insider Threats
Backdoors and Supply Chain Attack
Social Engineering Attacks
Destructive and Disruptive Malware
Cloud Misconfiguration and Web Application Attacks
Credential, Data and Identity Theft, Emerging technologies and Advance Cyberthreats
User Device-related Cyberthreats, Cyberattacks Targeting the Internet of Things (IoT) and DDOS
Research
Knowledge Check
Discussion Forum
Module 5: Data Protection
Module Introduction
Data protection and Keeping your Personal Data Safe
Keeping your Enterprise Data Safe
Data Insecurity Trends
Article: Introduction to Data Protection and Management
Knowledge Check
Discussion Forum
Module 6: Securing Phones, Computers and Tablets
Module Introduction
Tips for Securing your Devices
Device Security Strategies and the Dangers Public Wi-Fi
Safe Web Browsing and Office Best Practices
Knowledge check
Discussion Forum
Next Steps
Feedback: What do you think about this experience?
Discussion Forum: Share your learning experience with others
Assess: End of Course Quiz
Getting Certified
Social Engineering Trends and How to Stay Safe
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock