How to establish good Cyber Hygiene
- 32 mins on-demand video
- 1 downloadable resource
- Full lifetime access
- Access on mobile and TV
- Certificate of Completion
Get your team access to 4,000+ top Udemy courses anytime, anywhere.Try Udemy for Business
- Cyber Hygiene
- Digital Footprints
- Cyber Threats, Risks and Vulnerabilities
- Best practices to manage Cyber Hygiene
As technology grows more complex and our daily lives become more intertwined with the internet, it is important to protect ourselves otherwise we may fall victim to Cyber crime. Establishing good Cyber Hygiene not only minimizes our online exposure but also enables us to properly manage and secure our systems against Cyber threats.
What do you learn in this course?
Obtain an understanding of Cyber Hygiene
Obtain an understanding of Cyber threats, risks and vulnerabilities
Obtain an understanding of Digital footprints and its risks
Obtain an understanding of how we can manage our Cyber Hygiene and the best practices
Note: Due to the high number and diversity of different technologies, software and platforms, this course will not go over the specifics on how you can configure your systems and account settings specifically. This course is intended to provide fundamental knowledge to enable you to be aware of the Cyber risks and the theoretical information and best practices to establish good Cyber Hygiene.
- People that are beginners in Cybersecurity
- People that have knowledge of Cybersecurity
- Any individuals interested in protecting their online presence
- Any individuals that are interested in securing their systems
This section provides an introduction of the course, program and instructor.
This section covers the course break down and explains why it is important to learn Cyber Hygiene
This section explains what Cyber Hygiene is and provides a comprehensive view of understanding hygiene at the system and user level
This section explains what Cyber Threats and Risks are
This section explains how threats are derived from assets, software and attackers, the different Cyber vulnerabilities and the types of threats
This section covers a scenario example for user level -phishing attack
This section explains what are digital footprints and the different aspects of our lives being imprinted online