How to establish good Cyber Hygiene
3.9 (37 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
6,415 students enrolled

How to establish good Cyber Hygiene

Learn how to protect your online and system through Cybersecurity and Cyber awareness from Cyber threats- Beginners
New
3.9 (37 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
6,415 students enrolled
Last updated 6/2020
English
English
Current price: $13.99 Original price: $19.99 Discount: 30% off
23 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 32 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Cybersecurity
  • Cyber Hygiene
  • Digital Footprints
  • Cyber Threats, Risks and Vulnerabilities
  • Best practices to manage Cyber Hygiene
Requirements
  • None
Description

As technology grows more complex and our daily lives become more intertwined with the internet, it is important to protect ourselves otherwise we may fall victim to Cyber crime. Establishing good Cyber Hygiene not only minimizes our online exposure but also enables us to properly manage and secure our systems against Cyber threats.

What do you learn in this course?

  • Obtain an understanding of Cyber Hygiene

  • Obtain an understanding of Cyber threats, risks and vulnerabilities

  • Obtain an understanding of Digital footprints and its risks

  • Obtain an understanding of how we can manage our Cyber Hygiene and the best practices


Note: Due to the high number and diversity of different technologies, software and platforms, this course will not go over the specifics on how you can configure your systems and account settings specifically. This course is intended to provide fundamental knowledge to enable you to be aware of the Cyber risks and the theoretical information and best practices to establish good Cyber Hygiene.

Who this course is for:
  • People that are beginners in Cybersecurity
  • People that have knowledge of Cybersecurity
  • Any individuals interested in protecting their online presence
  • Any individuals that are interested in securing their systems
Course content
Expand 20 lectures 32:01
+ How to establish good Cyber Hygiene
20 lectures 32:01

This section provides an introduction of the course, program and instructor.

Preview 01:16

This section covers the course break down and explains why it is important to learn Cyber Hygiene

Preview 01:35

This section explains what Cyber Hygiene is and provides a comprehensive view of understanding hygiene at the system and user level

Preview 00:38

This section explains what Cyber Threats and Risks are

Preview 01:04

This section explains how threats are derived from assets, software and attackers, the different Cyber vulnerabilities and the types of threats

Preview 04:00

This section covers a scenario example for user level -phishing attack

Preview 01:52
Part 1: Types of Threats (Scenario Example: System level)
01:37

Testing your knowledge

Knowledge Check
1 question

This section explains what are digital footprints and the different aspects of our lives being imprinted online

Preview 03:14
Part 2: Types of Digital Footprints and Risks to your Digital Footprints
02:23

Testing your knowledge

Knowledge Check
1 question

This section covers how we should consider the concepts of system and user levels to address Digital Footprint risks and Cyber Threats

Part 3: How to establish Cyber Hygiene
01:26

This section covers the best practices of using security software for your Cyber Hygiene

Part 3: Best Practices - Security Software
01:53

This section covers the best practices of changing passwords for your Cyber Hygiene

Part 3: Best Practices- Changing Passwords
00:43

This section covers the best practices of hiding your network presence for your Cyber Hygiene

Part 3: Best Practices- Hiding your presence
01:36

This section covers the best practices of enhancing your Wi-fi encryption for your Cyber Hygiene

Part 3: Best Practices- Enhance your Wi-fi Encryption
01:37

This section covers the best practices of securing data for your Cyber Hygiene

Part 3: Best practices- Securing data
01:30

This section covers the best practices of securing your privacy for your Cyber Hygiene

Part 3: Best practices- Securing your privacy
01:02

This section covers the best practices for being alert for your Cyber Hygiene

Part 3: Best practices- Being alert
00:50

This section covers the best practices for mobile security for your Cyber Hygiene

Part 3: Best practices- Mobile Security
02:01

Testing your knowledge

Knowledge Check
3 questions

This section covers the summary of lessons learnt for the course

Lessons Learnt
01:06

This section covers the conclusion of the course and attributes and credits sources used in this course.

Ending
00:38