Digital Security Awareness

Learn to protect yourself against security breaches, vulnerabilities and guard your valuable data.
1.0 (1 rating) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
52 students enrolled
$19
$50
62% off
Take This Course
  • Lectures 166
  • Length 8.5 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 7/2013 English

Course Description

The Digital Security Awareness course is designed to go beyond compliance and address the most common risks and security threats in order to protect sensitive information. Learn the knowledge and tools needed to maintain your network and prevent security breaches. This training can be applied not only to work, but your home computer network as well. 

Total Video Time: 6h 16m

Review Quizzes included for each Section, test your knowledge!

Workbooks included for each Section, print out the course slides and take notes as you go! 

Some Topics Include: 

Deciphering Security Threats

Social Engineering - Who is watching you?

Identity Theft Protection

Classifying Your Data

Protecting Your Digital Information

Malware - Malicious Software Attackers Use and How to Protect Against It!

Security from All Angles

What is Online Piracy?

Policies Needed to Protect Yourself and Others

Instructor: Ken Mayer

Ken has spent the last 30 years in the world of IT, with a major focus over the last 15 years with security related topics.  He does both training and consulting for many of the world’s largest Telecoms, Fortune 500 companies, as well as smaller enterprises around the world.  He’s certified by Cisco, Juniper, Palo Alto, Microsoft, Ethical Hacking, VMTraining (focused on security), and many other organizations.  He has trained and consulted in the security field for each of these vendors, in their security design, security products (such as Firewalls, Intrusion Prevention, Next-Generation Firewalls and secure designs.  Security has become a relevant and important topic over the last decade, and he’s stayed on the forefront of security related products, auditing, and design.  Ken’s range of topics also goes out to the design of scalable routing and switching infrastructures from the small company to some of the world’s largest Service Providers. 

What are the requirements?

  • A Computer
  • Basic Computer Knowledge

What am I going to get from this course?

  • To teach the student how to protect themselves from computer threats
  • Instructor Led Training by Leading Industry Expert
  • Review Quizzes for Each Section
  • Downloadable Workbooks
  • Learn at Your Own Pace, Entire Video Presentation Program!

What is the target audience?

  • Individuals Who Want To Protect Their Data
  • Home Computer Users
  • Small Business Owners

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Course Overview
01:34

Instructor: Ken Mayer

Ken has spent the last 30 years in the world of IT, with a major focus over the last 15 years with security related topics.  He does both training and consulting for many of the world’s largest Telecoms, Fortune 500 companies, as well as smaller enterprises around the world.  He’s certified by Cisco, Juniper, Palo Alto, Microsoft, Ethical Hacking, VMTraining (focused on security), and many other organizations.  He has trained and consulted in the security field for each of these vendors, in their security design, security products (such as Firewalls, Intrusion Prevention, Next-Generation Firewalls and secure designs.  Security has become a relevant and important topic over the last decade, and he’s stayed on the forefront of security related products, auditing, and design.  Ken’s range of topics also goes out to the design of scalable routing and switching infrastructures from the small company to some of the world’s largest Service Providers. 

Course Introduction
Preview
01:22
Section 01 Introduction
Preview
00:13
What is Security Awareness?
Preview
00:22
Security Domains
Preview
03:37
What is Security?
Preview
01:34
Are You at Risk?
02:18
So What About You?
Preview
01:10
What are the Goals of this Course?
Preview
00:34
What Will We Cover?
Preview
00:47
Surprise!
01:29
Is it Too Late?
00:44
Review
00:30
Course Overview
5 questions
Section 01 Workbook
Preview
12 pages
Section 2: Types of Security Threats
Section 02 Introduction
02:21
Your Computer
03:25
Your Internet
05:34
Yourself
03:53
Your Words
03:00
Your E-mail
02:53
Your Home
02:20
Your Files
04:27
Review
00:40
Types of Security Threats
10 questions
Section 02 Workbook
10 pages
Section 3: Social Engineering
Section 03 Introduction
00:05
What is Social Engineering?
10:27
Social Engineering Defense
03:30
Manipulation
05:37
Why Does it Work?
02:03
Fooling People
02:17
What Else Can Be Done?
03:12
Personal Precautions
02:19
Review
00:32
Social Engineering
10 questions
Section 03 Workbook
9 pages
Section 4: Identity Theft
Section 04 Introduction
00:30
What is Identity Theft? (Part 1)
01:42
What is Identity Theft? (Part 2)
00:59
How Does it Happen? (Part 1)
02:57
How Does it Happen? (Part 2)
02:51
How to Defend Yourself (Part 1)
03:03
How to Defend Yourself (Part 2)
02:30
How to Defend Yourself (Part 3)
04:03
How to Defend Yourself (Part 4)
00:38
What Criminals Do with Your Information (Part 1)
01:51
What Criminals Do with Your Information (Part 2)
01:17
What Criminals Do with Your Information (Part 3)
01:09
How Can You Tell if You’re a Victim?
00:39
Actions to Take if You are a Victim (Part 1)
01:24
Actions to Take if You are a Victim (Part 2)
01:46
Contact Information
00:38
Review
00:30
Identity Theft
10 questions
Section 04 Workbook
18 pages
Section 5: Data Classification
Section 05 Introduction
00:48
Policies for Data Sharing
04:31
Least Privilege
05:29
How to Classify (Part 1)
01:35
How to Classify (Part 2)
03:31
How to Classify (Part 3)
01:36
How to Classify (Part 4)
01:15
How to Classify (Part 5)
02:45
How to Classify (Part 6)
01:19
How to Classify (Part 7)
04:59
Types of Classifications
01:01
Jurisdictional Issues
01:19
Your Involvement
01:49
What Could Happen?
01:54
What Type of Policies?
04:44
How to Destroy Data (Part 1)
02:56
How to Destroy Data (Part 2)
03:22
Review
00:49
Data Classification
10 questions
Section 05 Workbook
16 pages
Section 6: Protecting Your Digital Information
Section 06 Introduction
00:43
Why Do a Backup?
01:30
Types of Backups (Part 1)
05:24
Types of Backups (Part 2)
02:07
What to Backup (Part 1)
02:18
What to Backup (Part 2)
02:27
Where to Store Backups (Part 1)
02:07
Where to Store Backups (Part 2)
02:26
How to Perform Backups
02:21
Demo - Backups
04:24
Backup Utilities (Part 1)
03:56
Backup Utilities (Part 2)
01:36
Backup Management Practices
03:21
Passwords
04:51
Demo - Password Management
05:23
Password Management (Part 1)
04:48
Password Management (Part 2)
01:56
Password Management (Part 3)
01:12

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Career Academy, Producing Quality Technical Training Videos Since 1999

Career Academy was established in 1999 to help people deal with changes and acquire the knowledge and skills they need to compete in the 21st Century. We are the global leader in self paced computer technology training solutions for the IT Professional, providing the most complete and up to date self-paced certification and job related training library available.

Career Academy blends technical know-how and a quality knowledge base and implements that blend throughout the four corners of the globe. It empowers you with complete control over the learning process. Learn via OnDemand Training whenever you want. We have recreated the classroom experience for students who are not able to fit a class schedule into their busy lifestyle. Career Academy provides you the finest instructor led lectures with the latest Technological trends in content development and delivery to help create your own unique learning. 

Ready to start learning?
Take This Course