Mobile Cybersecurity Awareness
4.0 (249 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
5,036 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Mobile Cybersecurity Awareness to your Wishlist.

Add to Wishlist

Mobile Cybersecurity Awareness

Learn How to Prevent Data Breaches, Identity Theft and Fraud via Smartphones, Laptops and Tablets
4.0 (249 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
5,036 students enrolled
Created by Eric Schwartzman
Last updated 1/2015
Price: Free
  • 38 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Lesser known data security risks of free apps like Instagram, Facebook and Twitter, paid apps and mobile malware
  • The riskiest class of metadata you should know about when it comes to mobile security
  • Safest way to access public wireless internet hotspots via laptop, iPhone or Android devices
  • How to use multi-factor authentication to prevent hackers from hijacking your Facebook, Twitter and Google
  • Best practices for safely disposing of handheld other mobile data storage devices
View Curriculum
  • No prior knowledge of mobile security required.

In a world where smartphones store gigabytes or personally identifiable information, human error remains the single biggest threat to the security of your information.

Not taking the cybersecurity precautions covered in this course when you use a smartphone has become riskier than ever.

While no one is 100% secure against a mobile attack, there’s a lot you can do to discourage thieves and hackers from targeting you, your family, friends or colleagues.

All it takes is one wrong click for you to become a victim of identity theft, fraud or a data breach. If your kids, loved ones or coworkers use your mobile device, this course is for them too.

Who is the target audience?
  • Anyone who use a smartphone or other mobile device for communications.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Intro to Mobile Cybersecurity
2 Lectures 04:44

This course on social media and security is designed to help employees protect themselves and their data when they access the Internet and use social media on personal and employer-owned or maintained computers and mobile devices.

The training course introduces non-technical personnel to major threats posed by mobile apps, multi-factor authentication, the risks associated with generating metadata, location-based social networking, geolocator tracking, mobile wireless hot spots, invasive mobile chargers, and safely disposing of digital devices.

Introduction to Mobile Cybersecruity

This course provides insight into how to protect yourself from being hacked or exploited when you use a smartphone or tablet.

But Comply Socially is NOT providing legal advice, determining “best practices,” or telling you what to say or do. The course is provided for informational purposes only.

One of the real values of social media is that it is less formal, more personal, spontaneous and real. Comply Socially is here to educate you so you can use social media in the ways that work for you.

There is no way for us to anticipate or discuss every situation that might arise. If you have a question on what to do, or how to handle something, talk to someone familiar with the legal and practical issues of your situation.

Different states, cities, and companies have different laws and rules that apply. If you're not sure, ask before you act.

What to Expect from this Course
Mobile Cybersecurity Best Practices
6 Lectures 27:15

This lecture provides a basic overview of threats posed by malicious apps as well as popular, legal mobile apps used to perform work or work-related job tasks.

Understanding Mobile App Security

This lecture covers the benefits and drawbacks of multi-factor authentication.

Using Multi-factor Authentication

This lecture explains how users generate metadata passively when they use a mobile device, and how that data could be used against them to compromise their security or the security of their data.

Understanding the Dangers of Metadata

This lecture covers the security risks and practical advantages of disclosing your geographic coordinates on a location-based social network.

Risks of Location-Based Social Networks

This lecture demonstrates how to set-up and use geolocation tracking apps to monitor someone's location. It includes a demo of the "Find My iPhone" mobile app.

How Hackers Use Geolocation Tracking Maliciously

This lecture provides an introduction to the risks associated with connecting to the Internet through a public wireless access point.

How to Safely Access Public Wi-Fi
Mobile Cybersecurity Hardware Threats
3 Lectures 06:18

This lecture talks about the risks of charging your mobile device or laptop off of someone else's charger.

Hacked Chargers: The Latest Cybersecurity Risk

This lecture covers the risks of erasing, selling, donating or improperly disposing of a digital storage or mobile device and provides recommendations for secure data removal.

Safely Disposing of Mobile Digital Storage Devices

This lecture summarizes the personal responsibilities individuals have when they use social media at work.

Mobile Security Awareness Training Wrap-Up
About the Instructor
Eric Schwartzman
4.2 Average rating
3,761 Reviews
53,964 Students
21 Courses
Multidisciplinary team leader

After 15+ years of marketing, public affairs and digital product management experience, I can lead multidisciplinary teams with the urgency of an entrepreneur, the sensitivity of a diplomat and the effectiveness of a scrum master.

I founded the first content management system for corporate communications, iPRSoftware (formerly iPressroom) before applying the merits of big data analytics to public affairs initiatives for the U.S. Dept. of State and DoD.  Currently, I lead digital innovation at a $1B industrial manufacturer responsible for critical infrastructure power equipment.

I'm also a digital product management, demand generation, search engine optimization, email marketing, and marketing automation expert with experience integrating and implements multiple platforms. 

In 2011, I cowrote the best-seller “Social Marketing to the Business Customer," the first book on B2B demand generation and created a portfolio of self-paced online courseware used by more than 36k students.