Cybersecurity Awareness Training
4.2 (782 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
9,453 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Cybersecurity Awareness Training to your Wishlist.

Add to Wishlist

Cybersecurity Awareness Training

Protect Against Social Engineering and Phising Scams with Social Media Security Awareness Training
4.2 (782 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
9,453 students enrolled
Created by Eric Schwartzman
Last updated 1/2015
English
Price: Free
Includes:
  • 38 mins on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • How to choose a password that’s difficult to hack but easy to remember
  • Not all apps are mobile -- manage the risks of installing third-party desktop apps in social networking accounts
  • How to use two-factor authentication on Facebook, Twitter and Google
  • Spot malware, spyware, ransomeware, virus, spear phishing and social engineering scams
View Curriculum
Requirements
  • This course, created primarily for nontechnical users, makes complex information security best practices easy for anyone to appreciate and understand.
Description

Learn Best Practices for Stopping Data Breaches, Fraud and Identity Theft

Even the best cybersecurity software con’t stop you from choosing a weak password, clicking a bad link or installing a social networking app that snoops into your address book, calendar or geodata.

And that’s not all. With cybercrime and corporate espionage on the rise, we’ve entered the age where even private digital correspondence should be created to withstand public scrutiny. This course teaches you how.

The risks are everywhere. 11.5 million people are victims of identity fraud each year and that number is rising. And it takes 330 hours, on average, to repair the damage.

Protect yourself, your family and your work. Get this introductory course right now and learn how to safeguard your data and reputation.

Who is the target audience?
  • Anyone who wants to minimize cybercrime risks when they use online communication services like email and social networks.
  • this course is appropriate for anyone with access to a secure network who also use social networks, such as loved ones, children ages 9 and up and coworkers.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
+
Intro to Cybersecurity
4 Lectures 11:02

This course on social media and security is designed to help employees protect themselves and their data when they access the Internet and use social media on personal and employer-owned or maintained computers and devices.

The training introduces non-technical personnel to basic IT security, browser security, password security, malware, spyware, virus threats, the use of two-factor authentication on Gmail, Facebook and Twitter, phishing and social engineering scams, social media security and social networking app security.

Cybersecurity Course Overview
02:43

This course provides insight into which kinds of digital employee communications can and can't be legally monitored.

But Comply Socially is NOT providing legal advice, determining “best practices,” or telling you what to say or do. The course is provided for informational purposes only.

One of the real values of social media is that it is less formal, more personal, spontaneous and real. Comply Socially is here to educate you so you can use social media in the ways that work for you.

There is no way for us to anticipate or discuss every situation that might arise. If you have a question on what to do, or how to handle something, talk to someone familiar with the legal and practical issues of your situation.

Different states, cities, and companies have different laws and rules that apply. If you're not sure, ask before you act.

What to Expect from this Course
01:59

This lecture provides a basic overview of what type of information should never be shared publicly online, the most common way criminals obtain personally identifiable information and how to protect yourself and your employer against identity theft.

Understanding Information Security
03:32

This lecture introduces basic principles of information security (IS) including strategies for safeguarding passwords from individuals, browsers and spyware.

Securing Your Identity and Digital Communications
02:48
+
Understanding Cybersecurity Threats
6 Lectures 25:39

This lecture explains how attackers use malicious software or malware to disrupt your computer or mobile device or to steal information.

Intro to Malware, Ransomware and Spyware
03:09

This lecture provides an introductory overview to the significance of accessing sites located at HTTPS web addresses, versus those at HTTP addresses. Reference link: https://www.eff.org/https-everywhere

Understanding the S in HTTPS Access
03:42

This lecture presents strategies for choosing passwords that are easy to remember but tough to crack. Reference links: Account Logon (www.accountlogon.com)

LastPass (https://lastpass.com) and Roboform (www.roboform.com)

Best Practices for Choosing and Remembering Passwords
04:47

This lecture teaches strategies for recognizing and resisting phishing attempts of varying sophistication as well as how and where to report phishing attempts. Reference links: FBI’s Internet Fraud Complaint Center - https://www.ic3.gov/default.aspx

Organizations that accept reports of phishing attempts:

mailto:reportphishing@antiphishing.org

mailto:spam@uce.gov

mailto:abuse@microsoft.com

mailto:enforcement@sec.gov (securities related)

Recognizing Sophisticated Spear Phishing Scams
06:33

This lecture teaches strategies for recognizing and resisting social engineering attempts of varying sophistication.

Exploiting Human Psychology with Social Engineering
05:14

This lecture highlights the risks of granting third-party apps and services access to your social networking accounts.

To manage third-party apps:

FB Privacy Settings > Apps (include screencast demo)

Google > Account > Security > Connects Applications and Sites

Twitter > Profile > Apps

LinkedIn > Profile > Privacy & Settings > Groups, Companies & Applications > View Your Applications

Securing Desktop Apps that Access Social Networks
02:14
+
Concluding Lessons
2 Lectures 01:44

This lecture provides an introductory overview of the Social Media and Mobile Security training, our second security training course and the Federal Trade Commission’s Identity Theft Resource Center. Reference link: http://www.consumer.ftc.gov/features/feature-0014-identity-theft

What to do if Your Identity is Stolen
00:50

This lecture summarizes the personal responsibilities individuals have when they use social media at work.

What You Learned in this Course
00:54
About the Instructor
Eric Schwartzman
4.2 Average rating
3,119 Reviews
46,007 Students
21 Courses
Multidisciplinary team leader

After 15+ years of marketing, public affairs and digital product management experience, I can lead multidisciplinary teams with the urgency of an entrepreneur, the sensitivity of a diplomat and the effectiveness of a scrum master.

I founded the first content management system for corporate communications, iPRSoftware (formerly iPressroom) before applying the merits of big data analytics to public affairs initiatives for the U.S. Dept. of State and DoD.  Currently, I lead digital innovation at a $1B industrial manufacturer responsible for critical infrastructure power equipment.

I'm also a digital product management, demand generation, search engine optimization, email marketing, and marketing automation expert with experience integrating and implements multiple platforms. 

In 2011, I cowrote the best-seller “Social Marketing to the Business Customer," the first book on B2B demand generation and created a portfolio of self-paced online courseware used by more than 36k students.