| Introduction | 
								
					|  | Course Overview |  | 00:02:00 | 
								
					|  | IT Basics |  | 00:03:00 | 
								
					|  | CIA Triad |  | 00:04:00 | 
								
					|  | Breach Consequences |  | 00:02:00 | 
								
					| Cyber Risks | 
								
					|  | End User Risks |  | 00:02:00 | 
								
					|  | Remote Access Risks |  | 00:02:00 | 
								
					| Asset Security | 
								
					|  | Information Classification |  | 00:03:00 | 
								
					|  | Protecting Information |  | 00:03:00 | 
								
					|  | Encryption and Access Control |  | 00:03:00 | 
								
					|  | Patch Management |  | 00:03:00 | 
								
					| Best Security Practices | 
								
					|  | Security Practices – E-Mail and Internet |  | 00:04:00 | 
								
					|  | Security Practices – Computer & Workstation |  | 00:05:00 | 
								
					|  | Your Role in IT Security |  | 00:03:00 | 
								
					|  | Comply with Laws and Regulations |  | 00:05:00 | 
								
					| Course Test | 
								
					|  | Course Test – Cyber Security Fundamentals |  | 00:15:00 |