| Cyber Security Fundamentals |
|
Security Essentials – Course Overview |
|
00:02:00 |
|
IT Security Basics |
|
00:03:00 |
|
The CIA Security Triad |
|
00:04:00 |
| Cyber Threats |
|
End User Security Risks |
|
00:02:00 |
|
E-Mail Phishing Scenario |
|
00:03:00 |
|
Malware Types |
|
00:06:00 |
|
Cyber Breach Consequences |
|
00:04:00 |
| Security Best Practices |
|
Computer Security Best Practices |
|
00:05:00 |
|
E-Mail and Internet Security Best Practices |
|
00:04:00 |
| Remote Access Security |
|
Remote Access Risks Scenario |
|
00:02:00 |
|
Remote Access User Considerations |
|
00:03:00 |
|
Remote Access Best Practices |
|
00:04:00 |
| Conclusion |
|
End User Role in IT Security |
|
00:03:00 |
| Test |
|
Security essentials |
|
00:15:00 |