Learn your way! Get started

Digital Security Awareness, Part 1 of 4: Threats

with experts Kenneth Mayer, Mike Biocchi


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 6/7/2021
Level Beginner
Runtime 1h 1m
Closed captioning Included
Transcript Included
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

Digital Security is an ever growing and more complex topic as time goes on. This course will start you off with to what are threats, what is social engineering and how to understand and define risk.

Prerequisites

There are no prerequisites.

Meet the experts

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.

Dr. Michael Biocchi completed his PhD and has received his Masters of Science as well as his Bachelor of Computer Science. Michael is a Certified Information Systems Security Professional (CISSP). He is currently a full-time professor teaching a variety of computer science courses. These courses include: Artificial Intelligence, Security and Privacy, Project Management, PHP/MySQL, Distributed Systems, as well as many others. Michael also runs a small consulting business. He works with businesses in developing risk assessment, policy creation, business continuity planning, disaster recovery planning, and security awareness.

Course outline



Threats

Threats (12:42)
  • Introduction (00:10)
  • Overview (00:22)
  • Security Domains (03:37)
  • What Is Security? (01:34)
  • Are You at Risk? (02:18)
  • So What About You? (01:10)
  • Course Goals (00:34)
  • What Will We Cover? (00:46)
  • Social Engineering (01:58)
  • Summary (00:08)
Social Engineering (29:44)
  • Introduction (00:08)
  • What Is Social Engineering? (10:28)
  • Social Engineering Defense (03:30)
  • Manipulation (05:38)
  • Why Social Engineering Works (07:32)
  • Personal Precautions (02:18)
  • Summary (00:08)
Risk (19:14)
  • Introduction (00:08)
  • What Is Risk? (02:38)
  • What Are Threats? (01:55)
  • Why Worry? (02:14)
  • Risk Options (00:52)
  • Eliminate (00:57)
  • Mitigate (00:37)
  • Share (01:33)
  • Ignore (01:06)
  • Accept (01:07)
  • Single Point of Failure (01:36)
  • Reducing Risk (01:38)
  • What Else Can Be Done? (02:39)
  • Summary (00:08)