Course description
This course will explore types of security threats, both digital and physical. It will start off with an overview, look at types of threats and also social engineering.
Prerequisites
There are no prerequisites.
Learning Paths
This course is part of the following LearnNowOnline SuccessPaths™:
Security Awareness
Meet the expert
As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.
Course outline
Introduction
Overview (12:42)
- Introduction (00:10)
- Overview (00:22)
- Security Domains (03:37)
- What Is Security? (01:34)
- Are You at Risk? (02:18)
- So What About You? (01:10)
- Course Goals (00:34)
- What Will We Cover? (00:46)
- Social Engineering (01:58)
- Summary (00:08)
Types of Threats (25:52)
- Introduction (00:08)
- Introduction (03:25)
- Your Internet (05:34)
- Yourself (03:54)
- Social Engineering (03:00)
- Your Email (02:53)
- Wardriving (02:20)
- Your Files (04:26)
- Summary (00:08)
Social Engineering (29:44)
- Introduction (00:08)
- What Is Social Engineering? (10:28)
- Social Engineering Defense (03:30)
- Manipulation (05:38)
- Why Social Engineering Works (07:32)
- Personal Precautions (02:18)
- Summary (00:08)