Learn your way! Get started

Digital Security Awareness, Part 4 of 4: Security

with expert Kenneth Mayer


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 12/29/2017
Level Beginner
Runtime 1h 56m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

This course will explore types of security threats, both digital and physical. First security end to end, piracy and security policies in both physical security and computer security will be covered. Next, a look at encryption followed by intellectual property and types of piracy. It will finish with discussion of Education and awareness of employees.

Prerequisites

There are no prerequisites.

Learning Paths

This course is part of the following LearnNowOnline SuccessPaths™:
Security Awareness

Meet the expert

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.

Course outline



Security from End to End and Moving Forward

Security from End to End Part 1 (27:28)
  • Introduction (00:10)
  • Security from End to End (01:12)
  • Physical Security (05:31)
  • Other Things to Think About (02:36)
  • Home/Workstation Security (01:52)
  • Theft (02:03)
  • Encryption (02:21)
  • Demo: Encryption (02:21)
  • Handheld Electronics (03:18)
  • Updates (03:25)
  • Secure E-mail Use (02:25)
  • Summary (00:08)
Security from End to End Part 2 (25:50)
  • Introduction (00:08)
  • E-mail (01:31)
  • Securing E-mail Communication (00:53)
  • E-mail Encryption (03:46)
  • Unknown Senders (01:45)
  • Stopping Spam (01:37)
  • E-mail Attachments (02:34)
  • Other E-mail Worries (02:17)
  • What to Do about E-mail Malware (01:57)
  • How to Avoid SPAM (02:24)
  • Secure Web Browsing (06:45)
  • Summary (00:08)
Security from End to End Part 3 (22:04)
  • Introduction (00:08)
  • Certificates (01:43)
  • Toolbars (01:26)
  • Secure Web Browsing (Cont.) (04:07)
  • Demo: Secure Web Browsing Basics (07:13)
  • Demo: View All Files (04:53)
  • Instant Messages and Social Sites (02:23)
  • Summary (00:08)
Piracy (15:45)
  • Introduction (00:08)
  • Piracy (00:19)
  • What Is Intellectual Property (01:30)
  • Copyright (01:19)
  • Software Piracy (04:28)
  • Live Piracy (02:10)
  • Types of Piracy (01:41)
  • Piracy Is Theft (00:55)
  • Risks (01:51)
  • Financial Losses (01:11)
  • Summary (00:08)
Security Policies (16:36)
  • Introduction (00:08)
  • Security Policies (02:43)
  • Security Policies (Cont.) (04:33)
  • Security Policies as Agreements (01:41)
  • Acceptable Behavior (01:15)
  • Defining an Incident (01:47)
  • Response Teams (00:51)
  • Response Teams (Cont.) (02:02)
  • Response Checklist (00:24)
  • Response Checklist (Cont.) (01:01)
  • Summary (00:08)
Moving Forward (08:35)
  • Introduction (00:08)
  • Education and Awareness (02:33)
  • Education and Awareness (Cont.) (01:41)
  • Individuals (01:44)
  • Organizations (00:53)
  • Security Domains (01:25)
  • Summary (00:08)