Course description
This course will explore types of security threats, both digital and physical. First security end to end, piracy and security policies in both physical security and computer security will be covered. Next, a look at encryption followed by intellectual property and types of piracy. It will finish with discussion of Education and awareness of employees.
Prerequisites
There are no prerequisites.
Learning Paths
This course is part of the following LearnNowOnline SuccessPaths™:
Security Awareness
Meet the expert
As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.
Course outline
Security from End to End and Moving Forward
Security from End to End Part 1 (27:28)
- Introduction (00:10)
- Security from End to End (01:12)
- Physical Security (05:31)
- Other Things to Think About (02:36)
- Home/Workstation Security (01:52)
- Theft (02:03)
- Encryption (02:21)
- Demo: Encryption (02:21)
- Handheld Electronics (03:18)
- Updates (03:25)
- Secure E-mail Use (02:25)
- Summary (00:08)
Security from End to End Part 2 (25:50)
- Introduction (00:08)
- E-mail (01:31)
- Securing E-mail Communication (00:53)
- E-mail Encryption (03:46)
- Unknown Senders (01:45)
- Stopping Spam (01:37)
- E-mail Attachments (02:34)
- Other E-mail Worries (02:17)
- What to Do about E-mail Malware (01:57)
- How to Avoid SPAM (02:24)
- Secure Web Browsing (06:45)
- Summary (00:08)
Security from End to End Part 3 (22:04)
- Introduction (00:08)
- Certificates (01:43)
- Toolbars (01:26)
- Secure Web Browsing (Cont.) (04:07)
- Demo: Secure Web Browsing Basics (07:13)
- Demo: View All Files (04:53)
- Instant Messages and Social Sites (02:23)
- Summary (00:08)
Piracy (15:45)
- Introduction (00:08)
- Piracy (00:19)
- What Is Intellectual Property (01:30)
- Copyright (01:19)
- Software Piracy (04:28)
- Live Piracy (02:10)
- Types of Piracy (01:41)
- Piracy Is Theft (00:55)
- Risks (01:51)
- Financial Losses (01:11)
- Summary (00:08)
Security Policies (16:36)
- Introduction (00:08)
- Security Policies (02:43)
- Security Policies (Cont.) (04:33)
- Security Policies as Agreements (01:41)
- Acceptable Behavior (01:15)
- Defining an Incident (01:47)
- Response Teams (00:51)
- Response Teams (Cont.) (02:02)
- Response Checklist (00:24)
- Response Checklist (Cont.) (01:01)
- Summary (00:08)
Moving Forward (08:35)
- Introduction (00:08)
- Education and Awareness (02:33)
- Education and Awareness (Cont.) (01:41)
- Individuals (01:44)
- Organizations (00:53)
- Security Domains (01:25)
- Summary (00:08)