This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Advanced Security Awareness Training by HailBytes
Introduction
Welcome to the course! (3:53)
What is Cybersecurity? (3:27)
Good Security Habits (5:01)
Cybersecurity for Electronic Devices (3:44)
Debunking Some Common Myths (3:33)
Cybersecurity Glossary 2020 - Course Resource
User & Device Accountability
Securing the Internet of Things
Protecting Your Privacy
Understanding Voice over Internet Protocol (VoIP)
Understanding Bluetooth Technology
Understanding Denial-of-Service Attacks
Risks of File-Sharing Technology
Avoiding The Pitfalls of Online Trading
Avoiding Copyright Infringement
Reviewing End-User License Agreements
User & Device Accountability Quiz
Malicious Emails & Phishing
Understanding Your Computer: Email Clients
Using Caution with Email Attachments
Reducing Spam
Benefits of BCC
Benefits & Risks of Free Email Services
Malicious Emails & Phishing Quiz
Malicious Software
Understanding Patches and Software Updates
Understanding Hidden Threats: Rootkits and Botnets
Understanding Hidden Threats: Corrupted Software Files
Understanding Anti-Virus Software
Recovering from Viruses, Worms, and Trojans
Recognizing Fake Antiviruses
Recognizing and Avoiding Spyware
Protecting Against Malicious Code
Malicious Software Quiz
Social Engineering
Using Instant Messaging and Chat Rooms Safely
Real-World Warnings Keep You Safe Online
Keeping Children Safe Online
Dealing With Cyber Bullies
Identifying Hoaxes and Urban Legends
Using Caution With USB Drives
Social Engineering Quiz
Data Leakages
Safeguarding Your Data
Proper Disposal of Electronic Devices
Effectively Erasing Files
Data Leakages Quiz
Passwords & Security Questions
Choosing and Protecting Passwords
Supplementing Passwords
Passwords & Security Questions Quiz
Safe Browsing
How Anonymous Are You?
Staying Safe on Social Networking Sites
Shopping Safely Online
Understanding Your Computer: Web Browsers
Understanding Website Certificates
Evaluating Your Web Browser's Security Settings
Browsing Safely: Understanding Active Content and Cookies
Understanding Your Computer: Operating Systems
Understanding Internationalized Domain Names
Evaluating Your Web Browser's Security Settings
Defending Against Illicit Cryptocurrency Mining Activity
Safe Browsing Quiz
Mobile Devices & Traveling
Protecting Your Portable Device: Physical Security
Protecting Your Portable Device: Data Security
Holiday Traveling with Internet-Enabled Devices
Privacy and Mobile Device Apps
Mobile Devices & Traveling Quiz
Conclusion
Congratulations!
Next Steps
Bonus Lecture: How to Implement a Security Awareness Training Program
Bonus Lecture: How to Implement a Phishing-Prone Training Program
Supplementing Passwords
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock