Genre: eLearning | Language: English + .VTT | Duration: 1 hour | Size: 1.49 GB
What Will I Learn?
You will learn how to prevent an attack, how to detect an attack and how to react to an attack appropriately.
You will learn how to convey effective defense techniques without getting overly suspicious and being unhelpful to legitimate customers.
You will learn how to balance trust with verification.
Requirements
You should know how to use a computer.
A basic understanding of operating systems, networks, and the Internet is helpful.
You should be able to download documents and install software.
Description
Cybersecurity has never been more prominent in the news than these days. Colossal breaches made headlines across the globe. In nearly all cases it was a human who clicked on an attachment that installed malware or unveiled sensitive information. Becoming aware of cyber attack tactics and techniques will reduce the chances of a data breach dramatically.
In a modern world, everyone will soon be connected in some way via computers, smartphones, and other devices, leaving a wide range of opportunities for those who act unlawfully.
Who is the target audience?
This course is intended for every organization and employee that uses email and the Internet in general.
This course is intended for individuals and organizations, that want to reduce the risk of data breaches.
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.