-
Avoiding Social Engineering Scams
After watching this video; you will be able to describe techniques to avoid being a victim of social engineering scams.
-
Communications Risks to Corporate Computers and Devices
After watching this video; you will be able to identify the threats to corporate security that can result from unsecured communications technologies.
-
Computer and Hardware Security Policies
After watching this video; you will be able to identify computer and hardware security policy best practices.
-
Definition of IT Security
After watching this video; you will be able to describe what IT security is and what it includes.
-
E-mail and Internet Security Policies
After watching this video; you will be able to identify e-mail and Internet security policy best practices.
-
E-mail Usage Threats
After watching this video; you will be able to identify the potential threats from unsecured e-mail usage.
-
End User Role in IT Security
After watching this video; you will be able to identify the end user's role in overall IT security.
-
File Encryption and Access Controls
After watching this video; you will be able to describe characteristics and best practices for using file encryption and access controls to protect your corporate computer.
-
Human Error Security Threats
After watching this video; you will be able to describe characteristics of human error threats to corporate computer security.
-
Internet Usage Threats
After watching this video; you will be able to describe the common corporate security risks of Internet usage.
-
IT Security Policy Fundamentals
After watching this video; you will be able to describe general IT policy characteristics.
-
Malicious Behavior Security Threats
After watching this video; you will be able to describe characteristics of malicious behavior that threatens corporate computer security.
-
Malware Threats
After watching this video; you will be able to distinguish between the different types of malware threats.
-
Mobile Device Security Policies
After watching this video; you will be able to identify mobile device security policy best practices.
-
Password Security Policies
After watching this video; you will be able to identify password security policy best practices.
-
Physical Security Threats
After watching this video; you will be able to identify potential physical security threats to corporate mobile devices.
-
Protecting Computers against Malicious Behavior
After watching this video; you will be able to identify best practices for protecting your corporate computer against malicious behavior.
-
Protecting Mobile Devices against Malware Threats
After watching this video; you will be able to identify best practices for securing corporate mobile devices against common malware threats.
-
Protecting Mobile Devices against Network Threats
After watching this video; you will be able to identify best practices for securing corporate mobile devices against common wireless network threats.
-
Protecting Mobile Devices against Physical Threats
After watching this video; you will be able to identify best practices for securing corporate mobile devices against common physical threats.
-
Remote User Considerations
After watching this video; you will be able to describe the specific security considerations for remote users.
-
Remote User Policy Best Practices
After watching this video; you will be able to identify remote user security policy best practices.
-
Role of IT Security
After watching this video; you will be able to identify the role and purpose of IT security in the corporate environment.
-
Secure E-mail Use Best Practices
After watching this video; you will be able to describe best practices for ethical and safe e-mail use.
-
Secure Internet Usage Best Practices
After watching this video; you will be able to identify secure corporate Internet usage best practices.
-
Secure Social Networking Practices
After watching this video; you will be able to identify best practices when using social networking platforms.
-
Securing Corporate Devices Against Threats
After watching this video; you will be able to identify best practices for securing both corporate computers and corporate mobility devices against common threats.
-
Social Engineering Scam Characteristics
After watching this video; you will be able to identify characteristics and risks of social engineering scams.
-
Social Networking Security Challenges
After watching this video; you will be able to identify risks to corporate systems from unsecured social networking activities.
-
Social Networking Security Policies
After watching this video; you will be able to identify social networking security policy best practices.
-
System Patches
After watching this video; you will be able to describe characteristics and best practices for using system patches to protect your corporate computer.
-
The CIA Security Triad
After watching this video; you will be able to distinguish between confidentiality; integrity; and availability security objectives.
-
Using Secure Corporate Communications Methods
After watching this video; you will be able to identify best practices for securely using corporate e-mail; access webmail; Internet use; and social networking activities.
-
Webmail Access Best Practices
After watching this video; you will be able to identify best practices for securely accessing webmail services.
-
Webmail Access Threats
After watching this video; you will be able to identify the common security threats to corporate systems and infrastructure from using unsecured webmail access at work.
-
Wireless Network Threats
After watching this video; you will be able to identify characteristics of threats to mobile devices via wireless networks.
-
Work Environment IT Security Policies
After watching this video; you will be able to identify fundamental IT security best practices for the work environment.
-
Antivirus Software
After watching this video; you will be able to describe characteristics and best practices for using antivirus software to protect your corporate computer.