Book Image

End User Security Awareness [Video]

By : ACI Learning, Daniel Lowrie, Don Pezet
Book Image

End User Security Awareness [Video]

By: ACI Learning, Daniel Lowrie, Don Pezet

Overview of this book

The course begins with a critical look at password security, emphasizing the importance of robust credentials in protecting personal and professional data. Then, it moves on to social engineering, showing you how hackers trick people into giving away their information. You'll learn the importance of being careful about who you trust online. Next, the course covers how to protect your computers and devices from being physically broken into. It also talks about the right way to get rid of old data so that nobody else can find it. This part is all about keeping your stuff safe in the real world. The course also looks at safe and unsafe networks. You'll learn how to check if a network is secure and what to do when using a risky one. Finally, the course dives into malicious software or malware. You'll find out what it is, how to spot it, and how to keep it from messing up your devices. By the end, you'll know how to protect yourself from a lot of the dangers on the internet, turning you from a beginner to someone who's smart about online security.
Table of Contents (1 chapters)
Chapter 1
End User Security Essentials
Content Locked
Section 2
Social Engineering
In this episode, Daniel and Don discuss how attackers can use social engineering to compromise a company's security. They explain how e-mail phishing, impersonation and even picking through the trash can all be used as tools to defeat IT security. They then examine how an end user can recognize these attacks and prevent themselves from being taken advantage of.