Book Image

End User Security Awareness [Video]

By : ACI Learning, Daniel Lowrie, Don Pezet
Book Image

End User Security Awareness [Video]

By: ACI Learning, Daniel Lowrie, Don Pezet

Overview of this book

The course begins with a critical look at password security, emphasizing the importance of robust credentials in protecting personal and professional data. Then, it moves on to social engineering, showing you how hackers trick people into giving away their information. You'll learn the importance of being careful about who you trust online. Next, the course covers how to protect your computers and devices from being physically broken into. It also talks about the right way to get rid of old data so that nobody else can find it. This part is all about keeping your stuff safe in the real world. The course also looks at safe and unsafe networks. You'll learn how to check if a network is secure and what to do when using a risky one. Finally, the course dives into malicious software or malware. You'll find out what it is, how to spot it, and how to keep it from messing up your devices. By the end, you'll know how to protect yourself from a lot of the dangers on the internet, turning you from a beginner to someone who's smart about online security.
Table of Contents (1 chapters)
Chapter 1
End User Security Essentials
Content Locked
Section 3
Physical Security
In this episode, Daniel and Dan discuss the physical controls that a company should be using to secure their data. They discuss how physical locks, biometrics and other technologies can be leveraged to maintain data confidentiality. They also explain techniques each end user can employ to help maintain a secure environment.