This course will help you identify potential cyberthreats, including commonly seen cyberattacks such as malware, phishing, and session hijacking.
After this course, you will learn how to take important steps to protect your company’s valuable information. Cyber-crime syndicates, along with the prevalence of mobile and cloud-based computing trends, have increased the risk of security breaches for all organizations.
As you progress through this course, you will learn how to control physical access to your company’s computers and develop best practices for preserving your information assets. You will also examine the ways in which humans pose risks to information security. By the end of this course, you will be able to implement effective strategies for protecting passwords, working with contractors, and using encryption to safely access data on mobile devices. This brief video course includes audio narration, exercises, a final quiz, and an ask-a-mentor email feature for a complete learning experience.
Key objectives include:
*All licenses purchased for this course expire one year after the purchase date.
*1 seat per license is considered one launch; once this course is launched, it may not be reused.
*Each user must complete the course individually; this is not a group course.