6 Courses
Information Technology
This course provides a comprehensive overview of social engineering, a technique used by cybercriminals to exploit human psychology and gain unauthorized access to systems or sensitive information. Students of this course will explore various social engineering methods.
What you will learn:
Information Technology
The Online Security Fundamentals course provides a comprehensive introduction to the principles and practices necessary for protecting digital information and online activities. As cyber threats become increasingly sophisticated, understanding how to safeguard personal and organizational data is crucial. This course covers fundamental security concepts, common threats, and best practices for ensuring a secure online presence.
Information Technology
This course provides essential knowledge and practical skills for identifying, preventing, and responding to phishing attacks, one of the most common and effective forms of cybercrime. Participants will learn about the various types of phishing attacks, how to recognize suspicious activities, and best practices for personal and organizational information from these threats.
Information Technology
This course provides practical guidance on protecting personal and sensitive data from theft, loss, and unauthorized access. As data breaches and cyber threats become increasingly prevalent, understanding how to secure your information is essential for maintaining privacy and security. Participants will learn about potential risks, and effective strategies to safeguard their data in various contexts.
Information Technology
This course is a beginner’s level course on the topic of Incident Response Planning. Take a deep dive into what the NIST Incident Response Plan is, why it is important, and ways that you can incorporate it into your business.
Information Technology
This course provides a comprehensive introduction to the field of cybersecurity, emphasizing the principles, practices, and tools necessary to protect information systems. Students will explore the various types of cyber threats and vulnerabilities, as well as the fundamental strategies for risk management and incident response.