You are NOT signed in as a student! Your progress will not be saved and you won't see milestones on your ZTM Passport.
Make sure you are logged into
Academy
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity for Beginners
Introduction
Introduction (2:08)
Exercise: Meet Your Classmates and Instructor
Introduction to Cybersecurity
The CIA Triangle & Why Cybersecurity Is Important (7:16)
How People Get Hacked (6:56)
Social Engineering, Phishing, and Prevention
Email Phishing (20:19)
Smishing (8:52)
Vishing (15:36)
Online Privacy (3:59)
Social Engineering Awareness Training (6:10)
Malware
Most Common Malwares (9:22)
Protection Against Malware (4:27)
How To Recognize Malware (4:43)
Endpoint Device Protection
Windows Device Protection (9:40)
MacOS Protection (7:59)
Smartphone Protection (6:13)
Policies
Security Policies (7:42)
Password Policies (10:01)
Onboarding & Offboarding (10:47)
BYOD (7:54)
Employee Responsibility & Remote Work Security (11:59)
Reporting Procedures (6:29)
Web Browsing Security
Choosing The Best Browser (4:54)
Best Browser Settings (8:13)
How To Securely Download (3:50)
The Dangers of Clicking on Links! (Beef Framework) (7:26)
Securing Online Accounts
Password Management (10:38)
2FA (4:30)
Data Handling
Storing Data Securely (4:30)
Transferring Data Securely (3:10)
Data Privacy Regulations (GDPR, CCPA, HIPPA) (5:57)
Additional Things To Keep You Safe!
Physical Security (5:58)
Finding Out About Emerging Threats & Vulnerabilities (5:09)
Where To Go From Here?
Review This Byte!
Best Browser Settings
This lecture is available exclusively for ZTM Academy members.
If you're already a member,
you'll need to login
.
Join ZTM To Unlock All Lectures