Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cybersecurity for Beginners
Introduction
Introduction (2:08)
Exercise: Meet Your Classmates and Instructor
Introduction to Cybersecurity
The CIA Triangle & Why Cybersecurity Is Important (7:16)
How People Get Hacked (6:56)
Social Engineering, Phishing, and Prevention
Email Phishing (20:19)
Smishing (8:52)
Vishing (15:36)
Online Privacy (3:59)
Social Engineering Awareness Training (6:10)
Malware
Most Common Malwares (9:22)
Protection Against Malware (4:27)
How To Recognize Malware (4:43)
Endpoint Device Protection
Windows Device Protection (9:40)
MacOS Protection (7:59)
Smartphone Protection (6:13)
Policies
Security Policies (7:42)
Password Policies (10:01)
Onboarding & Offboarding (10:47)
BYOD (7:54)
Employee Responsibility & Remote Work Security (11:59)
Reporting Procedures (6:29)
Web Browsing Security
Choosing The Best Browser (4:54)
Best Browser Settings (8:13)
How To Securely Download (3:50)
The Dangers of Clicking on Links! (Beef Framework) (7:26)
Securing Online Accounts
Password Management (10:38)
2FA (4:30)
Data Handling
Storing Data Securely (4:30)
Transferring Data Securely (3:10)
Data Privacy Regulations (GDPR, CCPA, HIPPA) (5:57)
Additional Things To Keep You Safe!
Physical Security (5:58)
Finding Out About Emerging Threats & Vulnerabilities (5:09)
Where To Go From Here?
Review This Byte!
Transferring Data Securely
This lecture is available exclusively for ZTM Academy members.
If you're already a member,
you'll need to login
.
Join ZTM To Unlock All Lectures