Cyber risks can cause damage to organizations and individuals.
In this course, Cyber Security Essentials: Your Role in Protecting the Company, you’ll learn to recognize cyber attacks and know what to do. First, you’ll explore how to protect your user accounts on systems at work and at home. Next, you’ll discover the ways that criminals work and how simple things can stop them. Finally, you’ll learn how to look after your data and your organization’s data when you are not in the office. When you’re finished with this course, you’ll have the skills and knowledge of cyber risks and attacks needed to protect yourself and your organization.
Course Overview My name is John Elliott. Welcome to my course, Cybersecurity Essentials: Your Role in Protecting the Company. I've been helping organizations defeat cyber attacks and look after their information for over 10 years. In that time, the skill, ambition, and persistence of cyber attackers has massively increased. Today, all companies are potential targets for having their data stolen or systems made inoperable. And at home, you and your family are subject to similar risks. Now you may be thinking that this isn't particularly relevant to you because there's a whole team of people in your company whose job it is to protect the company from cyber attacks. I'm going to be really honest with you. Cybersecurity and information security are imperfect. No matter how good that team is, some attacks will get through to you. And at home, you don't have that same sort of team to protect you. Everyone who uses a computer has a role to play in protecting the company from attackers and avoiding cyber accidents. In this course, we're going to discover who the attackers are, what they want, how they go about attacking companies like yours, and how you can stop them. Some of the major topics we will cover include techniques to spot phishing attacks, staying safe at home, in the office, and while traveling, why software always seems to need to be updated, and how to prevent attackers getting hold of your username and password. There are no prerequisites for this course other than making sure the next 60 minutes will be interruption‑free. Don't worry, this isn't a technical course. I promise you that there's no impenetrable language, just sensible things you can do to keep your company and your family secure. By the end of this course, you'll be able to recognize a cyber attack in the ways that criminals, corporate spies, and hostile foreign governments try to trick you. I hope you'll join me on this journey to learn about cyber attacks and how to stop them with the Cybersecurity. Essentials: Your Role in Protecting the Company course here, at Pluralsight.