Mentor Source, a collaboration of distinguished thought leaders, speakers, authors, coaches, and researchers, presents a series of conversations and insights on Cyber Security Awareness. Appropriate for anyone in a business, organizational, or government environment, this series is designed to offer you new perspectives on everyday security from a variety of in-the-trenches practitioners.... Read more Read less
Learn about cyber security and why it is important.
If you're someone who uses technology and has concerns about your digital security then this course, Cyber Security Awareness: Security Overview, is a great course for you. In this course, we will first cover different areas that are top priorities for security organizations. Then we will look at where threats are coming from in our current global environment before finally looking at the reality of cyber attacks in our current global environment.
Given the constant barrage of malware, scams, cyber attacks, and the like, having a firm understanding of how and why cyber security helps to protect users and companies is critical. This course, Building Your Cyber Security Vocabulary, will help get you to that understanding. You'll start with an overview of cyber security and why it matters. Next, you'll learn about the most commonly used vocabulary in the industry, how to use it, and the distinct meaning of some of the words that often get used interchangeably and incorrectly. Last, you'll focus in on using the new vocabulary in a meaningful way, getting your point across in a given situation, and how to tailor your message to a specific audience. When you're finished with this course, you should be ready to understand and use the common language surrounding cyber security risks, threats, attacks, and solutions.
Are you a modern-day internet user who is concerned about protecting your identity? If so, then this course in the cyber security awareness series by MentorSource, The Importance of Identity Protection, is just the course for you. In this course you'll first explore types of identity that can be stolen before moving onto ways to protect your identity. Finally, you'll look at password security and how important it is in protecting your identity.
Learn about the various security threats that exist and how to mitigate them.
Do you feel concerned about threats to your cyber security by malware? If so this course is for you! Join us as first we learn a little background about malware before learning about the risks and implications, and then finally moving on to ways to protect ourselves and our company from dangerous malware.
If you work in any sort of business environment or deal with personal transactions through the Internet then you need to be aware of phishing and whaling attacks. In this course, Cyber Security Awareness: Phishing and Whaling, you will learn how to protect yourself. First, you'll learn about what exactly phishing is before moving on to the various methods of attacks and how to reduce your risk. Next, you'll learn about whaling attacks and what to watch for. Finally, you'll learn about last measures and how to be successful against all attacks.
As we rely more and more on technology, people are becoming and more and more complacent with the information they share with friends and family. If you have a concern about how you might be sharing information inadvertently, then this course, Cyber Security Awareness: Social Engineering, can help. First, you'll look at the background and topics that make up social engineering. Then, you'll explore some of the common areas risks arise out of including the Stranded Traveler, Baiting, and RFID Theft. Finally, you will learn about countermeasures for all these threats. By the end of this course, you'll have a better understanding of the types of risks you take when sharing information and how to prevent them.
Have you ever purchased anything through the Internet? With e-commerce becoming more and more available and preferred, it's important to know the dos and don'ts of e-commerce. This course, Cyber Security Awareness: Electronic Commerce Security, will teach you what you need to know for safe e-commerce. First you will learn how to secure your electronic commerce connections. Next you will look at mitigation controls. Finally, you'll end the course looking at the different compliance laws that govern transactions. By the end of this course, you'll have a solid foundation of the security practices needed to navigate the e-commerce world.
Are you someone who uses social media? If you are, then Cyber Security Awareness: Social Networking at Work is the course for you. First, you'll explore social media, the risks associated with it and why hackers want to use it to find your information. Then you'll look at how you can mitigate social media risks before ending with steps to stay safe. By the end of this course, you'll have the knowledge to keep your information - and yourself, more secure.
Learn the basics of cloud security, and best practices for when you’re on-the-go.
With so much of technology today dependent on cloud computing, it is important to ensure that your business has cloud security in mind. In this course, you will be learning about the basics of cloud computing, security best practices for clouds, and other cloud security considerations that will ensure success for your business.
Are you a cloud user who has concerns about security? This course, Cyber Security Awareness: Security for Cloud Services, can help you use these services with greater security. First, you will run through a quick cloud architecture overview before moving on and talking about clouds and security. Finally, you will look at cloud risk mitigation strategies to help mitigate risks and employ best practices for cloud usage.
Have you ever found yourself on the road connecting to a public access point? If you have, you might have put yourself at risk from a security standpoint. In this course, Cyber Security While Traveling, you'll learn about situations where you're at risk and how to keep your information and electronics secure. First, you'll learn about the important "Travel Triangle of Security." Then, you'll explore different wireless and wired situations as well as the concerns that might come from them. Finally, this course will cover threats and countermeasures with a demonstration on how to best protect yourself. By the end of this course, you'll be able to apply what you've learned about cyber security to keep your data secure, whether in the airport, on the train, or across the globe.
Have you ever found yourself connecting to a Wi-Fi hotspot at a coffee shop and wondering how someone could figure out where you are? This course, Cyber Security Awareness: Security by Geolocation will help you understand how a geological presence with each signal. First, you will get a look at the heavy dependence on wireless technology and what it opens a user up to. Then, you will explore how wardriving can be used for a defensive purpose. You will also see triangulation, trilateration, and multilateration methods of geolocation. Finally, you will see some of the products available to perform geolocation. When you're finished with this course, you will better understand how to locate wireless signal sources using geolocation techniques.
If you are like the millions of people these days who use a mobile device for more than simply receiving and making phone calls then this course in the Cyber Security Awareness series, Mobile Device Security is the course for you. In the course, we will first look at the way that mobile devices have been used and adapted for everyday use. Then we will explore the most common ways devices are exploited before ending with ways to mitigate the common vulnerabilities.
More and more, the world has come to rely on the availability of portable data. If you are someone who is concerned about how to protect your portable data, then this course is for you. First, you'll learn about the current trends in data protection in several major fields like health care, business, the financial sector, and personal use. Then you'll explore the legal constraints around the data other companies hold. Finally, you'll end the course learning about the ways to protect yourself and your data. By the end of this course, you'll have a greater understanding of protection you'll need to keep your portable data secure.
Learn techniques that can be used to help keep your information safe.
Have you ever worried about how to back up your important data so that you or your business is not at risk of losing valuable information? If you have, then this course is for you! First, you will learn about different security plans. Then, you will learn about the information risks associated with data backups. Finally, you'll spend some time exploring the best practice procedures and schedules for backing up your data.
As we become more and more dependent on digital communications it is important to be aware of how to send and receive safer digital communications. In this course, Cyber Security Awareness: Safer Digital Communications, you'll learn about how to harden your systems and networks before exploring how to protect your identity from some of the common internet dangers. Finally, the course will look at data scrambling and how to secure your networks.
Malicious individuals getting access to your data is always something to be concerned about. This course, Cyber Security Awareness: Digital Data Protection, hopes to help alleviate some of those conerns. First, you will learn about the nature of data thefts today. Next, you'll dive into learning about digital data theft. Finally, you'll explore different fixes that are available to make your data usage safer. By the end of this course, you should feel more confident in your ability to protect you're own data.
Do you worry about how your physical security vulnerabilities might also weaken your digital security? If so this course is for you! First you'll learn why physical and digital security are so important. Next, you'll discover how to integrate the two securities before finishing up by looking at how to avoid complacency through good policy.
As society becomes more and more reliant upon the Internet, more and more people are sharing Personally Identifiable Information (PII) across the web. This course, Cyber Security Awareness: Identifying Personally Identifiable Information (PII), will help you learn how to be more secure about the information you share. First, you will look at exactly what makes up PII. Then, you'll explore the legal and regulatory influences that determine what PII is protected. Finally, you'll dive into common PII breach situations and learn about remedies for when your PII has been breached. By the end of this course, you'll have a better understanding in how to protect your PII.
Have you joined the global movement of people who are connected through the IoT? If so, Cyber Security Awareness: The Internet of Things (IoT), is the course for you. First you'll take a quick look at the current cyber environment before addressing security concerns that come when dealing with kids, robots, health devices, smart cars, and drones. Finally you'll look at some protective measures that can be employed to better protect your interests.
There are no prerequisites required for this path.