Description: The advancement in corporate communications and social networking has opened countless opportunities and new ways for people to perform their jobs. But just as our IT communications options have advanced, so have the security threats posed by these advancements. In this course you'll learn about the common threats to corporate computers and devices that exploit vulnerabilities in our communications and networking methods such as e-mail, Internet, and social networking platforms. This course also covers best practices and techniques to mitigate security risks while conducting communications as part of your job. Finally this course covers what social engineering is, and how as an end user of corporate computers and devices you can protect yourself and your company from the intelligent ways hackers use social engineering.
Target Audience: End users of computer systems and mobile devices in a corporate environment, individuals interested in fundamentally secure computers, and communications practices
Duration: 00:46
Description: Knowing how to use corporate computers and devices in a secure way helps ensure you don't jeopardize your work, your organization, or your personal security. In this course you'll learn about common threats to corporate computers, including malicious attacks, and best practices for using your computer in ways that prevent these attacks. This course also covers some of the security threats you might face when using corporate mobile devices, and techniques you can use to protect your device and yourself.
Target Audience: End users of computer systems and mobile devices in a corporate environment, individuals interested in fundamentally secure computers, and communications practices
Duration: 00:50
Description: Companies that have the greatest chance of fending off IT security attacks are those that have employees who are armed with the knowledge of how to use a company's computers, network, and mobile devices with security in mind. In this course, you'll learn fundamental security concepts that apply to use as an end user, like the role you play in your company's overall IT security. This course also covers some of the most common IT security policies that apply to you as an end user, including policies for secure computer use, mobile device use, and general security policies if you work remotely.
Target Audience: End users of computer systems and mobile devices in a corporate environment, individuals interested in fundamentally secure computers, and communications practices
Duration: 00:51