Autoplay
Autocomplete
Previous Lesson
Complete and Continue
DigiHubs - Cybersecurity Awareness Course
Course Introduction
Course Information
Course Introduction (7:15)
Course Resources
Section 1: Introduction to Cybersecurity and Responsible Digital Citizenship
Cybersecurity myths vs truths (14:55)
Basic cybersecurity concepts (4:45)
Prevalent cyber threats and attacks (11:58)
Impacts of cyber attacks on businesses (9:55)
Responsible use of digital (7:12)
Section 2: Avoiding Social Engineering Attacks and Protecting from Cyber Fraud
Psychology of social engineering (9:05)
Social engineering case study (12:18)
Phishing and spotting phishing emails (7:07)
Types of phishing (5:41)
Other social engineering methods (4:51)
Impact of social engineering (7:49)
Cyber fraud and types of cyber fraud (12:50)
Cyber fraud preventive measures (4:03)
Section 3: Protecting Against Viruses and Other Malware
Case study (10:23)
Types of malware (8:31)
Types of malware 2 (5:17)
Signs of a malware attack (5:02)
How malware spreads (4:13)
Malware preventive measures (10:04)
Section 4: Keeping Your Smartphones, Tablets and Computers Safe
Data protection (8:14)
Secure settings for your computer and mobile devices (8:52)
Device security (5:01)
Safe software download and installation (3:14)
Secure remote working (4:33)
Section 5: Keeping Your Online Accounts Secure
Case study (10:43)
Tips to protect your social media and other online accounts (7:15)
Using passwords to protect your data (5:16)
Techniques for creating a memorable password (3:12)
Password hygiene best practices (3:11)
Password manager (3:54)
Extra layer of security (2:34)
Section 6: Protection Against IoT and AI Attacks
Case study (12:07)
IoT and IoT devices (11:35)
Smart homes (11:45)
Smart cities (10:46)
IoT best practices (2:50)
What is AI? (6:27)
Risks associated with AI (4:40)
Protecting yourself from AI risks (4:08)
ChatGPT (13:30)
Safe use of AI software (4:02)
Next Steps
Course Assessment
Case study
Protecting Against IoT and AI Attacks.pdf
Download
Protecting Against IoT and AI Attacks.pdf
Complete and Continue
Discussion
13
comments
Load more
13 comments