Autoplay
Autocomplete
Previous Lesson
Complete and Continue
DigiHubs - Cybersecurity Awareness Course
Course Introduction
Course Information
Course Introduction (7:15)
Course Resources
Section 1: Introduction to Cybersecurity and Responsible Digital Citizenship
Cybersecurity myths vs truths (14:55)
Basic cybersecurity concepts (4:45)
Prevalent cyber threats and attacks (11:58)
Impacts of cyber attacks on businesses (9:55)
Responsible use of digital (7:12)
Section 2: Avoiding Social Engineering Attacks and Protecting from Cyber Fraud
Psychology of social engineering (9:05)
Social engineering case study (12:18)
Phishing and spotting phishing emails (7:07)
Types of phishing (5:41)
Other social engineering methods (4:51)
Impact of social engineering (7:49)
Cyber fraud and types of cyber fraud (12:50)
Cyber fraud preventive measures (4:03)
Section 3: Protecting Against Viruses and Other Malware
Case study (10:23)
Types of malware (8:31)
Types of malware 2 (5:17)
Signs of a malware attack (5:02)
How malware spreads (4:13)
Malware preventive measures (10:04)
Section 4: Keeping Your Smartphones, Tablets and Computers Safe
Data protection (8:14)
Secure settings for your computer and mobile devices (8:52)
Device security (5:01)
Safe software download and installation (3:14)
Secure remote working (4:33)
Section 5: Keeping Your Online Accounts Secure
Case study (10:43)
Tips to protect your social media and other online accounts (7:15)
Using passwords to protect your data (5:16)
Techniques for creating a memorable password (3:12)
Password hygiene best practices (3:11)
Password manager (3:54)
Extra layer of security (2:34)
Section 6: Protection Against IoT and AI Attacks
Case study (12:07)
IoT and IoT devices (11:35)
Smart homes (11:45)
Smart cities (10:46)
IoT best practices (2:50)
What is AI? (6:27)
Risks associated with AI (4:40)
Protecting yourself from AI risks (4:08)
ChatGPT (13:30)
Safe use of AI software (4:02)
Next Steps
Course Assessment
Psychology of social engineering
Avoiding Social Engineering Attacks and Protecting from Cyber Fraud.pdf
Download
Avoiding Social Engineering Attacks and Protecting from Cyber Fraud.pdf
Complete and Continue
Discussion
20
comments
Load more
20 comments