
4 Courses
Data Integrity
Reports of online scams and cyberattacks are on the rise, but most people don’t heed them until it’s too late. So, what steps can you take immediately to avoid becoming another cautionary tale? One critical security measure is protecting yourself against phishing—when an attacker pretends to be a trusted contact or organization to gain access to personal information.
In this course, you’ll learn exactly what you’re dealing with in a phishing attack and how to spot one. Most importantly, you’ll immediately pick up valuable tips to prevent theft and stop attackers in their tracks.
If you have not registered with our site, please create an account to be able to enroll in our courses.
Data Integrity
Modern-day theft scarcely resembles heists and burglaries of the past—it has evolved into the digital sphere, requiring us to learn new security practices alongside the old ones.
In this course, learn what constitutes confidential data, why it’s important to keep it safe, and essential security best practices that include both cyberspace and physical facilities.
If you have not registered with our site, please create an account to be able to enroll in our courses.
Data Integrity
How do you keep your home safe? At the minimum, most people lock the doors when they leave. Others install motion-sensitive lights or security cameras. Some invest in alarm systems to protect against threats.
But safeguards aren't just for physical spaces. We store highly sensitive data online. Exposure of that data has a far-reaching impact, with consequences more devastating than losing valuables to a thief.
In this short course, you’ll learn strategies to protect yourself online and get tips to block incoming threats. Finally, you’ll review how to act fast to minimize damage if a security breach occurs.
If you have not registered with our site, please create an account to be able to enroll in our courses.
Data Integrity
Social engineering is the art of manipulation to steal information. Unlike cybercrimes that involve cracking complex algorithms, it relies on predictable human behavior to get victims to reveal information voluntarily.
This course provides an overview of how social engineers exploit human psychology to access sensitive information, as well as tips for spotting attacks. By becoming aware of these dangers, you’re less likely to fall victim to various forms of manipulation.
If you have not registered with our site, please create an account to be able to enroll in our courses.