Skip to content
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Login
Sign Up
Login
Sign Up
Login
Sign Up
Home
All Programs
Cybersecurity
Personal Cybersecurity
Personal Cybersecurity
Curriculum
6 Sections
46 Lessons
Lifetime
Expand all sections
Collapse all sections
Chapter 1: Evaluating Your Current Cybersecurity Posture
14
1.1
Don’t be Achilles: Identifying Ways You May Be Less than Secure
1.1
Quiz for Don’t be Achilles: Identifying Ways You May Be Less than Secure
6 Questions
1.2
Identifying Risks
1.2
Quiz for Identifying Risks
7 Questions
1.3
Protecting against Risks
1.3
Quiz for Protecting against Risks
8 Questions
1.4
Evaluating Your Current Security Measures
1.4
Quiz for Evaluating Your Current Security Measures
6 Questions
1.5
Privacy 101
1.5
Quiz for Privacy 101
6 Questions
1.6
Banking Online Safely
1.7
Safely Using Smart Devices
1.8
Cryptocurrency Security 101
1.8
Quiz for Cryptocurrency Security 101
6 Questions
Chapter 2: Enhancing Physical Security
14
2.1
Understanding Why Physical Security Matters
2.1
Quiz for Understanding Why Physical Security Matters
5 Questions
2.2
Taking Inventory
2.2
Quiz for Taking Inventory
5 Questions
2.3
Locating Your Vulnerable Data
2.3
Quiz for Locating Your Vulnerable Data
6 Questions
2.4
Creating and Executing a Physical Security Plan
2.4
Quiz for Creating and Executing a Physical Security Plan
6 Questions
2.5
Implementing Physical Security
2.5
Quiz for Implementing Physical Security
6 Questions
2.6
Security for Mobile Devices
2.6
Quiz for Security for Mobile Devices
5 Questions
2.7
Realizing That Insiders Pose the Greatest Risks
2.7
Quiz for Realizing That Insiders Pose the Greatest Risks
6 Questions
Chapter 3: Cybersecurity Considerations When Working from Home
12
3.1
Network Security Concerns
3.1
Quiz for Network Security Concerns
5 Questions
3.2
Device Security Concerns
3.2
Quiz for Device Security Concerns
6 Questions
3.3
Location Cybersecurity
3.3
Quiz for Location Cybersecurity
5 Questions
3.4
Video Conferencing Cybersecurity
3.4
Quiz for Video Conferencing Cybersecurity
5 Questions
3.5
Social Engineering Issues
3.5
Quiz for Social Engineering Issues
5 Questions
3.6
Regulatory Issues
3.6
Quiz for Regulatory Issues
5 Questions
Chapter 4: Securing Your Accounts
11
4.1
Realizing You’re a Target
4.1
Quiz for Realizing You’re a Target
5 Questions
4.2
Securing Your External Accounts
4.2
Quiz for Securing Your External Accounts
5 Questions
4.3
Securing Data Associated with User Accounts
4.4
Securing Data with Parties You’ve Interacted With
4.4
Quiz for Securing Data with Parties You’ve Interacted With
5 Questions
4.5
Securing Data at Parties You Haven’t Interacted With
4.5
Quiz for Securing Data at Parties You Haven’t Interacted With
6 Questions
4.6
Securing Data by Not Connecting Hardware with Unknown Pedigrees
4.6
Quiz for Securing Data by Not Connecting Hardware with Unknown Pedigrees
5 Questions
Chapter 5: Passwords
20
5.1
Passwords: The Primary Form of Authentication
5.1
Quiz for Passwords: The Primary Form of Authentication
5 Questions
5.2
Avoiding Simplistic Passwords
5.2
Quiz for Avoiding Simplistic Passwords
6 Questions
5.3
Password Considerations
5.3
Quiz for Password Considerations
7 Questions
5.4
Creating Memorable, Strong Passwords
5.4
Quiz for Creating Memorable, Strong Passwords
5 Questions
5.5
Knowing When to Change Passwords
5.5
Quiz for Knowing When to Change Passwords
5 Questions
5.6
Changing Passwords after a Breach
5.6
Quiz for Changing Passwords after a Breach
5 Questions
5.7
Providing Passwords to Humans
5.7
Quiz for Providing Passwords to Humans
5 Questions
5.8
Storing Passwords
5.8
Quiz for Storing Passwords
5 Questions
5.9
Transmitting Passwords
5.9
Quiz for Transmitting Passwords
5 Questions
5.10
Discovering Alternatives to Passwords
5.10
Quiz for Discovering Alternatives to Passwords
5 Questions
Chapter 6: Preventing Social Engineering Attacks
18
6.1
Don’t Trust Technology More than You Would People
6.1
Quiz for Don’t Trust Technology More than You Would People
5 Questions
6.2
Types of Social Engineering Attacks
6.2
Quiz for Types of Social Engineering Attacks
6 Questions
6.3
Six Principles Social Engineers Exploit
6.3
Quiz for Six Principles Social Engineers Exploit
6 Questions
6.4
Don’t Overshare on Social Media
6.4
Quiz for Don’t Overshare on Social Media
6 Questions
6.5
Leaking Data by Sharing Information as Part of Viral Trends
6.5
Quiz for Leaking Data by Sharing Information as Part of Viral Trends
5 Questions
6.6
Identifying Fake Social Media Connections
6.6
Quiz for Identifying Fake Social Media Connections
7 Questions
6.7
Using Bogus Information
6.7
Quiz for Using Bogus Information
5 Questions
6.8
Using Security Software
6.8
Quiz for Using Security Software
5 Questions
6.9
General Cyberhygiene Can Help Prevent Social Engineering
6.9
Quiz for General Cyberhygiene Can Help Prevent Social Engineering
5 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Login
or
Sign Up
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Cybersecurity
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Linkedin
Instagram
Modal title
Main Content