Skip to content
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Login
Sign Up
Login
Sign Up
Login
Sign Up
Home
All Programs
Cybersecurity
Securing a Business
Securing a Business
Curriculum
7 Sections
55 Lessons
Lifetime
Expand all sections
Collapse all sections
Chapter 1: Securing Your Small Business
13
1.1
Making Sure Someone Is In Charge
1.1
Quiz for Making Sure Someone Is In Charge
5 Questions
1.2
Watching Out for Employees
1.3
Dealing with a Remote Workforce
1.3
Quiz for Dealing with a Remote Workforce
6 Questions
1.4
Considering Cybersecurity Insurance
1.4
Quiz for Considering Cybersecurity Insurance
5 Questions
1.5
Complying with Regulations and Compliance
1.5
Quiz for Complying with Regulations and Compliance
7 Questions
1.6
Handling Internet Access
1.6
Quiz for Handling Internet Access
7 Questions
1.7
Managing Power Issues
1.7
Quiz for Managing Power Issues
5 Questions
Chapter 2: Cybersecurity and Big Businesses
14
2.1
Utilizing Technological Complexity
2.1
Quiz for Utilizing Technological Complexity
5 Questions
2.2
Managing Custom Systems
2.2
Quiz for Managing Custom Systems
5 Questions
2.3
Continuity Planning and Disaster Recovery
2.3
Quiz for Continuity Planning and Disaster Recovery
5 Questions
2.4
Looking at Regulations
2.4
Quiz for Looking at Regulations
6 Questions
2.5
Deeper Pockets — and Insured
2.5
Quiz for Deeper Pockets — and Insured
5 Questions
2.6
Considering Employees, Consultants, and Partners
2.6
Quiz for Considering Employees, Consultants, and Partners
6 Questions
2.7
Looking at the Chief Information Security Officer’s Role
2.7
Quiz for Looking at the Chief Information Security Officer’s Role
7 Questions
Chapter 3: Identifying a Security Breach
4
3.1
Identifying Overt Breaches
3.1
Quiz for Identifying Overt Breaches
5 Questions
3.2
Detecting Covert Breaches
3.2
Quiz for Detecting Covert Breaches
7 Questions
Chapter 4: Recovering from a Security Breach
14
4.1
An Ounce of Prevention Is Worth Many Tons of Response
4.1
Quiz for An Ounce of Prevention Is Worth Many Tons of Response
5 Questions
4.2
Stay Calm and Act Now with Wisdom
4.2
Quiz for Stay Calm and Act Now with Wisdom
5 Questions
4.3
Bring in a Pro
4.3
Quiz for Bring in a Pro
5 Questions
4.4
Recovering from a Breach without a Pro’s Help
4.4
Quiz for Recovering from a Breach without a Pro’s Help
6 Questions
4.5
Reinstall Damaged Software
4.5
Quiz for Reinstall Damaged Software
5 Questions
4.6
Dealing with Stolen Information
4.6
Quiz for Dealing with Stolen Information
7 Questions
4.7
Recovering When Your Data Is Compromised at a Third Party
4.7
Quiz for Recovering When Your Data Is Compromised at a Third Party
6 Questions
Chapter 5: Backing Up
28
5.1
Backing Up Is a Must
5.1
Quiz for Backing Up Is a Must
5 Questions
5.2
Backing Up Data from Apps and Online Accounts
5.2
Quiz for Backing Up Data from Apps and Online Accounts
5 Questions
5.3
Backing Up Data on Smartphones
5.3
Quiz for Backing Up Data on Smartphones
7 Questions
5.4
Conducting Cryptocurrency Backups
5.4
Quiz for Conducting Cryptocurrency Backups
5 Questions
5.5
Backing Up Passwords
5.5
Quiz for Backing Up Passwords
5 Questions
5.6
Looking at the Different Types of Backups
5.6
Quiz for Looking at the Different Types of Backups
7 Questions
5.7
Figuring Out How Often You Should Backup
5.7
Quiz for Figuring Out How Often You Should Backup
5 Questions
5.8
Exploring Backup Tools
5.8
Quiz for Exploring Backup Tools
7 Questions
5.9
Creating a Boot Disk
5.9
Quiz for Creating a Boot Disk
5 Questions
5.10
Knowing Where to Back Up
5.10
Quiz for Knowing Where to Back Up
6 Questions
5.11
Knowing Where Not to Store Backups
5.11
Quiz for Knowing Where Not to Store Backups
5 Questions
5.12
Encrypting Backups
5.12
Quiz for Encrypting Backups
5 Questions
5.13
Testing Backups
5.13
Quiz for Testing Backups
5 Questions
5.14
Disposing of Backups
5.14
Quiz for Disposing of Backups
5 Questions
Chapter 6: Resetting Your Device
4
6.1
Exploring Two Types of Resets
6.1
Quiz for Exploring Two Types of Resets
6 Questions
6.2
Rebuilding Your Device after a Hard Reset
6.2
Quiz for Rebuilding Your Device after a Hard Reset
5 Questions
Chapter 7: Restoring from Backups
32
7.1
You Will Need to Restore
7.1
Quiz for You Will Need to Restore
5 Questions
7.2
Wait! Do Not Restore Yet!
7.2
Quiz for Wait! Do Not Restore Yet!
5 Questions
7.3
Restoring Data to Apps
7.3
Quiz for Restoring Data to Apps
5 Questions
7.4
Restoring from Full Backups of Systems
7.4
Quiz for Restoring from Full Backups of Systems
6 Questions
7.5
Restoring from Incremental Backups
7.5
Quiz for Restoring from Incremental Backups
5 Questions
7.6
Dealing with Deletions
7.6
Quiz for Dealing with Deletions
5 Questions
7.7
Excluding Files and Folders
7.7
Quiz for Excluding Files and Folders
5 Questions
7.8
Understanding Archives
7.8
Quiz for Understanding Archives
5 Questions
7.9
Restoring Using Backup Tools
7.9
Quiz for Restoring Using Backup Tools
6 Questions
7.10
Returning Backups to Their Proper Locations
7.10
Quiz for Returning Backups to Their Proper Locations
5 Questions
7.11
Restoring to Non-Original Locations
7.11
Quiz for Restoring to Non-Original Locations
5 Questions
7.12
Never Leave Your Backups Connected
7.12
Quiz for Never Leave Your Backups Connected
5 Questions
7.13
Restoring from Encrypted Backups
7.13
Quiz for Restoring from Encrypted Backups
5 Questions
7.14
Testing Backups
7.14
Quiz for Testing Backups
5 Questions
7.15
Restoring Cryptocurrency
7.15
Quiz for Restoring Cryptocurrency
5 Questions
7.16
Booting from a Boot Disk
7.16
Quiz for Booting from a Boot Disk
5 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Login
or
Sign Up
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Cybersecurity
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Linkedin
Instagram
Modal title
Main Content