Skip to content
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Login
Sign Up
Login
Sign Up
Login
Sign Up
Home
All Programs
Cybersecurity
Protecting Yourself from Yourself
Protecting Yourself from Yourself
Curriculum
3 Sections
30 Lessons
Lifetime
Expand all sections
Collapse all sections
Chapter 7: Securing Your Accounts
12
1.1
Realizing You’re a Target
1.1
Quiz for Realizing You’re a Target
6 Questions
1.2
Securing Your External Accounts
1.2
Quiz for Securing Your External Accounts
5 Questions
1.3
Securing Data Associated with User Accounts
1.3
Quiz for Securing Data Associated with User Accounts
7 Questions
1.4
Securing Data with Parties You’ve Interacted With
1.4
Quiz for Securing Data with Parties You’ve Interacted With
5 Questions
1.5
Securing Data at Parties You Haven’t Interacted With
1.5
Quiz for Securing Data at Parties You Haven’t Interacted With
7 Questions
1.6
Securing Data by Not Connecting Hardware with Unknown Pedigrees
1.6
Quiz for Securing Data by Not Connecting Hardware with Unknown Pedigrees
5 Questions
Chapter 8: Passwords
22
2.1
Passwords: The Primary Form of Authentication
2.1
Quiz for Passwords: The Primary Form of Authentication
5 Questions
2.2
Avoiding Simplistic Passwords
2.2
Quiz for Avoiding Simplistic Passwords
6 Questions
2.3
Password Considerations
2.3
Quiz for Password Considerations
6 Questions
2.4
Creating Memorable, Strong Passwords
2.4
Quiz for Creating Memorable, Strong Passwords
5 Questions
2.5
Knowing When to Change Passwords
2.5
Quiz for Knowing When to Change Passwords
5 Questions
2.6
Changing Passwords after a Breach
2.6
Quiz for Changing Passwords after a Breach
5 Questions
2.7
Providing Passwords to Humans
2.7
Quiz for Providing Passwords to Humans
5 Questions
2.8
Storing Passwords
2.8
Quiz for Storing Passwords
5 Questions
2.9
Transmitting Passwords
2.9
Quiz for Transmitting Passwords
5 Questions
2.10
Discovering Alternatives to Passwords
2.10
Quiz for Discovering Alternatives to Passwords
7 Questions
2.11
Vulnerabilities in Multifactor Authentication
2.11
Quiz for Vulnerabilities in Multifactor Authentication
5 Questions
Chapter 9: Preventing Social Engineering Attacks
26
3.1
Don’t Trust Technology More than You Would People
3.1
Quiz for Don’t Trust Technology More than You Would People
5 Questions
3.2
Caller ID Scams
3.2
Quiz for Caller ID Scams
5 Questions
3.3
Types of Social Engineering Attacks
3.3
Quiz for Types of Social Engineering Attacks
6 Questions
3.4
Six Principles That Social Engineers Exploit
3.4
Quiz for Six Principles That Social Engineers Exploit
5 Questions
3.5
Don’t Overshare on Social Media
3.5
Quiz for Don’t Overshare on Social Media
5 Questions
3.6
Leaking Data by Sharing Information as Part of Viral Trends
3.6
Quiz for Leaking Data by Sharing Information as Part of Viral Trends
5 Questions
3.7
Identifying Fake Social Media Connections
3.7
Quiz for Identifying Fake Social Media Connections
6 Questions
3.8
Deep Fakes
3.8
Quiz for Deep Fakes
5 Questions
3.9
Virtual kidnappings and deep fakes
3.9
Quiz for Virtual kidnappings and deep fakes
5 Questions
3.10
Fake News
3.10
Quiz for Fake News
5 Questions
3.11
Using Bogus Information
3.11
Quiz for Using Bogus Information
5 Questions
3.12
Using Security Software
3.12
Quiz for Using Security Software
5 Questions
3.13
General Cyber-hygiene Can Help Prevent Social Engineering
3.13
Quiz for General Cyber-hygiene Can Help Prevent Social Engineering
5 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Login
or
Sign Up
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Cybersecurity
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Linkedin
Instagram
Modal title
Main Content