Skip to content
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Login
Sign Up
Login
Sign Up
Login
Sign Up
Home
All Programs
Cybersecurity
The Part of Tens!
The Part of Tens!
Curriculum
3 Sections
26 Lessons
Lifetime
Expand all sections
Collapse all sections
Chapter 20: Ten Ways to Improve Your Cybersecurity without Spending a Fortune
20
1.1
Understand That You Are a Target
1.1
Quiz for Understand That You Are a Target
5 Questions
1.2
Use Security Software
1.2
Quiz for Use Security Software
5 Questions
1.3
Encrypt Sensitive Information
1.3
Quiz for Encrypt Sensitive Information
5 Questions
1.4
Back Up Often
1.4
Quiz for Back Up Often
5 Questions
1.5
Test Your Backups
1.5
Quiz for Test Your Backups
5 Questions
1.6
Use Proper Authentication
1.6
Quiz for Use Proper Authentication
5 Questions
1.7
Use Social Media Wisely
1.7
Quiz for Use Social Media Wisely
5 Questions
1.8
Segregate Internet Access
1.8
Quiz for Segregate Internet Access
5 Questions
1.9
Use Public Wi-Fi Safely (or Better Yet, Don’t Use It!)
1.9
Quiz for Use Public Wi-Fi Safely (or Better Yet, Don’t Use It!)
5 Questions
1.10
Hire a Pro
1.10
Quiz for Hire a Pro
5 Questions
Chapter 21: Ten (or So) Lessons from Major Cybersecurity Breaches
12
2.1
Marriott
2.1
Quiz for Marriott
7 Questions
2.2
Target
2.2
Quiz for Target
6 Questions
2.3
Sony Pictures
2.3
Quiz for Sony Pictures
6 Questions
2.4
U.S. Office of Personnel Management
2.4
Quiz for U.S. Office of Personnel Management
6 Questions
2.5
Anthem
2.5
Quiz for Anthem
5 Questions
2.6
Colonial Pipeline and JBS SA
2.6
Quiz for Colonial Pipeline and JBS SA
6 Questions
Chapter 22: Ten Ways to Safely Use Public Wi-Fi
20
3.1
Use Your Cellphone as a Mobile Hotspot
3.1
Quiz for Use Your Cellphone as a Mobile Hotspot
5 Questions
3.2
Turn Off Wi-Fi Connectivity When You’re Not Using Wi-Fi
3.2
Quiz for Turn Off Wi-Fi Connectivity When You’re Not Using Wi-Fi
5 Questions
3.3
Don’t Perform Sensitive Tasks over Public Wi-Fi
3.3
Quiz for Don’t Perform Sensitive Tasks over Public Wi-Fi
5 Questions
3.4
Use a VPN Service
3.4
Quiz for Use a VPN Service
5 Questions
3.5
Use a Travel Router
3.5
Quiz for Use a Travel Router
5 Questions
3.6
Use Tor
3.6
Quiz for Use Tor
5 Questions
3.7
Use Encryption
3.7
Quiz for Use Encryption
5 Questions
3.8
Turn Off Sharing
3.8
Quiz for Turn Off Sharing
5 Questions
3.9
Have Information Security Software on Any Devices Connected to Public Wi-Fi Networks
3.9
Quiz for Have Information Security Software on Any Devices Connected to Public Wi-Fi Networks
5 Questions
3.10
Understand the Difference between True Public Wi-Fi and Shared Wi-Fi
3.10
Quiz for Understand the Difference between True Public Wi-Fi and Shared Wi-Fi
5 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Login
or
Sign Up
Home
Programs
Close Programs
Open Programs
Cybersecurity
Courses
Community
News
Knowledgebase
GIS
Courses
Community
News
Knowledgebase
Agile Methodologies
Courses
Community
News
Knowledgebase
Cybersecurity
Courses
Community
News
Knowledgebase
Catalog
About
News
Contact Us
Linkedin
Instagram
Modal title
Main Content