IT Security Awareness for Employees and Individuals - Start

The pragmatic complete Guide to Internet and Computer Security

At the workplace, with clients, or in the home office: Am I really secure? What I can do for IT security as an employee and individual.

Anyone who works with computers or mobile digital devices should understand the basics of the internet, to be able to behave correctly. This course explains the background to how the internet works and which schemes attackers use to trick users.

The courses describes technical countermeasures as well as the correct user behavior plus guides users to recognize common attacking schemes.

How do Cyber criminals think? What are the dangers? What do I have to watch out for? Are cookies bad?

At the end of this course, you will...

  • Understand what cyber security means
  • Know how the Internet works and attackers use simple technologies to trick you
  • Know safe online practices
  • Understand the Golden Rules for security – what you have to do
  • Be able to recognize common attack schemes
  • Know technical rules and practical behavioral guidelines

Instructions

Use the player controls to play the HD video content in full screen mode and to activate subtitles.

This is only an abridged excerpt from the course
IT Security Awareness for Employees and Individuals

Chapters

Number Title Length
Start
1 Introduction & Motivation (Full preview availabe) 5 min
2 What actually is "Security"? - Trying to understand In-/Security 5 min
3 Internet Basics: The Internet...and the Cloud 12 min
4 Basic Attacking Scheme 4 min
5 Users as the weak point: Recognizing Attack Schemes & Phishing (Part 1) 14 min
6 Users as the weak point: Recognizing Attack Schemes & Phishing (Part 2) 7 min
7 Users as the weak point: Recognizing Attack Schemes & Phishing (Part 3) 24 min
8 Example: The ideal (Banking-)Trojan 3 min
9 Technical Security: Hacking 8 min
10 E-Mail Security (Full preview availabe) 10 min
11 Insert: Online Shopping 6 min
12 Insert: The 'better' (more secure) Operating system? 2 min
13 Insert: 'Hacking' outside of PCs and mobile Devices 2 min
14 Insert: Quishing – Phishing using QR Codes 3 min
15 Insert: Disposing, Passing on, Selling Devices 2 min
16 Authentication & Passwords 8 min
17 Backup - Do we need that? 2 min
18 The Golden Security Rules 7 min
Course Assessment