IT Security Awareness for Employees and Individuals - Course Assessment

This assessment questionnaire gives you the opportunity to verifiy your learning progress. Thank you for taking this course!

Back to Overview

This is only an abridged excerpt from the course
IT Security Awareness for Employees and Individuals

Questionnaire

The classic application to surf on the Internet is called a Web...


What can include weaknesses and act as a point of attack?





What is true about domain names?




A website’s HTTPS certificate is a result of an identity check:



What are reasons for performing regular backups:









Back to Overview

Chapters

Number Title Length
Start
1 Introduction & Motivation (Full preview availabe) 5 min
2 What actually is "Security"? - Trying to understand In-/Security 5 min
3 Internet Basics: The Internet...and the Cloud 12 min
4 Basic Attacking Scheme 4 min
5 Users as the weak point: Recognizing Attack Schemes & Phishing (Part 1) 14 min
6 Users as the weak point: Recognizing Attack Schemes & Phishing (Part 2) 7 min
7 Users as the weak point: Recognizing Attack Schemes & Phishing (Part 3) 24 min
8 Example: The ideal (Banking-)Trojan 3 min
9 Technical Security: Hacking 8 min
10 E-Mail Security (Full preview availabe) 10 min
11 Insert: Online Shopping 6 min
12 Insert: The 'better' (more secure) Operating system? 2 min
13 Insert: 'Hacking' outside of PCs and mobile Devices 2 min
14 Insert: Quishing – Phishing using QR Codes 3 min
15 Insert: Disposing, Passing on, Selling Devices 2 min
16 Authentication & Passwords 8 min
17 Backup - Do we need that? 2 min
18 The Golden Security Rules 7 min
Course Assessment