IT Security Awareness for Employees - Lecture E-Mail Security (e-Learning) Added at 09/11/2024, last update at 03/04/2025 E-Mail Security online video lecture for Employees - Learn what to look out for when using E-Mails. This is a full lecture that is part of the Online Training Course "IT Security Awareness for Employees and Individuals - The pragmatic complete Guide to Internet and Computer Security".
(Shorts) IT Security Awareness for Employees e-Learning - Lecture Quishing Added at 11/29/2024, last update at 03/04/2025 Cyber Security Training Excerpt: Quishing – Phishing using QR Codes
IT Security Awareness Training for Employees to follow ISO/IEC 27001 & 27002 and facilitate Audits Added at 09/16/2024, last update at 03/04/2025 Online training or Intranet-based Learning Management Systems (LMS) are two approaches to implement regular and accountable IT security awareness training for employees. This is true for companies of all sizes and all departments. One can find reliable, comprehensive courses for general Computer, Internet and E-Mail users as well as developers or project managers. Using e-learning approaches offers executives to monitor and document the learning progress and success of their employees easily and thus prove in security audits that adequate IT and information security awareness training for employees has been conducted.
HissenIT reaches over 15,000 Online Students on e-Learning Platform Udemy Added at 02/10/2021 Over 700 worldwide reviews, with course ratings of 4.3 in average out of 5.0 of all courses (and I am working on it). At the moment, seven courses about IT Security Management, Secure custom Development, Cryptography and Encryption (English/German). Individual Coachings, Topics or online Seminars are possible as well. Courses can be licensed in other formats, like SCORM, for enterprise and offline use.
Secure Programming of Web Applications: Authentication Added at 12/28/2020 We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access.
Secure Programming of Web Applications: Session-Hijacking Added at 12/21/2020 We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access.
Secure Programming of Web Applications: Clickjacking Added at 12/15/2020 We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access.
Secure Programming of Web Applications: Remote File Inclusion (RFI) and Local File Inclusion (LFI) resp. Directory/Path Traversal Added at 12/08/2020 We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access.
Secure Programming of Web Applications: Open Redirection Added at 12/01/2020 We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access.
Secure Programming of Web Applications: Cross-Site Scripting (XSS) Added at 11/27/2020 We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access.
Secure Programming of Web Applications: Cross-Site Request Forgery (CSRF) Added at 11/20/2020 We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access.
Secure Programming of Web Applications: SQL Code Injection Added at 11/14/2020 We can read about numerous successful attacks on well-known web applications on a weekly basis. Reason enough to study the background of "Web Application Security" of custom-made / self-developed applications - no matter if these are used only internally or with public access.
HissenIT has reached more than 10,000 online students worldwide with in-depth IT security courses on Udemy Added at 05/16/2018 With more than 20 years of IT security and security training experience, HissenIT publishes also online trainings in the areas of application security, encryption and cryptography. Information technologies are the essential part of any business and a huge part in our private life. Hence, awareness of IT security on the technical level has become essential. Increased numbers of reports on cyber attacks and system vulnerabilities are one proof.
"IT Security for Project Managers" now also as Kindle e-Book Added at 09/18/2016 Our Whitepaper/Guideline is now also available as e-book for Amazon's Kindle (English/German).
IT Security for Project Managers: About implementing security in IT projects properly – A Guideline Added at 05/23/2016 Despite many accepted IT security standards, many IT projects fail at IT security. What needs to be considered, what mistakes and pitfalls to avoid.
HissenIT published Application Security and Cryptography Online Trainings Added at 02/04/2016 Reports on cyber attacks have increased tremendously over the last years. Information technologies are the essential part of any business and a huge part in our private life. Hence, awareness of IT security on the technical level has become very important – for developers and decision makers alike.