Cybersecurity: How To Protect Yourself
Introduction to Cybersecurity
3 Topics
Introduction to cybersecurity
Types of cybersecurity threats
Broad and narrow definitions of data breaches
Addressing and Fending off Cybersecurity Threats
2 Topics
office security
work at home security
Valuable Cybersecurity Information and Final Recap
4 Topics
information security for remote work
critical cybersecurity Zones
anatomy of a phishing email
Types of malware
Previous Topic
Next Topic
Valuable Cybersecurity Information and Final Recap
Cybersecurity: How To Protect Yourself
Valuable Cybersecurity Information and Final Recap
Lesson Content
0% Complete
0/4 Steps
information security for remote work
critical cybersecurity Zones
anatomy of a phishing email
Types of malware
Previous Topic
Back to Course
Next Topic