Cyber Security Essentials
audiobook (Unabridged) ∣ Learn the very basics of cyber security
By Assemble You Limited
Sign up to save your library
With an OverDrive account, you can save your favorite libraries for at-a-glance information about availability. Find out more about OverDrive accounts.
Find this title in Libby, the library reading app by OverDrive.

Search for a digital library with this title
Title found at these libraries:
Library Name | Distance |
---|---|
Loading... |
Protect yourself against malware, and understand the best practices of working with passwords. Key FeaturesLearn and protect yourself against malicious software Learn about the techniques you must use to avoid falling prey to a social engineer Learn the techniques to protect yourself against common attacks Book DescriptionMalware can capture your keystrokes and send them to the person, the hacker, who planted the malware in our system. This means that if we are entering a password somewhere, let's say in our online bank account, that person controlling the malware also gets to know it. Almost everything is visible to the hacker: our data, confidential files, photographs...almost everything. When it comes to cyber security, it's easy to get lost in the lingo and talk. This doesn't have to be the case! In this course, you will learn key strategies that you can immediately implement to protect yourself from malicious substances. We'll touch on subjects like passwords, and should you be managing them, active and passive threats, social engineering and more – all geared towards keeping you safe!What you will learnLearn how to protect yourself against malware Learn what social engineering is, and how it's specifically used in a cyber security context Learn about the best-practices when it comes to making and managing passwords Learn about the most common threats to cyber security Learn the techniques to protect yourself against common attacks Who this book is for
This course is beneficial to the following anyone looking to develop a solid basic understanding of malware, how to use cybersecurity measures to limit its threat to a person or organization, and anyone looking to build a basic understanding of cyber security threats and how to deal with them.
]]>