Overview
Syllabus
Lesson 1: Avoiding Plagiarism.
Lesson 2: Why Study Cyber Security.
Lesson 3: Cyber Security Terminology.
Lesson 4: Demystifying Computers (Part 1).
Lesson 5: Demystifying Computers (Part 2).
Lesson 6: Demystifying the Internet (Part 1).
Lesson 7: Demystifying the Internet (Part 2).
Lesson 8: Demystifying the Internet (Part 3).
Lesson 9: Passwords and Hash Functions.
Lesson 10: Common Password Threats.
Lesson 11: Creating Strong Passwords.
Lesson 12: Managing Passwords.
Lesson 13: How Email Works.
Lesson 14: Email Security.
Lesson 15: Varieties of Malware.
Lesson 16: Functions of Malware.
Lesson 17: Sources of Malware.
Lesson 18: Layers of Defense Against Malware.
Lesson 19: How Web Browsing works.
Lesson 20: Safely Navigating the Web.
Lesson 21: Online Shopping.
Lesson 22: Wireless Network Basics.
Lesson 23: Wireless Internet Security Threats.
Lesson 24: Using Public Wireless Networks.
Lesson 25: Administering Wireless Networks.
Lesson 26: Social Media and Privacy.
Lesson 27: Social Media and Security.
Lesson 28: Social Engineering.
Lesson 29: Reading URLs.
Lesson 30: Interpersonal Issues Online.
Taught by
IowaCyber
Reviews
5.0 rating, based on 1 Class Central review
-
The Cyber Security Review is designed to draw on the combined knowledge, skills and expertise of the cyber security community to identify the emerging threats and facilitate the development of coherent policies and robust capabilities.