Introduction to Personal Digital Security
Offered By: Codecademy
Course Description
Overview
Hackers and cyber threats are a fact of today's modern, digital world. Everyone needs to be able to protect themselves from these threats.
Hackers and cyber threats are a fact of today's modern, digital world. Everyone needs to be able to protect themselves from these threats to keep themselves and their data safe.
### Take-Away Skills
This course is a high-level overview of essential digital personal security topics. After this conceptual course, you will be able to:
- Detect and avoid social engineering attacks
- Recognize different types of threat actors
- Identity types of malware
- Secure your personal Linux and Windows computers
Hackers and cyber threats are a fact of today's modern, digital world. Everyone needs to be able to protect themselves from these threats to keep themselves and their data safe.
### Take-Away Skills
This course is a high-level overview of essential digital personal security topics. After this conceptual course, you will be able to:
- Detect and avoid social engineering attacks
- Recognize different types of threat actors
- Identity types of malware
- Secure your personal Linux and Windows computers
Syllabus
- Avoiding Social Engineering Attacks: Learn how hackers use phishing, spam, scams, and influence campaigns to trick victims.
- Article: Phishing
- Lesson: Spam, Scams, and Other Falsehoods
- Article: Influence Campaigns
- Hackers and Cyber Attacks: Learn about common malware and threat actors.
- Lesson: Malware
- Lesson: Threat Actors
- Securing Your Computer: Learn some tips and tricks for securing your personal computers.
- Article: Personal Security Best Practices
- Article: Personal Security: Hardening Your Device
- Article: Linux Hardening
- Article: Windows Hardening
- Personal Digital Security Next Steps: Congratulations! You've completed this course. Where should you go next?
- Informational: Next Steps: Personal Digital Security
Taught by
Sarai Fernandez
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network