YoVDO

Security Tips

Offered By: LinkedIn Learning

Tags

Cybersecurity Courses Data Encryption Courses Password Management Courses Wi-Fi Security Courses Personal Security Courses

Course Description

Overview

Want to broaden your knowledge of security? Get tips that can help you take steps to protect your information—no technical pedigree required.

Syllabus

Introduction
  • Security Tips Weekly
1. Security Tips
  • Use a password manager
  • Choose good passwords
  • Use two-factor authentication
  • Security questions
  • Smart home devices
  • Secure your home Wi-Fi
  • Laptop security
  • Browse the web safely
  • Block ads and trackers
  • Recognize phishing emails
  • Recognize phone scams
  • Donate a computer safely
  • Back up data securely
  • Encrypt sensitive files
  • Use a VPN service
  • Browse the web with Tor
  • Social media security options
  • Mobile device security
  • Stay secure on shared computers
  • Scan for viruses and malware
  • Stay secure when traveling
  • Keep work and home information separate
  • Use the cloud securely
  • Cache and cookies
  • Spear phishing and catfishing
  • Understanding and preventing ransomware
  • Keeping an eye on your own security
  • What's a URL?
  • Turning on and using full-disk encryption
  • What to do if your information is compromised
  • How to tell if a link is legitimate
  • Understanding biometric security
  • What is public key encryption?
  • Build a portable apps USB
  • Handling information securely
  • Understanding common attacks
  • Paying securely online
  • Wireless security for mobile phones
  • Chatting securely
  • Configuring 2FA with Authy
  • Configuring 2FA with 1Password
  • Securing your email account
  • Encrypted email
  • Steganography
  • Exploring app permissions
  • Using kiosk mode in Windows 10
  • Using a separate network for your IoT devices
  • Adding a guest account to your computer
  • Safely donating mobile devices
  • Learn more about security with LinkedIn Learning

Taught by

Scott Simpson

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network