• ✔Security awareness
    • ✔Presentation of the course
    • ✔Summary
    • INTRODUCTION (17 min.)
      • Importance of IT security
      • Consequences of a security breach
      • Is it possible to be protected?
      • What is a compromised computer used for?
      • Who are hackers?
      • Who do hackers work for?
      • Why me?
      • Why me? Targeted attacks
      • Botnet
      • The value of a compromised system
      • Your role is essential
    • ✔WEB BROWSING(10 min.)
      • ✔Web browser
      • ✔Cryptography
      • Apple vs FBI
      • Is the connection secure?
      • Are we using a secure connection?
      • Dangers of suspect downloads
      • Don’t trust anyone!
      • Defend yourself from suspect downloads
      • Hotspot
      • ✔Question 1
      • Question 2
      • Question 3
      • Question 4
    • END OF THE FIRST MODULE
    • ✔E-MAIL (22 min.)
      • ✔Scam
      • Phishing
      • Phishing: mode of action
      • Phishing: two-factor authentication
      • Recognising scam e-mails
      • Recognising dangerous attachments
      • Extensions
      • Dangerous extensions
      • Can e-mails be faked?
      • How to reduce undesired e-mails?
      • E-mails: what should I look for?
      • Scam mail: example
      • ✔Phishing test
      • ✔Phishing 1
      • ✔Phishing 2
      • Phishing 3
      • Phishing 4
      • Phishing 5
      • Phishing 6
      • Phishing 7
      • Phishing 8
      • Question 5
      • Question 6
      • Question 7
      • Question 8
      • Question 9
    • PROTECT YOUR PRIVACY (10 min.)
      • ✔Identity theft
      • ✔Identity theft: causes
      • Sharing responsibly
      • Tags
      • Tags office, exif
      • Question 10
      • Question 11
      • Question 12
      • Question 13
      • Question 14
    • END OF THE SECOND MODULE
    • DATA SECURITY (14 min.)
      • Vulnerability of operating systems
      • ✔The importance of constant updating
      • ✔Software can also represent a risk
      • Illegal file sharing and downloads
      • High-risk contents
      • Antivirus and antimalware software
      • Be careful of offers of free programmes
      • Protecting sensitive information
      • The importance of backups
      • Using data encryption
      • Don’t leave devices unguarded
      • Using data encryption
      • Loss/theft of a device
      • Examples
      • The importance of a passcode
      • Malicious usb memories
      • The importance of a passcode
      • Question 17
      • Question 18
      • Question 19
      • Question 20
    • PASSWORD MANAGEMENT (17 min.)
      • Correct criteria for choosing a password
      • ✔Create your own system for memorising
      • Example
      • Is this method secure?
      • Passphrase
      • The errors to avoid
      • Differentiate the password according to the purpose
      • Password managers
      • View the extensions
      • Password managers: exemple
      • Avoid post-its
      • Destroy paper documents
      • Passwords: the last barrier
      • Practice
      • Question 21
      • Question 22
      • Question 23
      • Question 24
    • SOCIAL ENGINEERING (11 min.)
      • Social engineering_1
      • Social Engineering: characteristics
      • ✔Who uses Social Engineering?
      • ✔Why social engineering?
      • What’s useful for a social engineer
      • How to find information on the victim?
      • How useful information is extrapolated
      • Why are we vulnerable?
      • How to defend ourselves against social engineering?
      • Classify sensitive information
      • Final recommendations
      • Question 25
      • Question 26
      • Question 27
    • RULES (6 min.)
      • Set of Rules 1
      • Set of Rules 2
    • ✔End of the course

Security awareness
Security awareness
M M