Discounts for 3+ Users
Do you need more information about group pricing for our training courses?
ANY SIZE/ANY INDUSTRY (Businesses, Non-Profits, Academic Institutions)
Think Before You Click (Cybersecurity)
Learn How To Protect Your PC – And Yourself!
Seat Time: 53 minutes
Versions Available: Standard HD SCORM, reseller HTML
Teacher: Ken Dwight
Learner: Lisa Lopez
Produced by: Bigger-Brains
Is it real or is it a trap? Learn how to protect yourself from cybercriminals!
Hundreds of times per day, cybercriminals are attempting to access your computer or your data, often by tricking you with fake emails, fake links, or even fake phone calls and voicemails. How do you know what’s real and what you should avoid?
In this course, IT security expert Ken Dwight, aka “The Virus Doctor” will walk you through the world of cybersecurity, including all the attacks, techniques, and strategies the bad guys use everyday to try and make us click without thinking.
Along with Microsoft trainer Lisa Lopez, Ken will cover the critical topics everyone needs to know, including:
- The types of attacks all users face every day
- The threats posed by Phishing, Spear-Phishing, Spyware, Ransomware, Sextortion, and more
- What the criminals hope to gain by attacking you and your devices
- The ways you can protect yourself and your computer
- The characteristics of a strong password
- The best backup strategies to protect your data from ransomware attacks
- The social engineering techniques that criminals use to prey on your emotions so you let your guard down and allow them into your computer or accounts
With real life examples culled from over 20 years in IT security, “The Virus Doctor” will teach all you need to know in this engaging, effective eLearning course!
What You'll Learn
You will be able to:
- Describe the threats from cybercriminals which target your devices and yourself
- Define cybersecurity terms including phishing, vishing, ransomware, sextortion, social engineering, and botnets
- List benefits cybercriminals hope to achieve by attacking people and devices
- Describe the role played by hardware, software, priviliege level, and updates in protecting your computer
- Identify at least three characteristics of a “strong” password
- Explain the 3-2-1 backup strategy and how it protects from ransomware
- List at least three ways criminals hope to get access to your computer
- Discuss the role of clickbait and social engineering in cybersecurity attacks
This course is included in the Bigger-Brains online subscription for individuals or organizations, or can be purchased in SCORM format for use in your own LMS (Learning Management System)
Hours: 53 minutes
Sample Course Video