Skip to content
info@sejal-learn.com
Instagram
X-twitter
Youtube
Linkedin
Facebook
Login
Sign Up
info@sejal-learn.com
Instagram
X-twitter
Youtube
Linkedin
Facebook
Login
Sign Up
Course Catalog
About
Contact Us
Home
All Programs
Cybersecurity
Personal Cybersecurity
Personal Cybersecurity
Curriculum
6 Sections
46 Lessons
10 Weeks
Expand all sections
Collapse all sections
Chapter 1: Evaluating Your Current Cybersecurity Posture
14
1.1
Don’t be Achilles: Identifying Ways You May Be Less than Secure
1.2
Quiz for Don’t be Achilles: Identifying Ways You May Be Less than Secure
6 Questions
1.3
Identifying Risks
1.4
Quiz for Identifying Risks
7 Questions
1.5
Protecting against Risks
1.6
Quiz for Protecting against Risks
8 Questions
1.7
Evaluating Your Current Security Measures
1.8
Quiz for Evaluating Your Current Security Measures
6 Questions
1.9
Privacy 101
1.10
Quiz for Privacy 101
6 Questions
1.11
Banking Online Safely
1.12
Safely Using Smart Devices
1.13
Cryptocurrency Security 101
1.14
Quiz for Cryptocurrency Security 101
6 Questions
Chapter 2: Enhancing Physical Security
14
2.1
Understanding Why Physical Security Matters
2.2
Quiz for Understanding Why Physical Security Matters
5 Questions
2.3
Taking Inventory
2.4
Quiz for Taking Inventory
5 Questions
2.5
Locating Your Vulnerable Data
2.6
Quiz for Locating Your Vulnerable Data
6 Questions
2.7
Creating and Executing a Physical Security Plan
2.8
Quiz for Creating and Executing a Physical Security Plan
6 Questions
2.9
Implementing Physical Security
2.10
Quiz for Implementing Physical Security
6 Questions
2.11
Security for Mobile Devices
2.12
Quiz for Security for Mobile Devices
5 Questions
2.13
Realizing That Insiders Pose the Greatest Risks
2.14
Quiz for Realizing That Insiders Pose the Greatest Risks
6 Questions
Chapter 3: Cybersecurity Considerations When Working from Home
12
3.1
Network Security Concerns
3.2
Quiz for Network Security Concerns
5 Questions
3.3
Device Security Concerns
3.4
Quiz for Device Security Concerns
6 Questions
3.5
Location Cybersecurity
3.6
Quiz for Location Cybersecurity
5 Questions
3.7
Video Conferencing Cybersecurity
3.8
Quiz for Video Conferencing Cybersecurity
5 Questions
3.9
Social Engineering Issues
3.10
Quiz for Social Engineering Issues
5 Questions
3.11
Regulatory Issues
3.12
Quiz for Regulatory Issues
5 Questions
Chapter 4: Securing Your Accounts
11
4.1
Realizing You’re a Target
4.2
Quiz for Realizing You’re a Target
5 Questions
4.3
Securing Your External Accounts
4.4
Quiz for Securing Your External Accounts
5 Questions
4.5
Securing Data Associated with User Accounts
4.6
Securing Data with Parties You’ve Interacted With
4.7
Quiz for Securing Data with Parties You’ve Interacted With
5 Questions
4.8
Securing Data at Parties You Haven’t Interacted With
4.9
Quiz for Securing Data at Parties You Haven’t Interacted With
6 Questions
4.10
Securing Data by Not Connecting Hardware with Unknown Pedigrees
4.11
Quiz for Securing Data by Not Connecting Hardware with Unknown Pedigrees
5 Questions
Chapter 5: Passwords
20
5.1
Passwords: The Primary Form of Authentication
5.2
Quiz for Passwords: The Primary Form of Authentication
5 Questions
5.3
Avoiding Simplistic Passwords
5.4
Quiz for Avoiding Simplistic Passwords
6 Questions
5.5
Password Considerations
5.6
Quiz for Password Considerations
7 Questions
5.7
Creating Memorable, Strong Passwords
5.8
Quiz for Creating Memorable, Strong Passwords
5 Questions
5.9
Knowing When to Change Passwords
5.10
Quiz for Knowing When to Change Passwords
5 Questions
5.11
Changing Passwords after a Breach
5.12
Quiz for Changing Passwords after a Breach
5 Questions
5.13
Providing Passwords to Humans
5.14
Quiz for Providing Passwords to Humans
5 Questions
5.15
Storing Passwords
5.16
Quiz for Storing Passwords
5 Questions
5.17
Transmitting Passwords
5.18
Quiz for Transmitting Passwords
5 Questions
5.19
Discovering Alternatives to Passwords
5.20
Quiz for Discovering Alternatives to Passwords
5 Questions
Chapter 6: Preventing Social Engineering Attacks
18
6.1
Don’t Trust Technology More than You Would People
6.2
Quiz for Don’t Trust Technology More than You Would People
5 Questions
6.3
Types of Social Engineering Attacks
6.4
Quiz for Types of Social Engineering Attacks
6 Questions
6.5
Six Principles Social Engineers Exploit
6.6
Quiz for Six Principles Social Engineers Exploit
6 Questions
6.7
Don’t Overshare on Social Media
6.8
Quiz for Don’t Overshare on Social Media
6 Questions
6.9
Leaking Data by Sharing Information as Part of Viral Trends
6.10
Quiz for Leaking Data by Sharing Information as Part of Viral Trends
5 Questions
6.11
Identifying Fake Social Media Connections
6.12
Quiz for Identifying Fake Social Media Connections
7 Questions
6.13
Using Bogus Information
6.14
Quiz for Using Bogus Information
5 Questions
6.15
Using Security Software
6.16
Quiz for Using Security Software
5 Questions
6.17
General Cyberhygiene Can Help Prevent Social Engineering
6.18
Quiz for General Cyberhygiene Can Help Prevent Social Engineering
5 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Your Journey Starts Here
Course Catalog
About
Contact Us
Login/Sign Up
Modal title
Main Content