Skip to content
info@sejal-learn.com
Instagram
X-twitter
Youtube
Linkedin
Facebook
Login
Sign Up
info@sejal-learn.com
Instagram
X-twitter
Youtube
Linkedin
Facebook
Login
Sign Up
Course Catalog
About
Contact Us
Home
All Programs
Cybersecurity
Improving Your Own Personal Security
Improving Your Own Personal Security
Curriculum
3 Sections
23 Lessons
10 Weeks
Expand all sections
Collapse all sections
Evaluating Your Current Cybersecurity Posture
18
1.1
Don’t Be Achilles: Identifying Ways You May Be Less Than Secure
1.2
Quiz for Don’t Be Achilles: Identifying Ways You May Be Less Than Secure
5 Questions
1.3
Identifying Risks
1.4
Quiz for Identifying Risks
6 Questions
1.5
Protecting against Risks
1.6
Quiz for Protecting against Risks
8 Questions
1.7
Evaluating Your Current Security Measures
1.8
Quiz for Evaluating Your Current Security Measures
6 Questions
1.9
Configuration: Basic Technical Mistakes That Lead to Breaches
1.10
Quiz for Configuration: Basic Technical Mistakes That Lead to Breaches
8 Questions
1.11
Privacy 101
1.12
Quiz for Privacy 101
7 Questions
1.13
Banking Online Safely
1.14
Quiz for Banking Online Safely
6 Questions
1.15
Safely Using Smart Devices
1.16
Quiz for Safely Using Smart Devices
5 Questions
1.17
Cryptocurrency Security 101
1.18
Quiz for Cryptocurrency Security 101
7 Questions
Enhancing Physical Security
16
2.1
Understanding Why Physical Security Matters
2.2
Quiz for Understanding Why Physical Security Matters
5 Questions
2.3
Taking Inventory
2.4
Quiz for Taking Inventory
7 Questions
2.5
Locating Your Vulnerable Data
2.6
Quiz for Locating Your Vulnerable Data
5 Questions
2.7
Creating and Executing a Physical Security Plan
2.8
Quiz for Creating and Executing a Physical Security Plan
6 Questions
2.9
Implementing Physical Security
2.10
Quiz for Implementing Physical Security
6 Questions
2.11
Security for Mobile Devices
2.12
Quiz for Security for Mobile Devices
5 Questions
2.13
Realizing That Insiders Pose the Greatest Risks
2.14
Quiz for Realizing That Insiders Pose the Greatest Risks
5 Questions
2.15
Trackers
2.16
Quiz for Trackers
5 Questions
Cybersecurity Considerations When Working from Home
12
3.1
Network Security Concerns
3.2
Quiz for Network Security Concerns
5 Questions
3.3
Device Security Concerns
3.4
Quiz for Device Security Concerns
5 Questions
3.5
Location Cybersecurity
3.6
Quiz for Location Cybersecurity
5 Questions
3.7
Video Conferencing Cybersecurity
3.8
Quiz for Video Conferencing Cybersecurity
5 Questions
3.9
Social Engineering Issues
3.10
Quiz for Social Engineering Issues
5 Questions
3.11
Regulatory Issues
3.12
Quiz for Regulatory Issues
5 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Your Journey Starts Here
Course Catalog
About
Contact Us
Login/Sign Up
Modal title
Main Content