Skip to content
info@sejal-learn.com
Instagram
X-twitter
Youtube
Linkedin
Facebook
Login
Sign Up
info@sejal-learn.com
Instagram
X-twitter
Youtube
Linkedin
Facebook
Login
Sign Up
Course Catalog
About
Contact Us
Home
All Programs
Cybersecurity
Protecting Yourself from Yourself
Protecting Yourself from Yourself
Curriculum
3 Sections
30 Lessons
10 Weeks
Expand all sections
Collapse all sections
Securing Your Accounts
12
1.1
Realizing You’re a Target
1.2
Quiz for Realizing You’re a Target
6 Questions
1.3
Securing Your External Accounts
1.4
Quiz for Securing Your External Accounts
5 Questions
1.5
Securing Data Associated with User Accounts
1.6
Quiz for Securing Data Associated with User Accounts
7 Questions
1.7
Securing Data with Parties You’ve Interacted With
1.8
Quiz for Securing Data with Parties You’ve Interacted With
5 Questions
1.9
Securing Data at Parties You Haven’t Interacted With
1.10
Quiz for Securing Data at Parties You Haven’t Interacted With
7 Questions
1.11
Securing Data by Not Connecting Hardware with Unknown Pedigrees
1.12
Quiz for Securing Data by Not Connecting Hardware with Unknown Pedigrees
5 Questions
Passwords
22
2.1
Passwords: The Primary Form of Authentication
2.2
Quiz for Passwords: The Primary Form of Authentication
5 Questions
2.3
Avoiding Simplistic Passwords
2.4
Quiz for Avoiding Simplistic Passwords
6 Questions
2.5
Password Considerations
2.6
Quiz for Password Considerations
6 Questions
2.7
Creating Memorable, Strong Passwords
2.8
Quiz for Creating Memorable, Strong Passwords
5 Questions
2.9
Knowing When to Change Passwords
2.10
Quiz for Knowing When to Change Passwords
5 Questions
2.11
Changing Passwords after a Breach
2.12
Quiz for Changing Passwords after a Breach
5 Questions
2.13
Providing Passwords to Humans
2.14
Quiz for Providing Passwords to Humans
5 Questions
2.15
Storing Passwords
2.16
Quiz for Storing Passwords
5 Questions
2.17
Transmitting Passwords
2.18
Quiz for Transmitting Passwords
5 Questions
2.19
Discovering Alternatives to Passwords
2.20
Quiz for Discovering Alternatives to Passwords
7 Questions
2.21
Vulnerabilities in Multifactor Authentication
2.22
Quiz for Vulnerabilities in Multifactor Authentication
5 Questions
Preventing Social Engineering Attacks
26
3.1
Don’t Trust Technology More than You Would People
3.2
Quiz for Don’t Trust Technology More than You Would People
5 Questions
3.3
Caller ID Scams
3.4
Quiz for Caller ID Scams
5 Questions
3.5
Types of Social Engineering Attacks
3.6
Quiz for Types of Social Engineering Attacks
6 Questions
3.7
Six Principles That Social Engineers Exploit
3.8
Quiz for Six Principles That Social Engineers Exploit
5 Questions
3.9
Don’t Overshare on Social Media
3.10
Quiz for Don’t Overshare on Social Media
5 Questions
3.11
Leaking Data by Sharing Information as Part of Viral Trends
3.12
Quiz for Leaking Data by Sharing Information as Part of Viral Trends
5 Questions
3.13
Identifying Fake Social Media Connections
3.14
Quiz for Identifying Fake Social Media Connections
6 Questions
3.15
Deep Fakes
3.16
Quiz for Deep Fakes
5 Questions
3.17
Virtual kidnappings and deep fakes
3.18
Quiz for Virtual kidnappings and deep fakes
5 Questions
3.19
Fake News
3.20
Quiz for Fake News
5 Questions
3.21
Using Bogus Information
3.22
Quiz for Using Bogus Information
5 Questions
3.23
Using Security Software
3.24
Quiz for Using Security Software
5 Questions
3.25
General Cyber-hygiene Can Help Prevent Social Engineering
3.26
Quiz for General Cyber-hygiene Can Help Prevent Social Engineering
5 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Your Journey Starts Here
Course Catalog
About
Contact Us
Login/Sign Up
Modal title
Main Content