2020 Way of Cybersecurity for Digital Citizens

A fundamental course on cybersecurity awareness is required to safeguard personal data from being exposed to hackers during this age of excessive digitization.

Advanced 4(20 Ratings) 100 Students Enrolled
Created by Team Gurukol English
Course is part of Subscription
Course is part of Bundle:  Growing Business Bundle
Course is part of Bundle:  Digital Marketing
What will i learn?
  • Understand the need for security of personal data and sensitive information
  • To protect identity theft
  • Classify data on the basis of sensitivity
  • Develop a security policy for home or business to protect the data
  • Identify and take precautions against social engineering
  • Learn about the different types of security threats
  • Avoid spam and unwanted emails

Requirements
  • Anyone can attend this course.
  • There is no essential requirement for this course
  • Some basic knowledge of web applications and network security will be helpful
  • No prior knowledge or experience is required to enroll for this course.
+ View more
Description

 The cybersecurity for digital citizens an awareness course for seekers may be a fundamental course on the cybersecurity awareness required to shield personal data from being exposed to hackers during this age of excessive digitization. The course conveys all home users and business professionals the knowledge and tools to safeguard themselves and their sensitive information from security attacks. It covers many simple ways to stop security breaches and protect valuable data.


This course may be a very useful course for those involved in technology-driven internet-of-things applications and devices. The one aspect that has to be taken care of while using digital applications and gadgets is data security. The course addresses this aspect to hide all the required details that enable business professionals and individuals to guard their sensitive information from unauthorized access and hacking.

Who this course is for
  • The ideal candidates for this course are the fresh graduates and inexperienced professionals who are looking to establish themselves as thorough professionals in their organizations.
  • Students who want to establish themselves as thorough professionals in their organizations.
  • Every one who wants to enhance life and improve their quality of life

Curriculum for this course
179 Lessons 06:36:51 Hours
Course Outline of Understanding Security Awareness
16 Lessons 00:18:16 Hours
  • Starting out the Course Part - 1 00:00:05
  • Starting out the Course Part - 2 00:01:34
  • Starting out the Course Part - 3 00:01:34
  • Course Outline Part - 1 00:00:05
  • Course Outline Part - 2 00:00:14
  • Understanding Security Awareness 00:00:22
  • What are Security Domains? 00:03:48
  • Defining Security 00:01:50
  • Are you in Danger? 00:02:44
  • Lets talk about you 00:01:18
  • What is the End Goal of this Course? 00:00:35
  • Course Catalogue 00:00:51
  • Few Surprise Elements 00:01:39
  • Have you already been the victim? Is it too late? 00:00:53
  • Reviewing Module 1.0 Part - 1 00:00:05
  • Reviewing Module 1.0 Part - 2 00:00:39
  • Introduction to Types of Security Threats Part - 1 00:00:05
  • Introduction to Types of Security Threats Part - 2 00:02:22
  • Threats via Your Computer 00:03:41
  • Threats Via the Internet 00:06:04
  • Posing as a Threat to Yourself 00:04:12
  • Being aware of what you speak 00:03:03
  • Threats via Your E-mail 00:03:15
  • Threats that can be planted from Your Home 00:02:36
  • Threats via Your Files 00:04:46
  • Reviewing Module 02 Part - 1 00:00:05
  • Reviewing Module 02 Part - 2 00:00:44
  • Introduction to Social Engineering Part - 1 00:00:05
  • Introduction to Social Engineering Part - 2 00:00:14
  • Defining Social Engineering 00:11:08
  • Explaining Social Engineering Defence 00:03:38
  • Role of Manipulation in Social Engineering 00:06:02
  • Why Does Social Engineering work so well? 00:02:22
  • How to Get Their Hands on your Data? 00:02:23
  • Assisting Eliminate Social Engineering 00:03:23
  • A Few Personal Precautions 00:02:25
  • Reviewing Module 03 Part - 1 00:00:05
  • Reviewing Module 03 Part - 2 00:00:36
  • How to Protect Yourself Part - 4 00:00:45
  • Reviewing Module 04 Part - 2 00:00:34
  • Reviewing Module 04 Part - 1 00:00:15
  • Explaining Contact Information 00:00:39
  • What to do if you are the Victim? Part - 2 00:01:55
  • What to do if you are the Victim? Part - 1 00:01:35
  • How do you become a Victim? 00:00:44
  • What Happens to Your Information after its Acquired? Part - 3 00:01:14
  • What Happens to Your Information after its Acquired? Part - 2 00:01:21
  • What Happens to Your Information after its Acquired? Part - 1 00:02:06
  • Introduction to Identity Theft Part - 1 00:00:05
  • How to Protect Yourself Part - 3 00:04:30
  • How to Protect Yourself Part - 2 00:02:46
  • How to Protect Yourself Part - 1 00:03:13
  • Process of Identity Theft Part - 2 00:03:07
  • Process of Identity Theft Part - 1 00:02:59
  • Defining Identity Theft Part - 2 00:01:04
  • Defining Identity Theft Part - 1 00:01:48
  • Introduction to Identity Theft Part - 2 00:00:31
  • Process of Classifying Data Part - 7 00:05:09
  • Reviewing Module 05 Part - 2 00:00:53
  • Reviewing Module 05 Part - 1 00:00:05
  • Process of Destroying Data Part - 2 00:03:26
  • Process of Destroying Data Part - 1 00:03:14
  • What are the different Types of Policies 00:04:44
  • What Happens if not Classified Properly 00:01:58
  • Your Involvement in this Process 00:01:55
  • A Few Jurisdictional Issues 00:01:17
  • What are the different types of Classifications 00:01:05
  • Explaining Data Classification Part - 1 00:00:05
  • Process of Classifying Data Part - 6 00:01:26
  • Process of Classifying Data Part - 5 00:02:42
  • Process of Classifying Data Part - 4 00:01:11
  • Process of Classifying Data Part - 3 00:01:39
  • Process of Classifying Data Part - 2 00:03:34
  • Process of Classifying Data Part - 1 00:01:46
  • Explaining Least Privilege 00:05:57
  • What are the Policies for Data Sharing 00:04:48
  • Explaining Data Classification Part - 2 00:00:53
  • Explaining Backup Utilities Part - 2 00:01:52
  • Reviewing Module 06 Part - 2 00:00:52
  • Reviewing Module 06 Part - 1 00:00:05
  • What is AAA? 00:03:26
  • Basics of Password Management part4 00:01:31
  • Basics of Password Management part3 00:01:19
  • Basics of Password Management Part - 2 00:01:58
  • Basics of Password Management Part - 1 00:05:01
  • Example of Password Management 00:05:27
  • Defining Passwords 00:05:19
  • Defining Passwords 00:05:19
  • What are Backup Management Practices? 00:03:30
  • How to Protect Your Digital Information? Part - 1 00:00:05
  • Explaining Backup Utilities Part - 1 00:04:07
  • Example of Backups 00:04:25
  • How Are Backups Performed? 00:02:30
  • Understanding Where to Store Backups Part - 2 00:02:25
  • Understanding Where to Store Backups Part - 1 00:02:18
  • What Should you Backup? Part - 2 00:02:36
  • What Should you Backup? Part - 1 00:02:26
  • Different Types of Backups Part - 2 00:02:20
  • Different Types of Backups Part - 1 00:05:45
  • Why Should You Backup Your Data? 00:01:40
  • How to Protect Your Digital Information? Part - 2 00:00:55
  • Introduction to Malware Part - 1 00:00:05
  • Introduction to Malware Part - 2 00:00:45
  • Few Basic Definitions 00:07:17
  • What are you seeking? 00:01:45
  • Different ways You Can Get Infected Part - 1 00:04:12
  • Different ways You Can Get Infected Part - 2 00:03:46
  • Detecting via Software 00:09:21
  • Detecting via Hardware 00:02:21
  • Detecting via Cloud Detection 00:03:31
  • Knowing the Required Extensions 00:03:25
  • Example of Knowing Your Extensions 00:07:11
  • What are Your Defences? 00:03:03
  • Reviewing Module 07 Part - 1 00:00:05
  • Reviewing Module 07 Part - 2 00:00:37
  • How to Encrypt E-mail? Part - 2 00:03:41
  • Reviewing Module 08 Part - 2 00:00:41
  • Reviewing Module 08 Part - 1 00:00:00
  • Secure Instant Messaging - Explaining Social Sites 00:02:36
  • Example of Secure Web Browsing 00:13:25
  • How to Securely Browse the web Part - 4 00:04:31
  • How to Securely Browse the web Part - 3 00:01:39
  • How to Securely Browse the web Part - 2 00:01:49
  • How to Securely Browse the web Part - 1 00:02:45
  • Ways to Avoid SPAM 00:02:45
  • What to do if You Get Malware from E-mail? 00:02:01
  • What are the Other E-mail Warnings? 00:02:27
  • Defining E-mail Attachments 00:02:37
  • Different ways to Stop SPAM 00:01:46
  • What are the E-mail Hazards? 00:01:47
  • Fundamentals of End-to-End Security Part - 1 00:00:05
  • How to Encrypt E-mail? Part - 1 00:00:58
  • Using E-mail Securely Part - 2 00:01:38
  • Using E-mail Securely Part - 1 00:02:32
  • How to Update the OS and Software? 00:03:37
  • Basics of Workstation Software 00:01:19
  • What is Hand Held Electronics? 00:02:24
  • Example of EFS 00:02:36
  • What is Encryption 00:02:37
  • The Concept of Home-Workstation Security Part - 2 00:02:20
  • The concept of Home-Workstation Security Part - 1 00:01:59
  • Explaining Physical Security Part - 2 00:02:47
  • Explaining Physical Security Part - 1 00:06:04
  • Fundamentals of End-to-End Security Part - 2 00:01:22
  • Explaining Piracy Part - 1 00:00:05
  • Explaining Piracy Part - 2 00:00:25
  • Defining Intellectual Property 00:01:32
  • Understanding Copyrights 00:01:24
  • Concept of Software Piracy 00:04:37
  • What are the different Types of Piracy Part - 1 00:01:55
  • Types of Piracy Part - 2 00:01:00
  • What are the Risks Involved Part - 1 00:01:55
  • What are the Risks Involved Part - 2 00:01:16
  • Reviewing Module 09 Part - 1 00:00:05
  • Reviewing Module 09 Part - 2 00:00:41
  • Defining Security Policies Part - 1 00:00:05
  • Defining Security Policies Part - 2 00:00:36
  • Defining Security Policies Part - 3 00:02:46
  • Defining Security Policies Part - 4 00:04:47
  • Defining Security Policies Part - 5 00:01:55
  • Importance of Policies 00:01:20
  • Explaining an Incident 00:02:10
  • What is Response Teams Part - 1 00:01:00
  • What is Response Teams Part - 2 00:02:14
  • What is Response Checklist Part - 1 00:00:32
  • What is Response Checklist Part - 2 00:01:10
  • Reviewing Module 10 Part - 1 00:00:05
  • Reviewing Module 10 Part - 2 00:00:47
  • What to Expect Looking Forward Part? - 1 00:00:05
  • What to Expect Looking Forward Part? - 2 00:00:27
  • Explaining Education and Awareness Part - 1 00:02:51
  • Explaining Education and Awareness Part - 2 00:01:50
  • Spreading Information Through Individuals 00:01:52
  • Spreading Information Through Organizations 00:00:59
  • What are Principles of Security Domains? 00:01:33
  • Reviewing Module 11 Part - 1 00:00:05
  • Reviewing Module 11 Part - 2 00:00:46
  • Course Conclusion Part - 1 00:00:05
  • Course Conclusion Part - 2 00:00:05
About the instructor
Team Gurukol
  • 3058 Reviews
  • 1025 Students
  • 204 Courses
www.facebook.com

www.facebook.com

Student feedback
4
  Average rating
  • 15%
  • 10%
  • 70%
  • 5%
  • 0%
Reviews
  • Carla M
    Carla M
  • M.d. Shanawaz
    M.d. Shanawaz
    This course by Instructor is very helpful. I am rushing through the video clips. As a new Gurukol customer I am finding the new courses are intriguing and very very useful with an unending experience as far as additional resources available. Congratulations to Instructorfor an great job.
  • Tremond Thomas
    Tremond Thomas
    This is very informative, very helpful. Proud !!
  • Trevor Cottrell
    Trevor Cottrell
    Totally worth the money !!
  • Lile Mike
    Lile Mike
    Mixed reviews .
  • David Lodewyks
    David Lodewyks
    He is a best Instructor I ever seen in my life . he enhanced my confidence to next level.
  • Jay Lil
    Jay Lil
    so far really good. i was hesitant because i thought the beginner course would be too basic but it quickly got very useful, necessary and interesting
  • June Webb
    June Webb
    ''Digital citizen'' Oo yess!! the perfect word for the 2020 year. This pandemic has converted the world into a digital world
  • Mary O.
    Mary O.
    It's a good course from me, but right about now, I realized that I am listening to the course with my shoulders tight and my fists clenched. So, I'm trying to consciously relax and listen.
  • Aditya Mittapally
    Aditya Mittapally
    I find it mostly interesting. I like the assignments but I wish there was someone to hold you acountable for your work .
  • Lucretia Ann
    Lucretia Ann
    Yes It actually resonated deeply with me as my views were already very similar however it gave me structure and context for the way to raise my 2 and 8 months old son.
  • Chester Monroe
    Chester Monroe
    My Life story is an amazing one. From believing I was a victim all my life to an empowered and fulfilling life story of continued improvement, all because I stopped unhealthy mindsets. tHIS IS GREAT.
  • Farzeen Khan
    Farzeen Khan
  • Magda Dajer
    Magda Dajer
    The exercises that accompany each lesson were well explained and detailed, and the idea of having a discussion team throughout the course is fun and engaging.
  • Benjamin Cavazos
    Benjamin Cavazos
    The Instructor very well explained the concepts and the experimental findings related to happiness. He also linked those studies to how we can apply them for making us happy and that makes this course more justified.
  • Angelina Cirelli
    Angelina Cirelli
  • Kristen L
    Kristen L
    Very helpful course. I strongly recommend to anyone who wants to feel in control of their inbox.
  • Toni Olson
    Toni Olson
    this year has shown everyone the digital importance to the world. But due to lack of resouces, some people are left unawre about digital knoledge. this course is definitely for them.
  • Rowena Anderson
    Rowena Anderson
    2020 has taught everyone that everything can be done right just sitting at home. But at the same time we also encountered with alot of cyber crime. To deal with that problems, this course is a perfect one !!
  • Phalak Singla
    Phalak Singla
    Fantastic course and easy to follow. Good combination of online lectures and notes. Will be looking at studying further courses
2020 Way of Cybersecurity for Digital Citizens

Try it free for 7 days

Get this course plus all 700+ Team Gurukol courses in one affordable price subscription. All future courses included in this plan. Learn more.

Choose one of the following plan:


$47 $97
Buy single course
Includes in this course:
  • 06:36:51 Hours On demand videos
  • 179 Lessons
  • Anytime access
  • Access on mobile