Cyber Security Fundamentals
About This Course

Learning Objectives
Reports of online scams and cyberattacks are on the rise, but most people don’t heed them until it’s too late. So, what steps can you take right away to avoid becoming another cautionary tale? One critical security measure is protecting yourself against phishing—when an attacker pretends to be a trusted contact or organization to gain access to personal information.
In this course, you’ll learn exactly what you’re dealing with in a phishing attack, as well as how to spot one. Most importantly, you’ll pick up immediately applicable tips to prevent theft and stop attackers in their tracks.
Curriculum
10 Lessons2h 11m
What is Cyber Security
Phishing Attacks
Reports of online scams and cyberattacks are on the rise, but most people don’t heed them until it’s too late. So, what steps can you take right away to avoid becoming another cautionary tale? One critical security measure is protecting yourself against phishing—when an attacker pretends to be a trusted contact or organization to gain access to personal information.
Online Security
How do you keep your home safe? At the minimum, most people lock the doors when they leave. Others install motion-sensitive lights or security cameras. Some invest in alarm systems to protect against threats.
But safeguards aren't just for physical spaces. We store highly sensitive data online. Exposure of that data has a far-reaching impact, with consequences more devastating than losing valuables to a thief.
Social Engineering
Social engineering is the art of manipulation to steal information. Unlike cybercrimes that involve cracking complex algorithms, it relies on predictable human behavior to get victims to reveal information voluntarily.
