Paths

Expert Perspectives on Cyber Security

Authors: Serge Borso, Donna Bower, Bob Bowles, Todd Edmands, Scott Hogg, David Kruger, Jennifer Kurtz, Steve Maciejewski, Jordan Scott, Tom Tobiassen

Mentor Source, a collaboration of distinguished thought leaders, speakers, authors, coaches, and researchers, presents a series of conversations and insights on Cyber Security... Read more

Security Basics

Learn about cyber security and why it is important.

Cyber Security Awareness: Security Overview

by Steve Maciejewski

Dec 23, 2016 / 29m

29m

Start Course
Description

If you're someone who uses technology and has concerns about your digital security then this course, Cyber Security Awareness: Security Overview, is a great course for you. In this course, we will first cover different areas that are top priorities for security organizations. Then we will look at where threats are coming from in our current global environment before finally looking at the reality of cyber attacks in our current global environment.

Table of contents
  1. Introduction1m
  2. What the C Suite Wants to Know7m
  3. What Are the Threats?5m
  4. Where the Threats Are Emanating From9m
  5. Cyber Attacks Are Here to Stay1m
  6. Conclusion3m

Building Your Cyber Security Vocabulary

by Serge Borso

Aug 30, 2016 / 57m

57m

Start Course
Description

Given the constant barrage of malware, scams, cyber attacks, and the like, having a firm understanding of how and why cyber security helps to protect users and companies is critical. This course, Building Your Cyber Security Vocabulary, will help get you to that understanding. You'll start with an overview of cyber security and why it matters. Next, you'll learn about the most commonly used vocabulary in the industry, how to use it, and the distinct meaning of some of the words that often get used interchangeably and incorrectly. Last, you'll focus in on using the new vocabulary in a meaningful way, getting your point across in a given situation, and how to tailor your message to a specific audience. When you're finished with this course, you should be ready to understand and use the common language surrounding cyber security risks, threats, attacks, and solutions.

Table of contents
  1. Welcome2m
  2. Introduction14m
  3. Information Security11m
  4. Building Your Vocabulary13m
  5. Putting It All Together14m
  6. Conclusion1m

Cyber Security Awareness: The Importance of Identity Protection

by Donna Bower

Nov 18, 2016 / 1h 12m

1h 12m

Start Course
Description

Are you a modern-day internet user who is concerned about protecting your identity? If so, then this course in the cyber security awareness series by MentorSource, The Importance of Identity Protection, is just the course for you. In this course you'll first explore types of identity that can be stolen before moving onto ways to protect your identity. Finally, you'll look at password security and how important it is in protecting your identity.

Table of contents
  1. Introduction1m
  2. Identity and Identity Theft12m
  3. Protecting Your Identity32m
  4. Password Security24m
  5. Conclusion1m

Threats

Learn about the various security threats that exist and how to mitigate them.

Cyber Security Awareness: Malware Explained

by Serge Borso

Oct 3, 2016 / 52m

52m

Start Course
Description

Do you feel concerned about threats to your cyber security by malware? If so this course is for you! Join us as first we learn a little background about malware before learning about the risks and implications, and then finally moving on to ways to protect ourselves and our company from dangerous malware.

Table of contents
  1. Introduction3m
  2. Malware Background22m
  3. Malware Risks and Implications11m
  4. Protection from Malware11m
  5. Wrapping Up2m

Cyber Security Awareness: Phishing and Whaling

by Todd Edmands

Nov 17, 2016 / 54m

54m

Start Course
Description

If you work in any sort of business environment or deal with personal transactions through the Internet then you need to be aware of phishing and whaling attacks. In this course, Cyber Security Awareness: Phishing and Whaling, you will learn how to protect yourself. First, you'll learn about what exactly phishing is before moving on to the various methods of attacks and how to reduce your risk. Next, you'll learn about whaling attacks and what to watch for. Finally, you'll learn about last measures and how to be successful against all attacks.

Table of contents
  1. Introduction1m
  2. What Is Phishing?5m
  3. Types and Impacts of Phishing7m
  4. Various Methods of Phishing Attacks9m
  5. Solutions to Reduce Phishing7m
  6. Whaling19m
  7. Wrapping Up5m

Cyber Security Awareness: Social Engineering

by Tom Tobiassen

Dec 13, 2016 / 59m

59m

Start Course
Description

As we rely more and more on technology, people are becoming and more and more complacent with the information they share with friends and family. If you have a concern about how you might be sharing information inadvertently, then this course, Cyber Security Awareness: Social Engineering, can help. First, you'll look at the background and topics that make up social engineering. Then, you'll explore some of the common areas risks arise out of including the Stranded Traveler, Baiting, and RFID Theft. Finally, you will learn about countermeasures for all these threats. By the end of this course, you'll have a better understanding of the types of risks you take when sharing information and how to prevent them.

Table of contents
  1. Introduction5m
  2. Getting Started5m
  3. Tactics44m
  4. Best Practices3m

Cyber Security Awareness: Electronic Commerce Security

by Bob Bowles

Nov 29, 2016 / 48m

48m

Start Course
Description

Have you ever purchased anything through the Internet? With e-commerce becoming more and more available and preferred, it's important to know the dos and don'ts of e-commerce. This course, Cyber Security Awareness: Electronic Commerce Security, will teach you what you need to know for safe e-commerce. First you will learn how to secure your electronic commerce connections. Next you will look at mitigation controls. Finally, you'll end the course looking at the different compliance laws that govern transactions. By the end of this course, you'll have a solid foundation of the security practices needed to navigate the e-commerce world.

Table of contents
  1. Introduction5m
  2. Overview9m
  3. Securing Electronic Commerce Connections12m
  4. Mitigation Controls14m
  5. Conclusion5m

Cyber Security Awareness: Social Networking at Work

by Todd Edmands

Dec 9, 2016 / 48m

48m

Start Course
Description

Are you someone who uses social media? If you are, then Cyber Security Awareness: Social Networking at Work is the course for you. First, you'll explore social media, the risks associated with it and why hackers want to use it to find your information. Then you'll look at how you can mitigate social media risks before ending with steps to stay safe. By the end of this course, you'll have the knowledge to keep your information - and yourself, more secure.

Table of contents
  1. Introduction5m
  2. Social Media Explored20m
  3. Mitigating Social Media Risks19m
  4. Conclusion3m

Cloud Security and Security On-the-Go

Learn the basics of cloud security, and best practices for when you’re on-the-go.

Breaking Down Cloud Security

by Scott Hogg

Jun 14, 2016 / 1h 49m

1h 49m

Start Course
Description

With so much of technology today dependent on cloud computing, it is important to ensure that your business has cloud security in mind. In this course, you will be learning about the basics of cloud computing, security best practices for clouds, and other cloud security considerations that will ensure success for your business.

Table of contents
  1. Introduction2m
  2. Brief Overview of Cloud Computing10m
  3. Cloud Security Considerations24m
  4. Security Best Practices for Clouds33m
  5. Other Cloud Security Considerations27m
  6. Conclusion11m

Cyber Security Awareness: Security for Cloud Services

by Bob Bowles

Oct 28, 2016 / 59m

59m

Start Course
Description

Are you a cloud user who has concerns about security? This course, Cyber Security Awareness: Security for Cloud Services, can help you use these services with greater security. First, you will run through a quick cloud architecture overview before moving on and talking about clouds and security. Finally, you will look at cloud risk mitigation strategies to help mitigate risks and employ best practices for cloud usage.

Table of contents
  1. Introduction3m
  2. Cloud Architecture Overview22m
  3. Clouds and Security10m
  4. Cloud Risk Mitigation Strategies18m
  5. Conclusion3m

Cyber Security While Traveling

by Jordan Scott

Sep 9, 2016 / 54m

54m

Start Course
Description

Have you ever found yourself on the road connecting to a public access point? If you have, you might have put yourself at risk from a security standpoint. In this course, Cyber Security While Traveling, you'll learn about situations where you're at risk and how to keep your information and electronics secure. First, you'll learn about the important "Travel Triangle of Security." Then, you'll explore different wireless and wired situations as well as the concerns that might come from them. Finally, this course will cover threats and countermeasures with a demonstration on how to best protect yourself. By the end of this course, you'll be able to apply what you've learned about cyber security to keep your data secure, whether in the airport, on the train, or across the globe.

Table of contents
  1. Introduction2m
  2. Travel Triangle of Security10m
  3. Wireless Situations7m
  4. Wired Situations7m
  5. Threats and Countermeasures18m
  6. Demonstration8m
  7. Conclusion0m

Cyber Security Awareness: Security by Geolocation

by Jordan Scott

Oct 28, 2016 / 57m

57m

Start Course
Description

Have you ever found yourself connecting to a Wi-Fi hotspot at a coffee shop and wondering how someone could figure out where you are? This course, Cyber Security Awareness: Security by Geolocation will help you understand how a geological presence with each signal. First, you will get a look at the heavy dependence on wireless technology and what it opens a user up to. Then, you will explore how wardriving can be used for a defensive purpose. You will also see triangulation, trilateration, and multilateration methods of geolocation. Finally, you will see some of the products available to perform geolocation. When you're finished with this course, you will better understand how to locate wireless signal sources using geolocation techniques.

Table of contents
  1. Introduction7m
  2. Wardriving18m
  3. Geolocation23m
  4. Available Products6m
  5. Conclusion1m

Cyber Security Awareness: Mobile Device Security

by Jennifer Kurtz

Dec 28, 2016 / 1h 19m

1h 19m

Start Course
Description

If you are like the millions of people these days who use a mobile device for more than simply receiving and making phone calls then this course in the Cyber Security Awareness series, Mobile Device Security is the course for you. In the course, we will first look at the way that mobile devices have been used and adapted for everyday use. Then we will explore the most common ways devices are exploited before ending with ways to mitigate the common vulnerabilities.

Table of contents
  1. Introduction5m
  2. Uses and Technologies33m
  3. Device Exploitation18m
  4. Vulnerability Mitigation14m
  5. Summary7m

Cyber Security Awareness: The Protection and Destruction of Portable Data

by Jennifer Kurtz

Dec 29, 2016 / 58m

58m

Start Course
Description

More and more, the world has come to rely on the availability of portable data. If you are someone who is concerned about how to protect your portable data, then this course is for you. First, you'll learn about the current trends in data protection in several major fields like health care, business, the financial sector, and personal use. Then you'll explore the legal constraints around the data other companies hold. Finally, you'll end the course learning about the ways to protect yourself and your data. By the end of this course, you'll have a greater understanding of protection you'll need to keep your portable data secure.

Table of contents
  1. Introduction8m
  2. Portable Data Trends30m
  3. Portable Data Governance8m
  4. Portable Data Protection5m
  5. Wrap Up4m

Security Breach Prevention

Learn techniques that can be used to help keep your information safe.

Cyber Security Awareness: Backing up Your Data

by Bob Bowles

Oct 27, 2016 / 1h 0m

1h 0m

Start Course
Description

Have you ever worried about how to back up your important data so that you or your business is not at risk of losing valuable information? If you have, then this course is for you! First, you will learn about different security plans. Then, you will learn about the information risks associated with data backups. Finally, you'll spend some time exploring the best practice procedures and schedules for backing up your data.

Table of contents
  1. Introduction8m
  2. Security Plans22m
  3. Information Risks17m
  4. Backup Plan7m
  5. Conclusion3m

Cyber Security Awareness: Safer Digital Communications

by Tom Tobiassen

Dec 21, 2016 / 1h 6m

1h 6m

Start Course
Description

As we become more and more dependent on digital communications it is important to be aware of how to send and receive safer digital communications. In this course, Cyber Security Awareness: Safer Digital Communications, you'll learn about how to harden your systems and networks before exploring how to protect your identity from some of the common internet dangers. Finally, the course will look at data scrambling and how to secure your networks.

Table of contents
  1. Introduction9m
  2. Protecting Your Identity11m
  3. Dangers on the Internet11m
  4. Data Scrambling16m
  5. Networks9m
  6. Wrapping Up7m

Cyber Security Awareness: Digital Data Protection

by David Kruger

Dec 20, 2016 / 49m

49m

Start Course
Description

Malicious individuals getting access to your data is always something to be concerned about. This course, Cyber Security Awareness: Digital Data Protection, hopes to help alleviate some of those conerns. First, you will learn about the nature of data thefts today. Next, you'll dive into learning about digital data theft. Finally, you'll explore different fixes that are available to make your data usage safer. By the end of this course, you should feel more confident in your ability to protect you're own data.

Table of contents
  1. Introduction1m
  2. Security Overview4m
  3. Digital Data Theft24m
  4. The Fix15m
  5. Conclusion2m

Cyber Security Awareness: Pairing Physical and Digital Security

by Jordan Scott

Nov 7, 2016 / 50m

50m

Start Course
Description

Do you worry about how your physical security vulnerabilities might also weaken your digital security? If so this course is for you! First you'll learn why physical and digital security are so important. Next, you'll discover how to integrate the two securities before finishing up by looking at how to avoid complacency through good policy.

Table of contents
  1. Introduction6m
  2. Physical Security8m
  3. Digital Security7m
  4. Integrating Security15m
  5. Complacency and Policy10m
  6. Conclusion1m

Cyber Security Awareness: Identifying Personally Identifiable Information (PII)

by Jennifer Kurtz

Dec 29, 2016 / 1h 24m

1h 24m

Start Course
Description

As society becomes more and more reliant upon the Internet, more and more people are sharing Personally Identifiable Information (PII) across the web. This course, Cyber Security Awareness: Identifying Personally Identifiable Information (PII), will help you learn how to be more secure about the information you share. First, you will look at exactly what makes up PII. Then, you'll explore the legal and regulatory influences that determine what PII is protected. Finally, you'll dive into common PII breach situations and learn about remedies for when your PII has been breached. By the end of this course, you'll have a better understanding in how to protect your PII.

Table of contents
  1. Introduction7m
  2. Definitions: What Is PII?16m
  3. PII Repositories: Where Is PII Found?8m
  4. Legal And Regulatory Influences: Why Is PII Protected?29m
  5. PII Breach Case Studies12m
  6. PII Protection Practices6m
  7. Conclusion2m

Cyber Security Awareness: The Internet of Things (IoT)

by Tom Tobiassen

Dec 21, 2016 / 54m

54m

Start Course
Description

Have you joined the global movement of people who are connected through the IoT? If so, Cyber Security Awareness: The Internet of Things (IoT), is the course for you. First you'll take a quick look at the current cyber environment before addressing security concerns that come when dealing with kids, robots, health devices, smart cars, and drones. Finally you'll look at some protective measures that can be employed to better protect your interests.

Table of contents
  1. Introduction6m
  2. The Internet of Things37m
  3. Protective Measures10m

What you will learn

  • Security Basics
  • Threats
  • Cloud Security
  • Security while Traveling
  • Mobile Device Security
  • Security Breach Prevention

Pre-requisites

There are no prerequisites required for this path.