In this section, you will learn about staying up-to-date with driver updates. Now, we already know that it’s important to update your operating system in your application software because there …
In this section, we will focus on best practices for written passwords. There are several ways in which you can keep your password safe as part of a ‘clear desk’ …
In the upcoming steps, you will learn about your options for data encryption. The first thing to know is that there are a lot of options for you to choose …
A password manager is usually a piece of software or a hardware device that can store various passwords. Not only will it store various passwords, but it will also store …
In this section, we’re talking about physically securing important media. We have different types of media that we need to secure. And, considering the type of data that we tend …
In this section, you will learn about the importance of protecting your phone. If you think about it, we tend to keep a lot of sensitive information on our phones. …
Welcome to the final week of An Introduction to Cybersecurity! In the past couple of weeks, you have learned about some best practices, how to ensure physical security and how …
Here are 5 things you can do to help. 1. Update your antivirus if you’re able to Some viruses will knock out your antivirus the first chance it gets. But …
In the coming week, we will cover four main topics: Social Media, Internet Security, Viruses as well as Data Backups, and Recovery. By the end of the week, you will …
Welcome to Cyber Security Foundations: Why Cyber Security is Important and the start of your learning journey on the Cyber Security Foundations ExpertTrack brought to you by EC Council. Over …
As you work through the courses in this ExpertTrack you’ll see opportunities to add comments at the end of most steps. There might be a question or problem to discuss, …
Over the next three weeks, you will get to grips with the basics of cybersecurity, learn how to address suspicious internet activity, and how to perform cybersecurity processes as part …