Keeping Your Information Safe
Learning Outcomes
Get More Info
data, Tech & ai skills in






What’s Included
Introduction to Information Security
Introduction to Information Security
This lesson introduces the concept of information security and its importance in a business context.
Identifying Phishing Attacks
Identifying Phishing Attacks
Phishing is a common attack that attempts to steal sensitive personal information. This lesson helps you identify and avoid these attacks.
Understanding Social Engineering
Understanding Social Engineering
Phishing is one example of a social engineering scam. This lesson takes a broad look at social engineering, and helps you identify the emotions these scammers target, helping you to avoid being a victim of these attacks.
Data Breaches and Data Leaks
Data Breaches and Data Leaks
Data breaches and data leaks both result in the loss of important data from a company. This lesson teaches you the difference between breaches and leaks, and how to prevent them.
Creating Effective Passwords
Creating Effective Passwords
Passwords are the most common tool used to protect sensitive information, so it's important to have a strong password. This lesson teaches you several strategies for creating such a password.
Securing Your Passwords
Securing Your Passwords
There are many measures that can be used to strengthen your passwords, such as password managers, two-factor authentication, and single sign-on. This lesson explains the benefits of these tools.
Using the Internet Safely
Using the Internet Safely
Internet browsing can pose various different threats to your information. This lesson outlines some of these threats and how to avoid them.
Securing Your Internet Usage
Securing Your Internet Usage
Many technical solutions are available that can make your internet browsing more secure, such as encryption. This lesson explains the process of encryption, as well as several of its applications.
Keeping Your Workspace Safe
Keeping Your Workspace Safe
One aspect of information security that can be overlooked is maintaining the safety of the physical workspace where you interact with that data. This lesson teaches you how to keep this workspace safe.
Keeping Your Devices Safe
Keeping Your Devices Safe
One potential method of inappropriately accessing confidential information is to access the devices where that information is stored. This lesson teaches you how to keep your devices safe, and prevent this from happening.
