TOIT Training

Think Before You Click

Think Before You Click
  • Overview
  • Curriculum
  • Reviews

Instructor : Ken Dwight

Is it real or is it a trap? Learn how to protect yourself from cybercriminals!

Hundreds of times per day, cybercriminals are attempting to access your computer or your data, often by tricking you with fake emails, fake links, or even fake phone calls and voicemails. How do you know what’s real and what you should avoid?

In this course, IT security expert Ken Dwight, aka “The Virus Doctor” will walk you through the world of cybersecurity, including all the attacks, techniques, and strategies the bad guys use everyday to try and make us click without thinking.

Along with Microsoft trainer Lisa Lopez, Ken will cover the critical topics everyone needs to know, including:

  • The types of attacks all users face every day
  • The threats posed by Phishing, Spear-Phishing, Spyware, Ransomware, Sextortion, and more
  • What the criminals hope to gain by attacking you and your devices
  • The ways you can protect yourself and your computer
  • The characteristics of a strong password
  • The best backup strategies to protect your data from ransomware attacks
  • The social engineering techniques that criminals use to prey on your emotions so you let your guard down and allow them into your computer or accounts

With real life examples culled from over 20 years in IT security, “The Virus Doctor” will teach all you need to know in this engaging, effective eLearning course!

Objectives – You will be able to:

  • Describe the threats from cybercriminals which target your devices and yourself
  • Define cybersecurity terms including phishing, vishing, ransomware, sextortion, social engineering, and botnets
  • List benefits cybercriminals hope to achieve by attacking people and devices
  • Describe the role played by hardware, software, priviliege level, and updates in protecting your computer
  • Identify at least three characteristics of a “strong” password
  • Explain the 3-2-1 backup strategy and how it protects from ransomware
  • List at least three ways criminals hope to get access to your computer
  • Discuss the role of clickbait and social engineering in cybersecurity attacks
  • 0 Sections
  • 0 Lessons
  • 0 Quizzes
  • 55m Duration
Expand All

0

0 Ratings
5 Star 0%
4 Star 0%
3 Star 0%
2 Star 0%
1 Star 0%

Reviews

Free

Start Course

Retake Course

Are you sure you want to retake the course? This action will permanently delete all your progress in this course.

Course Includes

  • Lessons Include:

    01: Introduction (2:18)
    02: Types of Threats (9:13)
    03: Protecting Your Computer (7:28)
    04: Strong Password (6:26)
    05: Social Engineering (2:52)
    06: Backups (3:34)
    07: Clickbait (6:13)
    08: Protecting Yourself (11:32)
    09: Red Flags (6:22)

Deleting Course Review

Are you sure? You can't restore this back

Course Access

This course is password protected. To access it please enter your password below:

Buy for group

Think Before You Click
No groups Found

You don't have any groups yet

Create a group and add group members. Sync Group(s)