Moocable is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Introduction to Personal Digital Security

Description

Hackers and cyber threats are a fact of today's modern, digital world. Everyone needs to be able to protect themselves from these threats.

Hackers and cyber threats are a fact of today's modern, digital world. Everyone needs to be able to protect themselves from these threats to keep themselves and their data safe.



### Take-Away Skills

This course is a high-level overview of essential digital personal security topics. After this conceptual course, you will be able to:
- Detect and avoid social engineering attacks
- Recognize different types of threat actors
- Identity types of malware
- Secure your personal Linux and Windows computers

Tags

Syllabus

  • Avoiding Social Engineering Attacks: Learn how hackers use phishing, spam, scams, and influence campaigns to trick victims.
    • Article: Phishing
    • Lesson: Spam, Scams, and Other Falsehoods
    • Article: Influence Campaigns
  • Hackers and Cyber Attacks: Learn about common malware and threat actors.
    • Lesson: Malware
    • Lesson: Threat Actors
  • Securing Your Computer: Learn some tips and tricks for securing your personal computers.
    • Article: Personal Security Best Practices
    • Article: Personal Security: Hardening Your Device
    • Article: Linux Hardening
    • Article: Windows Hardening
  • Personal Digital Security Next Steps: Congratulations! You've completed this course. Where should you go next?
    • Informational: Next Steps: Personal Digital Security

Online Course


Introduction to Personal Digital Security

Affiliate notice

Hackers and cyber threats are a fact of today's modern, digital world. Everyone needs to be able to protect themselves from these threats.

Hackers and cyber threats are a fact of today's modern, digital world. Everyone needs to be able to protect themselves from these threats to keep themselves and their data safe.



### Take-Away Skills

This course is a high-level overview of essential digital personal security topics. After this conceptual course, you will be able to:
- Detect and avoid social engineering attacks
- Recognize different types of threat actors
- Identity types of malware
- Secure your personal Linux and Windows computers

  • Avoiding Social Engineering Attacks: Learn how hackers use phishing, spam, scams, and influence campaigns to trick victims.
    • Article: Phishing
    • Lesson: Spam, Scams, and Other Falsehoods
    • Article: Influence Campaigns
  • Hackers and Cyber Attacks: Learn about common malware and threat actors.
    • Lesson: Malware
    • Lesson: Threat Actors
  • Securing Your Computer: Learn some tips and tricks for securing your personal computers.
    • Article: Personal Security Best Practices
    • Article: Personal Security: Hardening Your Device
    • Article: Linux Hardening
    • Article: Windows Hardening
  • Personal Digital Security Next Steps: Congratulations! You've completed this course. Where should you go next?
    • Informational: Next Steps: Personal Digital Security