Secure Corporate Communications & Networking

IT Security
  • 12 Videos | 46m 46s
  • Includes Assessment
  • Earns a Badge
Likes 40 Likes 40
Social networking offers countless opportunities but just as countless are the security threats posed by these advancements. Explore the common threats to corporate computers and devices that exploit vulnerabilities in communications.

WHAT YOU WILL LEARN

  • identify the threats to corporate security that can result from unsecured communications technologies
    identify the potential threats from unsecured e-mail usage
    describe best practices for ethical and safe e-mail use
    identify the common security threats to corporate systems and infrastructure from using unsecured webmail access at work
    identify best practices for securely accessing webmail services
    describe the common corporate security risks of Internet usage
  • identify secure corporate Internet usage best practices
    identify characteristics and risks of social engineering scams
    describe techniques to avoid being a victim of social engineering scams
    identify risks to corporate systems from unsecured social networking activities
    identify best practices when using social networking platforms
    identify best practices for securely using corporate e-mail, access webmail, Internet use, and social networking activities

IN THIS COURSE

  • Playable
    1. 
    Corporate Communications Technology Risks
    3m 39s
    UP NEXT
  • Playable
    2. 
    E-mail Usage Threats
    5m 58s
  • Locked
    3. 
    Secure E-mail Use Best Practices
    2m 30s
  • Locked
    4. 
    Webmail Access Threats
    1m 49s
  • Locked
    5. 
    Webmail Access Best Practices
    2m 37s
  • Locked
    6. 
    Internet Usage Threats
    3m 38s
  • Locked
    7. 
    Secure Internet Usage Best Practices
    4m 17s
  • Locked
    8. 
    Social Engineering Scam Characteristics
    3m 20s
  • Locked
    9. 
    Avoiding Social Engineering Scams
    3m
  • Locked
    10. 
    Social Networking Security Challenges
    2m 9s
  • Locked
    11. 
    Secure Social Networking Practices
    4m 21s
  • Locked
    12. 
    Exercise: Secure Communications Methods
    3m 57s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Likes 85 Likes 85  
CHANNEL Cybersecurity
Likes 338 Likes 338  
Likes 217 Likes 217  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

COURSE SOLID & GRASP
Likes 3218 Likes 3218  
Likes 13 Likes 13  
Likes 27 Likes 27