Paths

Expert Perspectives on Cyber Security

Authors: Serge Borso, Bob Bowles, Todd Edmands, Jordan Scott, Donna Bower, Tom Tobiassen, Jennifer Kurtz, Scott Hogg, David Kruger, Steve Maciejewski

Mentor Source, a collaboration of distinguished thought leaders, speakers, authors, coaches, and researchers, presents a series of conversations and insights on Cyber Security... Read more

Security Basics

Learn about cyber security and why it is important.

1

Cyber Security Awareness: Security Overview

by Steve Maciejewski

Dec 23, 2016 / 29m

Beginner • 29m

Start Course
Description

If you're someone who uses technology and has concerns about your digital security then this course, Cyber Security Awareness: Security Overview, is a great course for you. In this course, we will first cover different areas that are top priorities for security organizations. Then we will look at where threats are coming from in our current global environment before finally looking at the reality of cyber attacks in our current global environment.

Table of contents
  1. Introduction
    1m 17s
  2. What the C Suite Wants to Know
    7m 33s
  3. What Are the Threats?
    5m 9s
  4. Where the Threats Are Emanating From
    9m 21s
  5. Cyber Attacks Are Here to Stay
    1m 56s
  6. Conclusion
    3m 57s
2

Building Your Cyber Security Vocabulary

by Serge Borso

Aug 30, 2016 / 57m

Beginner • 57m

Start Course
Description

Given the constant barrage of malware, scams, cyber attacks, and the like, having a firm understanding of how and why cyber security helps to protect users and companies is critical. This course, Building Your Cyber Security Vocabulary, will help get you to that understanding. You'll start with an overview of cyber security and why it matters. Next, you'll learn about the most commonly used vocabulary in the industry, how to use it, and the distinct meaning of some of the words that often get used interchangeably and incorrectly. Last, you'll focus in on using the new vocabulary in a meaningful way, getting your point across in a given situation, and how to tailor your message to a specific audience. When you're finished with this course, you should be ready to understand and use the common language surrounding cyber security risks, threats, attacks, and solutions.

Table of contents
  1. Welcome
    2m 24s
  2. Introduction
    14m
  3. Information Security
    11m 58s
  4. Building Your Vocabulary
    13m 7s
  5. Putting It All Together
    14m 28s
  6. Conclusion
    1m 23s
3

Cyber Security Awareness: The Importance of Identity Protection

by Donna Bower

Nov 18, 2016 / 1h 12m

Beginner • 1h 12m

Start Course
Description

Are you a modern-day internet user who is concerned about protecting your identity? If so, then this course in the cyber security awareness series by MentorSource, The Importance of Identity Protection, is just the course for you. In this course you'll first explore types of identity that can be stolen before moving onto ways to protect your identity. Finally, you'll look at password security and how important it is in protecting your identity.

Table of contents
  1. Introduction
    1m 7s
  2. Identity and Identity Theft
    12m 12s
  3. Protecting Your Identity
    32m 30s
  4. Password Security
    24m 54s
  5. Conclusion
    1m 44s

Threats

Learn about the various security threats that exist and how to mitigate them.

4

Cyber Security Awareness: Malware Explained

by Serge Borso

Oct 3, 2016 / 52m

Beginner • 52m

Start Course
Description

Do you feel concerned about threats to your cyber security by malware? If so this course is for you! Join us as first we learn a little background about malware before learning about the risks and implications, and then finally moving on to ways to protect ourselves and our company from dangerous malware.

Table of contents
  1. Introduction
    3m 54s
  2. Malware Background
    22m 51s
  3. Malware Risks and Implications
    11m 48s
  4. Protection from Malware
    11m 22s
  5. Wrapping Up
    2m 33s
5

Cyber Security Awareness: Phishing and Whaling

by Todd Edmands

Nov 17, 2016 / 54m

Beginner • 54m

Start Course
Description

If you work in any sort of business environment or deal with personal transactions through the Internet then you need to be aware of phishing and whaling attacks. In this course, Cyber Security Awareness: Phishing and Whaling, you will learn how to protect yourself. First, you'll learn about what exactly phishing is before moving on to the various methods of attacks and how to reduce your risk. Next, you'll learn about whaling attacks and what to watch for. Finally, you'll learn about last measures and how to be successful against all attacks.

Table of contents
  1. Introduction
    1m 6s
  2. What Is Phishing?
    5m 19s
  3. Types and Impacts of Phishing
    7m 1s
  4. Various Methods of Phishing Attacks
    9m 11s
  5. Solutions to Reduce Phishing
    7m 10s
  6. Whaling
    19m 11s
  7. Wrapping Up
    5m 39s
6

Cyber Security Awareness: Social Engineering

by Tom Tobiassen

Dec 13, 2016 / 59m

Beginner • 59m

Start Course
Description

As we rely more and more on technology, people are becoming and more and more complacent with the information they share with friends and family. If you have a concern about how you might be sharing information inadvertently, then this course, Cyber Security Awareness: Social Engineering, can help. First, you'll look at the background and topics that make up social engineering. Then, you'll explore some of the common areas risks arise out of including the Stranded Traveler, Baiting, and RFID Theft. Finally, you will learn about countermeasures for all these threats. By the end of this course, you'll have a better understanding of the types of risks you take when sharing information and how to prevent them.

Table of contents
  1. Introduction
    5m 59s
  2. Getting Started
    5m 13s
  3. Tactics
    44m 32s
  4. Best Practices
    3m 26s
7

Cyber Security Awareness: Electronic Commerce Security

by Bob Bowles

Nov 29, 2016 / 48m

Beginner • 48m

Start Course
Description

Have you ever purchased anything through the Internet? With e-commerce becoming more and more available and preferred, it's important to know the dos and don'ts of e-commerce. This course, Cyber Security Awareness: Electronic Commerce Security, will teach you what you need to know for safe e-commerce. First you will learn how to secure your electronic commerce connections. Next you will look at mitigation controls. Finally, you'll end the course looking at the different compliance laws that govern transactions. By the end of this course, you'll have a solid foundation of the security practices needed to navigate the e-commerce world.

Table of contents
  1. Introduction
    5m 42s
  2. Overview
    9m 22s
  3. Securing Electronic Commerce Connections
    12m 31s
  4. Mitigation Controls
    14m 59s
  5. Conclusion
    5m 25s
8

Cyber Security Awareness: Social Networking at Work

by Todd Edmands

Dec 9, 2016 / 48m

Beginner • 48m

Start Course
Description

Are you someone who uses social media? If you are, then Cyber Security Awareness: Social Networking at Work is the course for you. First, you'll explore social media, the risks associated with it and why hackers want to use it to find your information. Then you'll look at how you can mitigate social media risks before ending with steps to stay safe. By the end of this course, you'll have the knowledge to keep your information - and yourself, more secure.

Table of contents
  1. Introduction
    5m 30s
  2. Social Media Explored
    20m 10s
  3. Mitigating Social Media Risks
    19m 31s
  4. Conclusion
    3m 27s

Cloud Security and Security On-the-Go

Learn the basics of cloud security, and best practices for when you’re on-the-go.

9

Breaking Down Cloud Security

by Scott Hogg

Jun 14, 2016 / 1h 49m

Beginner • 1h 49m

Start Course
Description

With so much of technology today dependent on cloud computing, it is important to ensure that your business has cloud security in mind. In this course, you will be learning about the basics of cloud computing, security best practices for clouds, and other cloud security considerations that will ensure success for your business.

Table of contents
  1. Introduction
    2m 38s
  2. Brief Overview of Cloud Computing
    10m 18s
  3. Cloud Security Considerations
    24m 23s
  4. Security Best Practices for Clouds
    33m 36s
  5. Other Cloud Security Considerations
    27m 3s
  6. Conclusion
    11m 14s
10

Cyber Security Awareness: Security for Cloud Services

by Bob Bowles

Oct 28, 2016 / 59m

Beginner • 59m

Start Course
Description

Are you a cloud user who has concerns about security? This course, Cyber Security Awareness: Security for Cloud Services, can help you use these services with greater security. First, you will run through a quick cloud architecture overview before moving on and talking about clouds and security. Finally, you will look at cloud risk mitigation strategies to help mitigate risks and employ best practices for cloud usage.

Table of contents
  1. Introduction
    3m 19s
  2. Cloud Architecture Overview
    22m 51s
  3. Clouds and Security
    10m 31s
  4. Cloud Risk Mitigation Strategies
    18m 27s
  5. Conclusion
    3m 57s
11

Cyber Security While Traveling

by Jordan Scott

Sep 9, 2016 / 54m

Beginner • 54m

Start Course
Description

Have you ever found yourself on the road connecting to a public access point? If you have, you might have put yourself at risk from a security standpoint. In this course, Cyber Security While Traveling, you'll learn about situations where you're at risk and how to keep your information and electronics secure. First, you'll learn about the important "Travel Triangle of Security." Then, you'll explore different wireless and wired situations as well as the concerns that might come from them. Finally, this course will cover threats and countermeasures with a demonstration on how to best protect yourself. By the end of this course, you'll be able to apply what you've learned about cyber security to keep your data secure, whether in the airport, on the train, or across the globe.

Table of contents
  1. Introduction
    2m 19s
  2. Travel Triangle of Security
    10m 3s
  3. Wireless Situations
    7m 56s
  4. Wired Situations
    7m 31s
  5. Threats and Countermeasures
    18m 4s
  6. Demonstration
    8m 8s
  7. Conclusion
    45s
12

Cyber Security Awareness: Security by Geolocation

by Jordan Scott

Oct 28, 2016 / 57m

Intermediate • 57m

Start Course
Description

Have you ever found yourself connecting to a Wi-Fi hotspot at a coffee shop and wondering how someone could figure out where you are? This course, Cyber Security Awareness: Security by Geolocation will help you understand how a geological presence with each signal. First, you will get a look at the heavy dependence on wireless technology and what it opens a user up to. Then, you will explore how wardriving can be used for a defensive purpose. You will also see triangulation, trilateration, and multilateration methods of geolocation. Finally, you will see some of the products available to perform geolocation. When you're finished with this course, you will better understand how to locate wireless signal sources using geolocation techniques.

Table of contents
  1. Introduction
    7m 59s
  2. Wardriving
    18m 1s
  3. Geolocation
    23m 54s
  4. Available Products
    6m 2s
  5. Conclusion
    1m 15s
13

Cyber Security Awareness: Mobile Device Security

by Jennifer Kurtz

Dec 28, 2016 / 1h 19m

Beginner • 1h 19m

Start Course
Description

If you are like the millions of people these days who use a mobile device for more than simply receiving and making phone calls then this course in the Cyber Security Awareness series, Mobile Device Security is the course for you. In the course, we will first look at the way that mobile devices have been used and adapted for everyday use. Then we will explore the most common ways devices are exploited before ending with ways to mitigate the common vulnerabilities.

Table of contents
  1. Introduction
    5m 21s
  2. Uses and Technologies
    33m 8s
  3. Device Exploitation
    18m 33s
  4. Vulnerability Mitigation
    14m 45s
  5. Summary
    7m 16s
14

Cyber Security Awareness: The Protection and Destruction of Portable Data

by Jennifer Kurtz

Dec 29, 2016 / 58m

Beginner • 58m

Start Course
Description

More and more, the world has come to rely on the availability of portable data. If you are someone who is concerned about how to protect your portable data, then this course is for you. First, you'll learn about the current trends in data protection in several major fields like health care, business, the financial sector, and personal use. Then you'll explore the legal constraints around the data other companies hold. Finally, you'll end the course learning about the ways to protect yourself and your data. By the end of this course, you'll have a greater understanding of protection you'll need to keep your portable data secure.

Table of contents
  1. Introduction
    8m 53s
  2. Portable Data Trends
    30m 56s
  3. Portable Data Governance
    8m 15s
  4. Portable Data Protection
    5m 57s
  5. Wrap Up
    4m 27s

Security Breach Prevention

Learn techniques that can be used to help keep your information safe.

15

Cyber Security Awareness: Backing up Your Data

by Bob Bowles

Oct 27, 2016 / 1h

Beginner • 1h

Start Course
Description

Have you ever worried about how to back up your important data so that you or your business is not at risk of losing valuable information? If you have, then this course is for you! First, you will learn about different security plans. Then, you will learn about the information risks associated with data backups. Finally, you'll spend some time exploring the best practice procedures and schedules for backing up your data.

Table of contents
  1. Introduction
    8m 20s
  2. Security Plans
    22m 39s
  3. Information Risks
    17m 46s
  4. Backup Plan
    7m 53s
  5. Conclusion
    3m 25s
16

Cyber Security Awareness: Safer Digital Communications

by Tom Tobiassen

Dec 21, 2016 / 1h 6m

Beginner • 1h 6m

Start Course
Description

As we become more and more dependent on digital communications it is important to be aware of how to send and receive safer digital communications. In this course, Cyber Security Awareness: Safer Digital Communications, you'll learn about how to harden your systems and networks before exploring how to protect your identity from some of the common internet dangers. Finally, the course will look at data scrambling and how to secure your networks.

Table of contents
  1. Introduction
    9m 53s
  2. Protecting Your Identity
    11m 35s
  3. Dangers on the Internet
    11m 45s
  4. Data Scrambling
    16m 33s
  5. Networks
    9m 58s
  6. Wrapping Up
    7m 14s
17

Cyber Security Awareness: Digital Data Protection

by David Kruger

Dec 20, 2016 / 49m

Beginner • 49m

Start Course
Description

Malicious individuals getting access to your data is always something to be concerned about. This course, Cyber Security Awareness: Digital Data Protection, hopes to help alleviate some of those conerns. First, you will learn about the nature of data thefts today. Next, you'll dive into learning about digital data theft. Finally, you'll explore different fixes that are available to make your data usage safer. By the end of this course, you should feel more confident in your ability to protect you're own data.

Table of contents
  1. Introduction
    1m 40s
  2. Security Overview
    4m 53s
  3. Digital Data Theft
    24m 56s
  4. The Fix
    15m 32s
  5. Conclusion
    2m 49s
18

Cyber Security Awareness: Pairing Physical and Digital Security

by Jordan Scott

Nov 7, 2016 / 50m

Beginner • 50m

Start Course
Description

Do you worry about how your physical security vulnerabilities might also weaken your digital security? If so this course is for you! First you'll learn why physical and digital security are so important. Next, you'll discover how to integrate the two securities before finishing up by looking at how to avoid complacency through good policy.

Table of contents
  1. Introduction
    6m 52s
  2. Physical Security
    8m 52s
  3. Digital Security
    7m 49s
  4. Integrating Security
    15m 47s
  5. Complacency and Policy
    10m 31s
  6. Conclusion
    1m 3s
19

Cyber Security Awareness: Identifying Personally Identifiable Information (PII)

by Jennifer Kurtz

Dec 29, 2016 / 1h 24m

Beginner • 1h 24m

Start Course
Description

As society becomes more and more reliant upon the Internet, more and more people are sharing Personally Identifiable Information (PII) across the web. This course, Cyber Security Awareness: Identifying Personally Identifiable Information (PII), will help you learn how to be more secure about the information you share. First, you will look at exactly what makes up PII. Then, you'll explore the legal and regulatory influences that determine what PII is protected. Finally, you'll dive into common PII breach situations and learn about remedies for when your PII has been breached. By the end of this course, you'll have a better understanding in how to protect your PII.

Table of contents
  1. Introduction
    7m 51s
  2. Definitions: What Is PII?
    16m 20s
  3. PII Repositories: Where Is PII Found?
    8m 55s
  4. Legal And Regulatory Influences: Why Is PII Protected?
    29m 15s
  5. PII Breach Case Studies
    12m 27s
  6. PII Protection Practices
    6m 31s
  7. Conclusion
    2m 44s
20

Cyber Security Awareness: The Internet of Things (IoT)

by Tom Tobiassen

Dec 21, 2016 / 54m

Beginner • 54m

Start Course
Description

Have you joined the global movement of people who are connected through the IoT? If so, Cyber Security Awareness: The Internet of Things (IoT), is the course for you. First you'll take a quick look at the current cyber environment before addressing security concerns that come when dealing with kids, robots, health devices, smart cars, and drones. Finally you'll look at some protective measures that can be employed to better protect your interests.

Table of contents
  1. Introduction
    6m 52s
  2. The Internet of Things
    37m 37s
  3. Protective Measures
    10m 25s

What you will learn

  • Security Basics
  • Threats
  • Cloud Security
  • Security while Traveling
  • Mobile Device Security
  • Security Breach Prevention

Pre-requisites

There are no prerequisites required for this path.