Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.
In this course, you will identify many of the common risks involved in using conventional computing technology, as well as ways to use it safely, to protect yourself from those risks. You will:
Lesson 1: Identifying Security Compliance Measures
Lesson 2: Recognizing and Addressing Social Engineering Attack
Lesson 3: Securing Devices
Lesson 4: Using the Internet Securely