Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security Guidelines based on ISO 27001 standards
About me and Course overview
About me and Course overview (4:28)
Course Topics & Agenda
Course Topics & Agenda (2:06)
Recent Global Security Hacks and Incidents
Extent of Damage for a Hack (2:01)
Supply Chain Attack (2:38)
Scams and Frauds Exploiting Current Affairs (3:28)
Phone Call Frauds (2:13)
Insider Threats (2:16)
Bitcoin Mining Hacks (1:47)
Compilation of Many Breaches (COMB) (2:29)
Dark Web Brief (2:13)
Email Account Hack Check
Check If your email is Hacked / Pawned (3:08)
Oh no !! Pawned - What happens next? (3:00)
Sample Phishing Emails & How Hacking Unfolds (4:45)
What is ISO/IEC 27001 ?
What is ISO/IEC 27001 ? (4:32)
Stay Safe over the Web
Safe Web Browsing Guidelines (8:38)
Safe Email Usage Guidelines (2:22)
Password Management
Password Management Guidelines (5:19)
Have a Clean Chit
Clear Desk and Clear Screen Guidelines (4:43)
Physical Access and Security
Physical Access Guidelines (2:25)
Visitor Management Guidelines (2:24)
Data Protection & Privacy
CIA - Confidentiality - Integrity - Accountability Triad (3:46)
Company & Personal Data Protection Guidelines (9:44)
Asset Management
Asset Management Guidelines (4:56)
Course Wrap Up
Thank You (0:40)
Oh no !! Pawned - What happens next?
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock