Course Summary
Our interactive Safe Browsing module shows learners how hackers can launch attacks from unsafe websites and outlines best practices for safe browsing. In addition to that the best practices for safe browsing regarding pop-ups, links, hostnames, and Internet connections.
Who Should Attend?
Individuals in the every industry such as healthcare workers, managers, educators, manufacturing industry, government, military and executives
Course Objectives
- Describe the risks of accessing the Internet insecurely.
- Describe how the Internet works.
- Take the necessary steps to secure your home network from unwanted intrusions.
- Configure desktops and laptops so that they are secure on the Internet.
- Secure access to online applications, including email.
- Identify scam and phishing emails.
- Take the necessary steps to secure your data.
- Maintain the privacy of key data on the Internet.
Course Modules
- Need to Know: Safe Web Browsing
- Safe Web Browsing
- Safe Web Browsing Brief
- WORKed: Teaser
- WORKed Episode 3: Robot Lawnmower
- Am I Hacked?
- Spoofed Email Address
- Public Networks and Computers
- Sensitive Data Exposure
- EAL Browser Event
- Shopping Online Security
- Computer Security with Paige the Panda
- Security Awareness for Middle School
- Security Awareness for High School
- Cybersecurity Careers
- Safe Web Browsing for Managers
- Safe Web Browsing for Executives
- Safe Web Browsing for Healthcare Professionals and Providers
- Safe Web Browsing for Healthcare Managers
- Safe Web Browsing for Healthcare Executives
- Safe Web Browsing for Financial Institutions
- Safe Web Browsing for Educators
- CPNI for Consumers
- CPNI for Providers
- COPPA
- OWASP Top Ten Overview
- OWASP A1 – Injection
- OWASP A2 – Broken Authentication
- OWASP A3 – Sensitive Data Exposure
- OWASP A4 – XML External Entities (XXE)
- OWASP A5- Broken Access Control
- OWASP A7 – Cross-Site Scripting (XSS)
- OWASP A8 – Insecure Deserialization
- Top 25 #1 – SQL Injection
- Cloud Services
- Under protected APIs
- Suspicious Hosts
- Broken Access Control
- Cross-Site Request Forgery (CSRF)
- Injection
- Cross-Site Scripting (XSS)
- Broken Authentication and Session Management
- Insecure Deserialization
- XML External Entities (XXE)
- Buffer Overflow
- Acceptable Use Policy
- Improper Error Handling
- Personal Information (Video)
- Secure Data Storage (Video)
- Data Classification (Video)
- Share Responsibly
- Safe Use of Social Media (Video)
- Suspicious Hosts Assessment (Google) W/ Hints
- Safe Harbor (Safe Web Browsing)
- Secure Connection (Data In Transit)
- Score! (Encryption)
- Save (Firewall)
Benefits
- Avoid unsafe websites
- Disable pop-up windows
- Determine if a website is safe before using it
- Secure a browser by applying generally accepted security settings
- Employ other best practices
Certification
We’ve made it simple to access your interactive assessments directly in your online learning journey, by embedding them as part of the module.