IT Security Awareness for Employees and Individuals - Insert: The 'better' (more secure) Operating system?

This is only an abridged excerpt from the course
IT Security Awareness for Employees and Individuals

Previous Next
Previous Next

Chapters

Number Title Length
Start
1 Introduction & Motivation (Full preview availabe) 5 min
2 What actually is "Security"? - Trying to understand In-/Security 5 min
3 Internet Basics: The Internet...and the Cloud 12 min
4 Basic Attacking Scheme 4 min
5 Users as the weak point: Recognizing Attack Schemes & Phishing (Part 1) 14 min
6 Users as the weak point: Recognizing Attack Schemes & Phishing (Part 2) 7 min
7 Users as the weak point: Recognizing Attack Schemes & Phishing (Part 3) 24 min
8 Example: The ideal (Banking-)Trojan 3 min
9 Technical Security: Hacking 8 min
10 E-Mail Security (Full preview availabe) 10 min
11 Insert: Online Shopping 6 min
12 Insert: The 'better' (more secure) Operating system? 2 min
13 Insert: 'Hacking' outside of PCs and mobile Devices 2 min
14 Insert: Quishing – Phishing using QR Codes 3 min
15 Insert: Disposing, Passing on, Selling Devices 2 min
16 Authentication & Passwords 8 min
17 Backup - Do we need that? 2 min
18 The Golden Security Rules 7 min
Course Assessment


© 2026 HissenITAcademy

Legal notice | Privacy statement