Video description
While the Internet has revolutionized commerce, its conveniences and uses come at the price of new perils. Without an online defense, any company and its customers can become victims of fraud, identity theft, data theft and property damage. Creating and implementing an effective online security plan is vital in keeping a business safe, but how can the non-technical business manager participate in such planning without the language and understanding required to do so? In this course, Emmanuel Henri explores the basics of cybersecurity from a layman's perspective. He discusses what cybersecurity is and why it's important; he details the conversations managers must have with their teams to set the proper security initiatives and hire the proper staff; he explores the cybersecurity resources managers can easily tap into; and finishes by demonstrating the ways cybersecurity measures are applied in real life.
- Learn the basic principles of cybersecurity from a non-technical perspective
- Understand the most common attacks and what to do when your business is attacked
- Discover the preventative security measures you can take to protect your business
- Learn about the skill sets your company needs to build and maintain security
- Master the ability to confidently discuss cybersecurity plans with team members
Emmanuel Henri weaves web wonders at Québec City based Manny Designs. A full-stack developer with 20 years of experience in programming and web design, Manny makes his living helping business professionals use the right types of technologies to build their companies. His toolbox includes JIRA/Atlassian tools, agile methods, Meteor, React, Node, JavaScript, Swift, HTML, CSS, MongoDB, and MySQL. He holds a BS in Computer Science from Athabasca University.
Table of Contents
Introduction
Welcome to the Course
Security Basics
Basics of a Network and Terminology
Basics of Security
Five Common Attacks
Security Resources Available
Security in Practice
Conversational Security in Practice
Build Your Security Team
What Practices to Put in Place
Proper Procedures When Under Attack
Conclusion
Wrap Up and Thank You