this is end user email. Security Course. My name is Milton Tredici. Any we have ridged. And so we're going just to do a recap off all the things that you have been able to learn in this case
So the first thing is that I mentioned these buys and user email security extremely important. So, um, I talked about that Fishing is still one number one method off attacking companies through and users
and that this is
very, very successful way because people still don't act responsibly regarding using email.
So you have seen that
they can embed the malicious code inside the body of a female. They can put it inside theater catchment, often email, or they can put an email in fishing a za Lincoln phishing email. And then if you click, it takes you to the malicious website, which will then effect your PC.
You have seen, um, who needs to take care of female security. So basically, who are the people within the company that have to be involved? And you have seen that this is I t department, active security people, HR people, and of course, all of the end users that have to be trained, but after training
they have to be
able to act responsibly. And they have to continue acting responsibly and not to do things that will, obviously corporate compromise the corporate security in terms of I t.
And of course, at the end I spoke about how the
and a whole thing about in user email, security and the company or corporation should be organized. What are the minimum things that have to be done in order for
the whole system to give solid level of protection again, I will emphasize that there is no
But in today's world, if you are,
if you have good security, maybe the people who unless they're targeting you and your company directly, they will just go somewhere. Word securities Not so good. So if you're better protected in the others, this is high level off assurance that you won't be
that your security won't be breached and they're your company will not suffer
because of debt.
So that is all about two discourse, and I encourage you to take a quiz at the end.
Uh, which is in your resource is tab where you should we should be able to check what you have learned so far.
Thank you and goodbye
End User Cyber Fundamentals
This End User Cyber Fundamentals course covers Internet risks such as typosquatting, website spoofing, drive-by ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
Identify Tools and Practices for Security Configurations
In this IT Pro Challenge virtual lab, learners solidify their general knowledge about cybersecurity, including ...
Learn On Demand