Time
55 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:01
this is end user email. Security Course. My name is Milton Tredici. Any we have ridged. And so we're going just to do a recap off all the things that you have been able to learn in this case
00:14
course.
00:15
So the first thing is that I mentioned these buys and user email security extremely important. So, um, I talked about that Fishing is still one number one method off attacking companies through and users
00:35
and that this is
00:37
very, very successful way because people still don't act responsibly regarding using email.
00:46
So you have seen that
00:49
they can embed the malicious code inside the body of a female. They can put it inside theater catchment, often email, or they can put an email in fishing a za Lincoln phishing email. And then if you click, it takes you to the malicious website, which will then effect your PC.
01:10
You have seen, um, who needs to take care of female security. So basically, who are the people within the company that have to be involved? And you have seen that this is I t department, active security people, HR people, and of course, all of the end users that have to be trained, but after training
01:30
they have to be
01:32
able to act responsibly. And they have to continue acting responsibly and not to do things that will, obviously corporate compromise the corporate security in terms of I t.
01:45
And of course, at the end I spoke about how the
01:49
and a whole thing about in user email, security and the company or corporation should be organized. What are the minimum things that have to be done in order for
02:00
the whole system to give solid level of protection again, I will emphasize that there is no
02:08
100% protection.
02:10
But in today's world, if you are,
02:15
if you have good security, maybe the people who unless they're targeting you and your company directly, they will just go somewhere. Word securities Not so good. So if you're better protected in the others, this is high level off assurance that you won't be
02:35
that your security won't be breached and they're your company will not suffer
02:40
because of debt.
02:43
So that is all about two discourse, and I encourage you to take a quiz at the end.
02:51
Uh, which is in your resource is tab where you should we should be able to check what you have learned so far.
02:58
Thank you and goodbye

End User Email Security

This course will give you the basic ideas on the importance of end user email security, how an email is used to breach security, who is responsible for maintaining email security to the adequate level and the things you need to do to reach that goal.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor