IT Basics and using the internet safely

This course has been removed by Web Infra Academy (EN). View all learning products for Web Infra Academy (EN).

check_box_outline_blank

Cybersecurity at Work (2020)

Logo IT-Learning
|META_INFO|

Cybersecurity isn't solely within your IT department's purview. If you own a smartphone, work on a computer, or use the internet, then you'…

check_box_outline_blank

Cybersecurity at Work

Logo IT-Learning
|META_INFO|

Cybersecurity doesn’t fall solely within your IT department's purview. If you own a smartphone, work on a computer, or use the internet, …

check_box_outline_blank

Internet Safety for Students

Logo IT-Learning
|META_INFO|

Along with being a core part of building digital citizenship, internet safely is an essential skill for students. This course explores how …

check_box_outline_blank

Metaverse and NFTs for Marketing

Logo IT-Learning
|META_INFO|

Have you tried to imagine where the internet is headed? While it may be dizzying to think about, the metaverse is poised to play a fundamen…

check_box_outline_blank

Computer Privacy and Security Essential Training (2006)

Logo Lynda
|META_INFO|

How to effectively resolve most computer vulnerabilities, including five weekly to-dos to protect your computer.The Internet is an unmatche…

check_box_outline_blank

Understanding Trade Secrets: A Deeper Dive

Logo IT-Learning
|META_INFO|

What are trade secrets? How do companies protect them? How is trade secret law enforced? In this course, intellectual property lawyer Dana …

check_box_outline_blank

Web Security: OAuth and OpenID Connect

Logo IT-Learning
|META_INFO|

While many technical professionals claim to know and understand OAuth, reality often suggests otherwise. Implementing the proper grant type…

check_box_outline_blank

Web Security: OAuth and OpenID Connect (2018)

Logo IT-Learning
|META_INFO|

While many technical professionals claim to know and understand OAuth, reality often suggests otherwise. Implementing the proper grant type…

check_box_outline_blank

Web Security: OAuth and OpenID Connect (2019)

Logo IT-Learning
|META_INFO|

While many technical professionals claim to know and understand OAuth, reality often suggests otherwise. Implementing the proper grant type…

check_box_outline_blank

How to Conduct a Phishing Email Investigation

Logo IT-Learning
|META_INFO|

According to the email security platform GreatHorn, phishing is the number one threat vector of all online breaches. But what exactly is a …