| Module 1 | Introduction | |
|---|---|---|
| Unit 1 | 01 - Introduction | |
| Module 2 | Data Backup and Disaster Recovery | |
| Unit 1 | 01 - Data Backup and Disaster Recovery - 01 | |
| Unit 2 | 02 - Data Backup and Disaster Recovery - 02 | |
| Unit 3 | 03 - Data Backup and Disaster Recovery - 03 | |
| Unit 4 | 04 - Data Backup and Disaster Recovery - 04 | |
| Unit 5 | 05 - Data Backup and Disaster Recovery - 05 | |
| Unit 6 | 06 - Data Backup and Disaster Recovery - 06 | |
| Unit 7 | 07 - Data Backup and Disaster Recovery - 07 | |
| Unit 8 | 08 - Encryption, Recovery and Phisical Security - 01 | |
| Unit 9 | 09 - Encryption, Recovery and Phisical Security - 02 | |
| Unit 10 | 10 - Encryption, Recovery and Phisical Security - 03 | |
| Unit 11 | 11 - Encryption, Recovery and Phisical Security - 04 | |
| Unit 12 | 12 - Encryption, Recovery and Phisical Security - 05 | |
| Module 3 | Data Encryption | |
| Unit 1 | 01 - Data Encryption - 01 | |
| Unit 2 | 02 - Data Encryption - 02 | |
| Unit 3 | 03 - Data Encryption - 03 | |
| Unit 4 | 04 - Data Encryption - 04 | |
| Unit 5 | 05 - Data Encryption - 05 | |
| Module 4 | Foundations of Security | |
| Unit 1 | 01 - Foundations of Security - 01 | |
| Unit 2 | 02 - Foundations of Security - 02 | |
| Unit 3 | 03 - Foundations of Security - 03 | |
| Unit 4 | 04 - Foundations of Security - 04 | |
| Unit 5 | 05 - Foundations of Security - 05 | |
| Unit 6 | 06 - Foundations of Security - 06 | |
| Unit 7 | 07 - Foundations of Security - 07 | |
| Unit 8 | 08 - Foundations of Security - 08 | |
| Unit 9 | 09 - Foundations of Security - 09 | |
| Unit 10 | 10 - Foundations of Security - 10 | |
| Unit 11 | 11 - Foundations of Security - 11 | |
| Module 5 | Information Security and Legal Compliance | |
| Unit 1 | 01 - Information Security and Legal Compliance - 01 | |
| Unit 2 | 02 - Information Security and Legal Compliance - 02 | |
| Unit 3 | 03 - Information Security and Legal Compliance - 03 | |
| Module 6 | Internet Security | |
| Unit 1 | 01 - Internet Security - 01 | |
| Unit 2 | 02 - Internet Security - 02 | |
| Unit 3 | 03 - Internet Security - 03 | |
| Unit 4 | 04 - Internet Security - 04 | |
| Unit 5 | 05 - Internet Security - 05 | |
| Unit 6 | 06 - Internet Security - 06 | |
| Unit 7 | 07 - Internet Security - 07 | |
| Unit 8 | 08 - Internet Security - 08 | |
| Unit 9 | 09 - Internet Security - 09 | |
| Unit 10 | 10 - Internet Security - 10 | |
| Unit 11 | 11 - Internet Security - 11 | |
| Unit 12 | 12 - Internet Security - 12 | |
| Module 7 | Protecting Systems Using Antiviruses | |
| Unit 1 | 01 - Protecting Systems Using Antiviruses - 01 | |
| Unit 2 | 02 - Protecting Systems Using Antiviruses - 02 | |
| Unit 3 | 03 - Protecting Systems Using Antiviruses - 03 | |
| Unit 4 | 04 - Protecting Systems Using Antiviruses - 04 | |
| Module 8 | Securing eMail Communications | |
| Unit 1 | 01 - Securing eMail Communications - 01 | |
| Unit 2 | 02 - Securing eMail Communications - 02 | |
| Unit 3 | 03 - Securing eMail Communications - 03 | |
| Unit 4 | 04 - Securing eMail Communications - 04 | |
| Unit 5 | 05 - Securing eMail Communications - 05 | |
| Unit 6 | 06 - Securing eMail Communications - 06 | |
| Module 9 | Securing Mobile Devices | |
| Unit 1 | 01 - Securing Mobile Devices - 01 | |
| Unit 2 | 02 - Securing Mobile Devices - 02 | |
| Unit 3 | 03 - Securing Mobile Devices - 03 | |
| Unit 4 | 04 - Securing Mobile Devices - 04 | |
| Module 10 | Securing Network Connections | |
| Unit 1 | 01 - Securing Network Connections - 01 | |
| Unit 2 | 02 - Securing Network Connections - 02 | |
| Unit 3 | 03 - Securing Network Connections - 03 | |
| Unit 4 | 04 - Securing Network Connections - 04 | |
| Unit 5 | 05 - Securing Network Connections - 05 | |
| Module 11 | Securing Online Transactions | |
| Unit 1 | 01 - Securing Online Transactions - 01 | |
| Unit 2 | 02 - Securing Online Transactions - 02 | |
| Unit 3 | 03 - Securing Online Transactions - 03 | |
| Unit 4 | 04 - Securing Online Transactions - 04 | |
| Module 12 | Securing Operating Systems | |
| Unit 1 | 01 - Securing Operating Systems - 01 | |
| Unit 2 | 02 - Securing Operating Systems - 02 | |
| Unit 3 | 03 - Securing Operating Systems - 03 | |
| Unit 4 | 04 - Securing Operating Systems - 04 | |
| Unit 5 | 05 - Securing Operating Systems - 05 | |
| Unit 6 | 06 - Securing Operating Systems - 06 | |
| Module 13 | Security on Social Networking Sites | |
| Unit 1 | 01 - Security on Social Networking Sites - 01 | |
| Unit 2 | 02 - Security on Social Networking Sites - 02 | |
| Unit 3 | 03 - Security on Social Networking Sites - 03 | |
| Module 14 | Social Engineering and Identity Theft | |
| Unit 1 | 01 - Social Engineering and Identity Theft - 01 | |
| Unit 2 | 02 - Social Engineering and Identity Theft - 02 | |
| Unit 3 | 03 - Social Engineering and Identity Theft - 03 | |
| Unit 4 | 04 - Social Engineering and Identity Theft - 04 | |
| Module 15 | Course Summary | |
| Unit 1 | 01 - Course Summary |
Powered By WP Courseware
