Data–Digital Building Blocks
Importance of Data in the Information Age
Threats to Data
Data Security
Potential Losses Due to Security Attacks
Implementing Security
Guidelines To Secure Windows
Guidelines To Secure Mac OS X
What is Malware?
Types Of Malware
Symptoms Of Malware Infection
Antivirus
Configuring and Using Antivirus Software
How To Test If an Antivirus is Working
Understanding Web Browser Concepts
Understanding IM Security
Understanding Child Online Safety
Understanding Social Networking Concepts
Understanding Various Social Networking Security Threats
Understanding Facebook Security Settings
Understanding Twitter Security Settings
Understanding Email Security Concepts
Understanding Various Email Security Threats
Understanding Various Email Security Procedures
Understanding Mobile Device Security Concepts
Understanding Threats To a Mobile Device
Understanding Various Mobile Security Procedures
Understanding How to Secure iPhone and iPad Devices
Understanding How to Secure Android Devices
Understanding How to Secure Windows Device
Mobile Security Tools
The Concept of Cloud
How Cloud Works
Threats To Cloud Security
Safeguarding Against Cloud Security Threats
Cloud Privacy Issues
Addressing Cloud Privacy Issues
Choosing a Cloud Service Provider
Understanding Various Networking Concepts
Understanding Setting Up a Wireless Network in Windows
Understanding Setting Up a Wireless Network in Mac
Understanding Threats to Wireless Network Security and Countermeasures
Measures to Secure Network Connections
Data Backup Concepts
Types of Data Backups
Windows Backup and Restore Procedures
MAC OS X Backup and Restore Procedures
Understanding Secure Data Destruction