Cyber SecurityBy Rick Barretto / September 3, 2020 Course Information Categories: Cyber Security Course Instructor Rick Barretto Author Password Security Password Security for Financial Instiutions Password Security for Executives Password Security Brief Need to Know – Password Security Introduction to Account Takeover Attacks (ATO) Data Security Phishing WORKed Episode 2 – Evite Vishing SpearPhishing SMiShing Reporting Phishing Emails Recognizing Phishing Emails Phishing Phishing vs Spam Phishing In Brief Phishing for Executives Need to Know – Phishing Need to Know – Email Security Need to Know – Downloading Suspicious Files Marine Lowlifes – Whaling Shark Marine Lowlifes – Spearphish Marine Lowlifes – Common Phish Marine Lowlifes – Clone Phish Malicious Attachments Business Email Compromise (BEC) Breach Notification Mobile Security WORKed Episode 11- X-Men Securing Mobile Devices Need to Know – Mobile Security Mobile Wi-Fi Security Mobile Security Mobile Security For Executives How Secure Is Public WiFi – (Public WiFi) Safe Web Browsing WORKed Episode 3 – Robot Lawnmower Underprotected APIs Top 25 #1 – SQL Injection Suspicious Hosts Spoofed Email Address Shopping Online Securely Sensitive Data Exposure Safe Web Browsing Safe Web Browsing Brief Public Networks and Computers OWASP Top Ten Overview Need to Know – Safe Web Browsing Insecure Deserialization Injection Domain Name Spoofing Cross-Site Scripting (XSS) Cloud Services Buffer Overflow Broken Authentication and Session Management Broken Access Control Am I Hacked Working Remotely Working Remotely Working Remotely for Financial Institutions WORKed Episode 10 – Travel Stories Securing Home Networks and Devices Need to Know – Working Remotely Malware WORKed Episode 6 – Demons Security Misconfiguration Security Awareness for IT Professionals Need to Know – Malware Managing Software Assets Malware Malware for Executives Malware Brief Intelligent Personal Assistant Intellectual Property Insufficient Logging and Monitoring Insufficient Attack Protection Removable Media WORKed Episode 1 – Bathroom Removable Media Removable Media for Financial Institutions Removable Media Brief Need to Know – Removable Media Encryption CJIS Policy – Media Protection Physical Security WORKed Episode 9 – Tailgating WORKed Episode 8 – Eagle Eye WORKed Episode 7 – Laptop Down Protecting CUI Physical Security Physical Security Brief PCI DSS – Physical Security One Person’s Trash… (Dumpster Diving) Need to Know – Physical Security Need to Know – Challenging Identity IoT Security Introduction to NIST 800-171 Incident Response How Much is Too Much – (Password Security) FAR Code of Conduct Creating a Cyber Secure Home Complying with NIST 800-171 CJIS Policy – Physical Security CJIS Policy – Dissemination and Destruction A Few Extra Seconds (Lock Screens) Social Engineering WORKed Episode 5 – Mallomars Who Can You Trust – (Social Engineering) Using Components With Known Vulnerabilities Social Media Social Engineering Social Engineering Brief Sarbanes-Oxley Act (SOX) Red Flags Rule Privacy and PII Privacy and PII Brief Privacy and EU GDPR PCI DSS PCI DSS Brief New Hire Need to Known – Social Engineering Need to Know – Security by Design Need to Know – Privacy by Design Need to Know – IoT Need to Know – Introduction Introduction Introduction to CCPA Insider Threats Identity Theft Help Desk Handling SSA Provided Information Gramm-Leach-Bliley Act (GLBA) GDPR for Data Processors FCPA CJIS Security Policy Avoiding Cybersecurity Risks for Executives Anti-Money Laundering Advanced Persistent Threat (APT)