Online security
Online security
From the invention of computer viruses in the 1970's to today, digital attacks have evolved widely. Digital vulnerability affects individuals, but especially businesses, who see their data, privacy, and brand image being compromised. Learn how to protect yourself from digital attacks.
Specific goals | Temary
OBJECTIVES
- Understand the main threats
- Learn best practices for internet use
- Learn how to implement a data protection policy
SYLLABUS
- Security in the digital world
- What security risks do we face in the digital world?
- Protecting our company means protecting our clients
- Basic internet rules and best practices
- Define an external and internal data protection policy
- Define your data protection policy
- Protection of information, personal data, and digital identity
- The importance of backups
- How to encrypt important data?
- Phishing or when our identity is stolen
- How to create a strong password
- Describe five steps to protect your company's information
- Protection of work devices
- Device analysis and cybersecurity plan
- Antivirus and anti-malware
- Internet banking
- Mobile security for smartphones
- Make a list of all work-related tech devices
- Protection within the internet community
- Wi-Fi and security
- What is a VPN?
- Router protection
- Maintaining security for our CMS (WordPress, etc.)
- Protect sensitive data in e-commerce
- Security and social networks
- Define action protocols
- Are my website, e-commerce, and social media profiles secure?
- Other
- Sharing and storing large volumes of data
- Other security breaches
- Reporting malpractice in the digital world
- Create a response plan for a cyberattack
- Test yourself!
Editions
General information
Learn at your own pace
Online training is self-training, quarterly and you can register at any time.
Enjoy learning from wherever you want, at your own pace and without schedules.
Access
The activities are available at the Virtual Campus of Barcelona Activa
Certificate
To obtain the certificate of completion, the final questionnaire of the course must be completed. Once passed, you can download it in the Personal Area
Personal Data Protection Law
There is a new version of Personal Information Protection law.
Please, accept it before continuing the registration.