Map Of Content

  • Introduction
    • Explanation of the importance of online security
    • Overview of common online threats
  • Passwords
    • IDP - identity providers are used to store user identity information.
    • Best practices for creating strong passwords
    • Tips for storing and managing passwords securely
    • How to use password managers effectively
  • Authentication
    • JWT - JSON Web Tokens are widely used as a secure way of keeping user session and giving them permissions.
    • Personal Access Tokens are used to protect user’s credentials and provide a fine grained permissions capabilities to administrators.
  • Phishing
    • Definition and explanation of phishing scams
    • How to identify phishing emails and websites
    • Tips for avoiding falling victim to phishing scams
  • Malware and Viruses
    • Overview of different types of malware and viruses
    • How to protect devices from malware and viruses
    • Steps to take if a device becomes infected with malware or a virus
  • Public WiFi Networks
    • Risks associated with public Wi-Fi networks
    • Best practices for using public WiFi safely
    • Alternatives to public WiFi
  • Two-Factor Authentication
    • Explanation of two-factor authentication (2FA)
    • Benefits and drawbacks of 2FA
    • How to set up 2FA for various accounts
  • Social Engineering Attacks
    • Definition and explanation of social engineering attacks
    • Examples of social engineering attacks
    • Tips for avoiding falling victim to social engineering attacks
  • Access
  • Attacks
  • Logs
  • Cryptography