Security and Information Privacy
Here is a clear arrangement of the information regarding PII, PCI, and SPI
Reading: Intellectual Property and Types of Confidential Information
Password Management Techniques: A Summary
Security Threats: Access Control, Authorization, and Authentication
The video on "Hardening Devices"
“Security Threats: Validation and Device Usage”
"Safe Browsing Practices: Application Ecosystem Security"
"Safe Browsing Practices: Public Browsing Risks"
"Safe Browsing Practices: Plug-ins, Extensions, and Toolbars":