Optimizing Your Images for SEO
Companies place a lot of emphasis on editorial content, especially when it comes to search engine optimization (SEO). But words are only half the equation.
To capture attention and garner a reader’s trust, you also need images. And, if you’re not optimizing those images for the web, you’re missing out on a prime competitive advantage. In this course, you’ll learn what image optimization is and why it’s worth the effort. Then, you’ll get six must-know tips for taking your image optimization to the next level.
To capture attention and garner a reader’s trust, you also need images. And, if you’re not optimizing those images for the web, you’re missing out on a prime competitive advantage. In this course, you’ll learn what image optimization is and why it’s worth the effort. Then, you’ll get six must-know tips for taking your image optimization to the next level.
Search Engine Optimization
For the uninitiated, searching for things online might seem like magic. You type a few words in the search bar, click a button, and voila!—the answers to your questions are right at your fingertips. But why do certain webpages appear at the top of a results page? The answer is search engine optimization.
To start, search engine optimization (SEO) isn’t magic. It takes careful strategy. In this course, you’ll learn everything you need to know to get your business and content in front of as many eyes as possible by improving your search rankings and visibility. You’ll start with the basics, like keyword research and selection. Then, you’ll move on to more in-depth topics, such as technical optimization practices and how to optimize your content.
To start, search engine optimization (SEO) isn’t magic. It takes careful strategy. In this course, you’ll learn everything you need to know to get your business and content in front of as many eyes as possible by improving your search rankings and visibility. You’ll start with the basics, like keyword research and selection. Then, you’ll move on to more in-depth topics, such as technical optimization practices and how to optimize your content.
How to Protect Yourself Against Phishing Attacks
Reports of online scams and cyberattacks are on the rise, but most people don’t heed them until it’s too late. So, what steps can you take right away to avoid becoming another cautionary tale? One critical security measure is protecting yourself against phishing—when an attacker pretends to be a trusted contact or organization to gain access to personal information.
In this course, you’ll learn exactly what you’re dealing with in a phishing attack, as well as how to spot one. Most importantly, you’ll pick up immediately applicable tips to prevent theft and stop attackers in their tracks.
In this course, you’ll learn exactly what you’re dealing with in a phishing attack, as well as how to spot one. Most importantly, you’ll pick up immediately applicable tips to prevent theft and stop attackers in their tracks.
What Is Social Engineering?
Social engineering is the art of manipulation to steal information. Unlike cybercrimes that involve cracking complex algorithms, it relies on predictable human behavior to get victims to reveal information voluntarily.
This course provides an overview of how social engineers exploit human psychology to access sensitive information, as well as tips for spotting attacks. By becoming aware of these dangers, you’re less likely to fall victim to various forms of manipulation.
This course provides an overview of how social engineers exploit human psychology to access sensitive information, as well as tips for spotting attacks. By becoming aware of these dangers, you’re less likely to fall victim to various forms of manipulation.
Online Security Fundamentals
How do you keep your home safe? At the minimum, most people lock the doors when they leave. Others install motion-sensitive lights or security cameras. Some invest in alarm systems to protect against threats.
But safeguards aren't just for physical spaces. We store highly sensitive data online. Exposure of that data has a far-reaching impact, with consequences more devastating than losing valuables to a thief.
In this short course, you’ll learn strategies to protect yourself online and get tips to block incoming threats. Finally, you’ll review how to act fast to minimize damage if a security breach occurs.
But safeguards aren't just for physical spaces. We store highly sensitive data online. Exposure of that data has a far-reaching impact, with consequences more devastating than losing valuables to a thief.
In this short course, you’ll learn strategies to protect yourself online and get tips to block incoming threats. Finally, you’ll review how to act fast to minimize damage if a security breach occurs.
How to Protect Your Data
Modern-day theft scarcely resembles heists and burglaries of the past—it has evolved into the digital sphere, requiring us to learn new security practices alongside the old ones.
In this course, learn what constitutes confidential data, why it’s important to keep it safe, and essential security best practices that include both cyberspace and physical facilities.
In this course, learn what constitutes confidential data, why it’s important to keep it safe, and essential security best practices that include both cyberspace and physical facilities.