Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Leaders Community: Cybersecurity, Data Integrity & AI Reputation Management
Welcome & Housekeeping
Hello ;-) (1:29)
Freebie: Cyber Hygiene Habits Checklist
Different Households, different Companies, different Setups (1:01)
Cyber with Carolin on YouTube
Send your Questions! (0:54)
Next Community Call: 02.09.2025
Exercise: Who can help you in a Worst Case Scenario? (1:34)
AI starts with Reputation Management
Google yourself! Check your Accounts! (1:24)
Passwords, Pass keys and 2 Factor Authentication (1:48)
Chat with AI! (1:04)
Account Verification (4:48)
Reporting Fake Accounts (1:15)
Create trusted Communication Channels (1:43)
Legal Frameworks you can rely on (3:08)
Basics
How do Hackers look like? (3:08)
What is Personally identifiable information (PII)? (1:45)
Sensitive & Confidential Information (1:20)
Data Leak Traps in daily Life & Business (2:45)
Social Engineering & Fishing/ Phishing (2:42)
Everything can be hacked!
Current Threat Situation (from Cybersecurity Project Guide) (3:52)
Corporate Accounts (4:32)
Social & Content Channels (4:23)
Doxing (2:16)
War Story: Lego Website Hack (5:00)
Smart Devices (6:31)
-> Goodie: Awareness Poster for your [Home] Office
[APPLY for your virtual 1:1 with Carolin!]
Secret Link
What does AI mean for your personal Data Integrity?
What is AI? (3:36)
Large Language Models (2:28)
Large Action Models (2:01)
AI Risks (3:32)
AI Legal, Regulatory & Management Perspective (4:15)
AI Hacks (3:34)
How to use AI without AI using you (5:12)
-> Goodie: AI Workbook
-> Links: AI Solutions for Testing (0:13)
Account & Device Management
Cleaning up! (2:01)
Proficient Use (1:40)
Login Credentials & Connections (0:46)
Shared Accounts (1:53)
Backups (2:16)
Understanding Quantum Computing
Quantum Basics (1:52)
Quantum vs. Encryption (2:08)
Quantum + AI (1:28)
Safe & secure Workplace
Segmentation (1:56)
Clean Desk (0:55)
Locked Screen (0:58)
Document Management (2:48)
Physical Security (1:08)
Follow the Rules! (1:32)
IT Support & Incident Response
Gut Feeling vs. Overthinking (1:39)
Contact with IT Support (1:40)
Technical & Operational Measures (1:14)
Follow the Incident Response Plan! (2:47)
Don't build Workarounds! (0:32)
[Still watching? Want a Cyber Job?]
Get my Career Starters & Shifters Course for FREE! (Ends 30.09.2025)
PLUS Security Tips for Travels
Data Processing Regulation Area (2:23)
Chargers (1:08)
When NOT to work (3:11)
[CyberTrust Europe/ SOC2/ ISO27001 Booster Pack currently in Production!]
Cybersecurity Training for Certification
Teach online with
-> Goodie: AI Workbook
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock