From the course: Security Tips
Unlock this course with a free trial
Join today to access over 22,600 courses taught by industry experts.
How to tell if a link is legitimate
From the course: Security Tips
How to tell if a link is legitimate
- [Instructor] One of the tricky things to learn when you're exploring digital security is how to tell if a link is quote unquote, real. You might need to investigate links that show up on the web, in a chat message, or in email. Experienced security people can usually tell very quickly if a link is legitimate or pretending to be something else. But the ability to do this is somewhat hard to describe, so in this episode, I want to take a few minutes to help you understand what security professionals look for when they decide what to click. In a previous episode, we explored the different parts of a URL. So now that we have a general sense of what a link or URL is made of, let's take a look at the ways we can use that knowledge to figure out if a URL is legitimate, or whether it's trying to trick us. The first step in this process is to find a link to examine. In many programs, if you hover the mouse over a hyperlink, you'll see the URL that link will take you to if you click it. That…
Contents
-
-
-
Use a password manager3m 3s
-
(Locked)
Choose good passwords3m 18s
-
(Locked)
Use two-factor authentication5m 22s
-
(Locked)
Security questions3m 39s
-
(Locked)
Smart home devices3m 24s
-
(Locked)
Secure your home Wi-Fi5m 40s
-
(Locked)
Laptop security5m 36s
-
(Locked)
Browse the web safely3m 52s
-
(Locked)
Block ads and trackers4m 57s
-
Recognize phishing emails5m 6s
-
(Locked)
Recognize phone scams6m 42s
-
(Locked)
Donate a computer safely3m 45s
-
(Locked)
Back up data securely2m 37s
-
(Locked)
Encrypt sensitive files9m 4s
-
(Locked)
Use a VPN service5m 5s
-
Browse the web with Tor4m 45s
-
(Locked)
Social media security options6m 20s
-
(Locked)
Mobile device security5m 14s
-
(Locked)
Stay secure on shared computers6m 9s
-
(Locked)
Scan for viruses and malware5m 45s
-
(Locked)
Stay secure when traveling6m 56s
-
(Locked)
Keep work and home information separate5m 21s
-
(Locked)
Use the cloud securely2m 8s
-
(Locked)
Cache and cookies5m 54s
-
(Locked)
Spear phishing and catfishing4m 55s
-
(Locked)
Understanding and preventing ransomware2m 29s
-
(Locked)
Keeping an eye on your own security4m 8s
-
(Locked)
What's a URL?6m 28s
-
(Locked)
Turning on and using full-disk encryption2m 13s
-
(Locked)
What to do if your information is compromised5m 34s
-
(Locked)
How to tell if a link is legitimate4m 3s
-
(Locked)
Understanding biometric security3m 26s
-
(Locked)
What is public key encryption?3m 3s
-
(Locked)
Build a portable apps USB6m 41s
-
(Locked)
Handling information securely3m 54s
-
(Locked)
Understanding common attacks5m 17s
-
(Locked)
Paying securely online5m 45s
-
(Locked)
Wireless security for mobile phones4m 3s
-
(Locked)
Chatting securely4m
-
(Locked)
Configuring 2FA with Authy3m 45s
-
(Locked)
Configuring 2FA with 1Password3m 28s
-
(Locked)
Securing your email account2m 38s
-
(Locked)
Encrypted email2m 29s
-
(Locked)
Steganography2m 24s
-
(Locked)
Exploring app permissions2m 36s
-
(Locked)
Using kiosk mode in Windows 104m 5s
-
(Locked)
Using a separate network for your IoT devices4m 26s
-
(Locked)
Adding a guest account to your computer4m 52s
-
(Locked)
Safely donating mobile devices3m 38s
-
(Locked)
Learn more about security with LinkedIn Learning2m 22s
-