Skip to content
Skip to main content

About this free course

Share this free course

Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

2.1 Understanding security notices

Windows

Watch this video if your computer runs Windows operating systems. If you have a Mac, you will find a video for the Mac operating system below. You do not need to watch both Windows and Mac videos.

Download this video clip.Video player: ou_futurelearn_cyber_security_vid_1002.mp4
Copy this transcript to the clipboard
Print this transcript
Show transcript|Hide transcript
 
Interactive feature not available in single page view (see it in standard view).

Large software companies publish security notices when they discover a threat. It can be hard to read these notices to find the important bits. Therefore it’s helpful to know where to find them and what to look out for.

Visit the Microsoft Security Response Center [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)]  to see the latest security threats.

Mac OS

Watch this video if you have a Mac and run a Mac operating system. (If your computer runs a Windows operating system and you have watched the video in the previous section, you do not need to watch this video.)

Download this video clip.Video player: ou_futurelearn_cyber_security_vid_1052.mp4
Copy this transcript to the clipboard
Print this transcript
Show transcript|Hide transcript
 
Interactive feature not available in single page view (see it in standard view).

Large software companies publish security notices when they discover a threat. It can be hard to read these notices to find the important bits. Therefore it’s helpful to know where to find them and what to look out for.

Visit the Apple Product Security website to see the latest security notifications.