The Beginners 2022 Cyber Security Awareness Training Course
Video description
Learn about the several ways to prevent yourself from various kinds of hacks on the Internet.
About This Video
Learn how to securely configure your browser to block malicious scripts, cookies, trackers, and so on, as well as maintain good privacy/anonymity on the Internet
You will confidently manage your emails, business files, computers, mobile devices, and internet browsing
You will know the human emotions that …
The Beginners 2022 Cyber Security Awareness Training Course
Video description
Learn about the several ways to prevent yourself from various kinds of hacks on the Internet.
About This Video
Learn how to securely configure your browser to block malicious scripts, cookies, trackers, and so on, as well as maintain good privacy/anonymity on the Internet
You will confidently manage your emails, business files, computers, mobile devices, and internet browsing
You will know the human emotions that hackers like to trigger, to trick you into giving them access to your money, personal accounts, systems, and company network
In Detail
You will start by seeing numerous visual examples of targeted phishing emails and be taught in detail how to recognize the major red flags so that you can readily detect these emails in the future.
Next, we will cover some common ways that businesses and corporations are hacked and defrauded, via things such as malicious macros, BEC fraud scams, ransomware attacks, and more.
We will also cover social engineering attacks that use your mobile phone to trick you into paying money or giving your secrets away. You will also be presented with many different social engineering attacks on the Internet, so you can see how easily people can be preyed upon using their sneaky methods.
You will understand why Apple devices can be secure most of the time but can sometimes be just as insecure as other computers, as well as some general things you can do to protect yourself whilst using a Mac computer. You will become well versed in the general differences in security between iPhones and Androids, some of their main security features, how to avoid downloading malicious apps, and much more.
Then we will spend some time covering the key issues, as well as effective solutions, around password management and 2-Factor Authentication.
You will then be taught what encryption is, why it is so particularly important to enforce security and privacy.
Finally, we will review for you again all the great cyber security solutions presented in the training, plus even more cool tips 'n' tricks on how to protect yourself when using computers, smartphones, and the Internet.
Audience
You do not need any prior knowledge or experience of Cyber Security to take this course. A keen interest and excitement in protecting yourself, your family, and your business from the bad guys
Chapter 3 : Targeted Email Phishing and Social Engineering
Targeted Email Phishing Part I
Targeted Email Phishing Part II
Targeted Email Phishing Part III
Targeted Email Phishing Part IV
Chapter 4 : Macro Malware
Macro Malware
Chapter 5 : Business Email Compromise
Business Email Compromise
Chapter 6 : Instant Messaging
Messaging
Chapter 7 : Smishing
Smishing
Chapter 8 : Vishing
Vishing
Chapter 9 : Ransomware
Ransomware
Chapter 10 : Cryptomining
Cryptomining
Chapter 11 : Red Flags
Social Engineering Red Flags
Chapter 12 : Search Engine Optimization
Search Engine Optimization
Chapter 13 : Banking Trojan
Banking Trojan
Chapter 14 : Fake Antivirus
Fake Antivirus
Chapter 15 : Apple
Apple Part I
Apple Part II
Chapter 16 : Smartphones and Mobile Apps
Smartphones and Mobile Apps Part I
Smartphones and Mobile Apps Part II
Smartphones and Mobile Apps Part III
Smartphones and Mobile Apps Part IV
Chapter 17 : Password Management
Password Management
Chapter 18 : 2 – Factor Authentication
2-Factor Authentication Part I
2-Factor Authentication Part II
Chapter 19 : Browser Security
Browser Security Part I
Browser Security Part II
Browser Security Part III
Browser Security Part IV
Chapter 20 : Internet Data Privacy
Internet Data Privacy
Chapter 21 : Social Media
Social Media
Chapter 22 : Disinformation
Disinformation
Chapter 23 : Identity Theft
Identity Theft
Chapter 24 : GDPR
GDPR
Chapter 25 : Encryption
Encryption/Travel
Chapter 26 : Internet of Things
IoT / Internet of Things
Chapter 27 : What Else Can You Do to Protect Yourself
What Else Can You Do to Protect Yourself Part I
What Else Can You Do to Protect Yourself Part II
Start your Free Trial Self paced Go to the Course We have partnered with providers to bring you collection of courses, When you buy through links on our site, we may earn an affiliate commission from provider.
This site uses cookies. By continuing to use this website, you agree to their use.I Accept