Course Highlights
  • You will be trained, on all the ways hackers can socially engineer you, through email, text, calls, browsing, files, mobile phones, connected home devices etc
  • You will know the human emotions that hackers like to trigger, to trick you into giving them access to your money, personal accounts, systems & company network
  • You will stop successful social engineering attacks, by spotting red flags in phishing emails, text messages and phone calls
  • Learn how to securely configure your browser to block malicious scripts, cookies, trackers etc. as well as maintain good privacy/anonymity on the Internet
  • You will be well versed on how to securely use Windows, Apple Macs, iPhones, Androids etc
  • You will be visually guided on how to effectively and efficiently manage all passwords, 2FA & the new Passkeys
  • You will be shown proven and effective cyber security software to keep your systems private and secure
  • You will confidently manage your emails, business files, computers, mobile devices and Internet browsing
  • You will feel safe, secure, and private on the Internet
Curriculum

2 Topics
Greetings from your instructor Reza
IMPORTANT - Please Read

1 Topic
Practical Training Guide & Resource Files

1 Topic
How Hard Is It To Get Hacked?

6 Topics
Targeted Email Phishing Part I
Targeted Email Phishing Part II
Targeted Email Phishing Part III
Targeted Email Phishing Part IV
Phishing Resources
Targeted Email Phishing & Social Engineering Quiz

1 Topic
Please Leave a Review and Feedback

2 Topics
Macro Malware
Macro Malware Resources

2 Topics
Business Email Compromise
Business Email Compromise Quiz

3 Topics
Smishing
Smishing Resources
Smishing Quiz

3 Topics
Vishing
Vishing Resources
Vishing Quiz

3 Topics
Ransomware
Ransomware Resources
Ransomware Quiz

2 Topics
Social Engineering Red Flags
Social Engineering Red Flags Quiz

1 Topic
Search Engine Optimization

3 Topics
Apple Part I
Apple Part II
Apple Resources

6 Topics
Smartphones and Mobile Apps Part I
Smartphones and Mobile Apps Part II
Smartphones and Mobile Apps Part III
Smartphones and Mobile Apps Part IV
Smartphone & Mobile App Resources
Quiz about Smartphones and Mobile Apps

3 Topics
Password Management
Password Management Resources
Quiz about Password Management

4 Topics
2-Factor Authentication Part I
2-Factor Authentication Part II
2-Factor Authentication Resources
Quiz about 2-Factor Authentication

3 Topics
Passkeys Part I
Passkeys Part II
Quiz about Passkeys

6 Topics
Browser Security Part I
Browser Security Part II
Browser Security Part III
Browser Security Part IV
Browser Security Resources
Quiz about Browser Security

2 Topics
Internet Data Privacy
Internet Data Privacy Resources

3 Topics
Identity Theft
Identity Theft Resources
Quiz about Identity Theft

3 Topics
Encryption/Travel
Encryption Resources
Quiz about Encryption/Travel

3 Topics
IoT / Internet of Things
IoT Resources
Quiz about IoT Internet of Things

4 Topics
What Else Can You Do To Protect Yourself Part I
What Else Can You Do To Protect Yourself Part II
Extra Resources
Quiz about What Else Can You Do To Protect Yourself

  Write a Review

The Beginners 2024 Cyber Security Awareness Training Course

Go to Paid Course