Booking options
£128.99
£128.99
On-Demand course
3 hours 14 minutes
All levels
This comprehensive course is tailored to equip beginners with a solid understanding of cyber security awareness, social engineering, network security, and online self-defense. Regardless of your prior experience in IT or cyber security, you will gain confidence in securely managing emails, files, mobile phones, computers, and browsing the Internet.
This comprehensive video course has been expertly designed to equip individuals of all levels of IT or cyber security experience with a deep understanding of how to detect and prevent cyber-attacks. You will start with visual examples of targeted phishing emails and learn how to recognize major red flags to detect these emails in the future. You will then gain insights into how businesses and corporations are hacked through malicious macros, BEC fraud scams, ransomware attacks, and other methods. The course will also cover social engineering attacks, using mobile phones to trick individuals into revealing sensitive information. You will become familiar with a range of social engineering attacks that prey on individuals using sneaky methods. In addition to these key areas, you will gain a deeper understanding of security features and differences between iPhones and Androids, including how to avoid downloading malicious apps. The course will also cover general security practices for Mac computers, as well as general tips for protecting yourself when using computers, smartphones, and the Internet. You will then move on to effective solutions for password management, two-factor authentication, and why encryption is essential for privacy and security. By the end of the course, you will be able to recognize and defend against various cyber-attacks, feel confident in securely managing emails, files, mobile phones, computers, and browsing the Internet, and apply best practices for maintaining personal and company security.
Effective management of passwords and cybersecurity software
How to spot and prevent social engineering attacks
Techniques for secure browsing and maintaining privacy online
Secure usage of various devices and management of passwords
Proven cyber security software for maintaining privacy and security
Learn about Passkeys which is a safer and easier alternative to passwords
No prior experience or knowledge of cyber security is required to enroll in this course. However, a strong desire to protect yourself, your family, and your business from cyber threats is highly encouraged.
This all-inclusive course features an extensive collection of training videos covering critical cyber security subjects. It provides insights into the most pressing cyber security threats facing individuals and businesses today, along with the latest tactics hackers and scammers use to socially engineer individuals for their data, money, and confidential information.
Learn Social engineering tactics in emails, texts, calls, and browsing * Understand the emotional triggers used by hackers for account and network access * Spotting red flags in phishing attempts to thwart social engineering attacks
https://github.com/PacktPublishing/The-Beginners-2024-Cyber-Security-Awareness-Training-Course
Reza Zaheri is a cybersecurity professional with over 15 years of leadership and hands-on experience working in cybersecurity with Fortune 100 companies. After having lived and breathed cybersecurity for a very long time and having spent the first few years of his career conducting numerous security assessments and managing a security engineering team, he went on to fight cybercriminals on the cyber frontlines and has been doing so for the past 10 years, directing digital forensics and incident response teams for Fortune 100 companies. The author was also responsible for incident detection, investigation, and digital forensics for all cybersecurity incidents across the United States, as well as providing digital forensics assistance to Latin American regional offices.
1. Course Introduction
This section introduces you to the course.
1. Greeting from Your Instructor, Reza Here is a brief video introducing cyber security, and why this course is the most effective, entertaining, and memorable cyber security awareness training you will take! You will learn a little about your instructor, and what you should expect to feel, see, and learn during this security awareness training course. |
2. How Hard Is it to Get Hacked?
This section explains the various ways to get hacked.
1. How Hard Is it to Get Hacked? You will learn how hard it has become to hack into systems and company networks these days. |
3. Targeted Email Phishing and Social Engineering
This section explains targeted email phishing and social engineering.
1. Targeted Email Phishing Part I In Part I of this engaging module, you will learn how targeted email phishing is executed against you, as well as recognize some of the major red flags to be able to readily detect these emails in the future. |
2. Targeted Email Phishing Part II In Part II of this engaging module, you will continue to see new examples of targeted phishing emails, and to recognize some of the major red flags in them. |
3. Targeted Email Phishing Part III In Part III of this module, you will continue to see several ways in which hackers and scammers are social engineering us, through emails and webpages. Even more major red flags are exposed so that these now become ingrained in our brains. |
4. Targeted Email Phishing Part IV In Part IV of this entertaining module, you will learn the common patterns in all common social engineering attacks, how these are all very similar, and how they can be caught easily. |
4. Macro Malware
This section explains Macro malware.
1. Macro Malware You will learn all about Macro malware, and why they are so popular, having become a go-to means of infiltrating a computer in a devastating fashion. You will also learn how to easily spot malicious macros, as well as protect yourself against them. |
5. Business Email Compromise
This section explains Business Email Compromise.
1. Business Email Compromise In this interesting module, you will learn about Business Email Compromise attacks, also known as 'CEO Fraud'. You will visually see how they trick us into initiating large wire transfers, what the red flags are, and then you will learn how to stop these dangerous attacks right in their tracks. |
6. Smishing
This section explains Smishing.
1. Smishing In this video module, you will learn about the sneaky art of social engineering using SMS text messaging on your mobile device. You will be shown examples of Smishing, and we will discuss the red flags that can be easily spotted in these attacks. You will also learn what to do when you receive such fraudulent SMS text messages. |
7. Vishing
This section explains Vishing.
1. Vishing In this entertaining module, you will learn how scammers are social engineering us by spoofing caller ID numbers, and calling us on our phones, asking for money, personal information, or access to our computers. You will be played several audio tracks of actual Vishing attacks, so you can hear for yourself what they sound like (chances are, you may have received one lately yourself). Then we will explain some common red flags that can be easily spotted when you receive such calls, as well as how to handle the caller. |
8. Ransomware
This section explains ransomware.
1. Ransomware You will be learning about all of the recent ransomware attacks you may have heard about in the news, and why they are so effective in forcing their victims to hand money over to the hackers. You will see various examples of what they look like and, most importantly, how to prevent being a ransomware victim. |
9. Red Flags
This section explains red flags in phishing emails.
1. Social Engineering Red Flags You will revisit, and discuss again, all the major social engineering red flags that you can spot in targeted phishing emails, texts and phone calls, as well as social engineering attacks in general. You will understand the main emotions that social engineers try to invoke in you, to make you do what they want. You will go over, in detail, how to detect, and respond accordingly, to a phishing attack against you. |
10. Search Engine Optimization
This section explains search engine optimization.
1. Search Engine Optimization You will learn how your trust in popular search engines is being exploited so that hackers can deliver malware to your system, phish you for your credentials, as well as social engineer you into handing over your private information. You will see some examples of these attacks in real life, as well as examples of Google's AdWords service being manipulated to serve you malicious webpages. You will also discover different ways to defeat 'black-hat search engine optimization', as it is commonly known. |
11. Apple
This section explains security around Apple computers.
1. Apple Part I You will learn about the general security around Apple computers. You will also learn why Apple operating systems can be very secure most of the time but can sometimes be just as insecure as other computers. In addition, you will be presented with some of the common cyber-attacks that can affect the Apple platform. |
2. Apple Part II You will be presented with some of the main ways in which Apple protects you from evilness on the Internet, as well as some general things you can do to protect yourself whilst using a Mac computer. |
12. Smartphones and Mobile Apps
This section explains security on smartphones and mobile apps.
1. Smartphones and Mobile Apps Part I In Part I of this module, you will learn the general differences in security between iPhones and Androids, and why Androids can have some serious security issues that need to be addressed. |
2. Smartphones and Mobile Apps Part II In Part II, you will learn how hackers are uploading malicious apps into the Google Play Store, and we will discuss the major red flags to take note of when you are considering downloading an app onto your mobile device. You will also be visually presented with real-world examples of malicious apps that exploit app permissions, as well as malicious third-party app stores. |
3. Smartphones and Mobile Apps Part III In Part III, you will learn some great solutions that Google has put in place to protect you from the bad guys when you are using an Android device. We will also discuss Google Play Protect and how it is designed to help you detect and remove malicious apps from your phone. |
4. Smartphones and Mobile Apps Part IV In Part IV, you will learn about security on Apple iPhones and why they are generally more secure than Android phones. You will also be shown various settings on the phone that Apple has in place to protect you from malicious apps, and some things you can do to lock down your mobile device. |
13. Password Management
This section explains password management.
1. Password Management In this video, you will understand the major (and sometimes annoying) issues around password management. This includes how to keep track of all of your passwords in a secure manner, and why sharing weak passwords across multiple websites is something you need to fix today. You will then be introduced to some solutions on how to create great passwords, using passphrases, and how to store them with you securely on all of your devices. |
14. Two-Factor Authentication
This section explains two-factor authentication.
1. 2-Factor Authentication Part I In this two-part eye-opening video module, you will learn all about wonderful two-factor authentication: an excellent solution for preventing hackers hijacking your account! The term '2FA' will be explained in simple terms, and then you will be visually guided, using step-by-step instructions, on how to set up 2FA for popular websites such as Facebook. You will also understand why 2FA also greatly helps mitigate the risks with using the same weak passwords across websites. |
2. Two-Factor Authentication Part II In part two of this eye-opening video module, you will learn about the various types of 2FA and about the highly respected security keys, which all 85,000 of Google's employees have been using lately and which has stopped 100% account hijacking! You will also be taught how easy it is to set up and how valuable 2FA security keys are to your account security. |
15. Passkeys
This section explains passkeys to keep oneself safe from cyber-attacks.
1. Passkeys Part I You will learn about our passwordless future, with the new Passkeys being offered by the major tech giants. You will see how incredibly easy and secure they are to use. |
2. Passkeys Part II You will continue to learn the amazing virtues of Passkeys and why they are so superior to other forms of 2FA, especially passwords. |
16. Browser Security
This section explains browser security.
1. Browser Security Part I In Part I of this video series, you will be presented with the main security issues when it comes to using the major browsers in the market today. You will learn about invasive and dangerous things such as browser scripts, trackers, cookies, and fake browser updates. |
2. Browser Security Part II In Part II of this video series, you will be trained on the issues surrounding Java and Flash running in your browser, as well as malicious browser extensions that can take over your browser, and even your computer! Next, we will discuss the privacy and security strengths/weaknesses of the major browsers such as Safari, Edge, Chrome, Firefox, and Brave. |
3. Browser Security Part III In Part III of this fact-filled video series, you will again be shown, using visual examples, all the different ways you can securely lock down your browser from the bad guys, as well as invasive marketing companies that want to track your browsing habits! You will be presented with some awesome solutions for blocking trackers, ads, scripts, and malicious code that can secretly run inside your browser. |
4. Browser Security Part IV In Part IV of this module, you will continue to learn some good browser settings that can protect your privacy and security on the Internet. We discuss browser scripts in depth, how they work, why some are very bad for you, and how you can shut these malicious scripts in their tracks using a few very useful browser addons. You will also see how you can browse securely, and privately, on the web using your mobile device. |
17. Internet Data Privacy
This section explains internet data privacy.
1. Internet Data Privacy In this video, you will be presented with the main issues around the industrial-level analysis and trading of our private data by certain browsers, marketing firms, and tech companies. You will come to understand that nothing is really for free on the Internet, and when you are using popular free services on the Internet (such as email and social media), much of your behavior / interests / habits are being analyzed and profiled for future advertising. You will also be presented with some great solutions to keep your internet browsing somewhat private and be able to see for yourself what data is being collected about you when you use these services. |
18. Identity Theft
This section explains identity theft.
1. Identity Theft In this interesting module, you will learn how devastating the Equifax hack was for most of us and how our personal data is most likely already on the Dark Web and in the hands of hackers and fraudsters. You will then be shown how you can protect your credit profile, with some amazing and easy solutions you can implement in minutes, in light of all the large data breaches that have occurred in recent years. |
19. Encryption
This section explains the concept of encryption.
1. Encryption/Travel In this informative module, you will learn-at a basic level-all about encryption, why it is so very important to enforce security and privacy, and then you will be presented with some common encryption solutions you can use both at home and at work. You will also be taught how it can really help you protect sensitive business and private data, especially while traveling. |
20. Internet of Things
This section explains the Internet of Things.
1. IoT / Internet of Things In this easy-to-follow module, you will learn what we mean when we say IoT, and then you will be presented with an in-depth discussion of the major security issues involving these connected devices. You will also visually be guided, step-by-step, through how you can secure your devices to prevent hackers from infiltrating your home network and connected devices. |
21. What Else Can You Do to Protect Yourself?
This section explains further ways to protect yourself from hacks.
1. What Else Can You Do to Protect Yourself Part I In this final two-part module, I will review for you the good cyber security solutions presented in the training. After the recap, you will be taught even more cool tips and tricks on how to protect yourself when using computers, smartphones, and the Internet. |
2. What Else Can You Do to Protect Yourself Part II In part II of this recap module, you will continue to be shown even more cool tips and tricks on how to protect yourself when using computers, smartphones, and the Internet. And we will wrap up the training with information on how you can receive better cyber security awareness, how you can contact me if you ever have questions, and so on. |