11-14-2024, 01:07 PM
The Beginners 2024 Cyber Security Awareness Training Course
Last updated 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 2.47 GB | Duration: 3h 15m
Learn to Spot Targeted Email Phishing, Social Engineering Attacks, Hacker Tactics, Browsers/Mobile Threats and Much More
[b]What you'll learn[/b]
You will be trained, on all the ways hackers can socially engineer you, through email, text, calls, browsing, files, mobile phones, connected home devices etc
You will know the human emotions that hackers like to trigger, to trick you into giving them access to your money, personal accounts, systems & company network
You will stop successful social engineering attacks, by spotting red flags in phishing emails, text messages and phone calls
Learn how to securely configure your browser to block malicious scripts, cookies, trackers etc. as well as maintain good privacy/anonymity on the Internet
You will be well versed on how to securely use Windows, Apple Macs, iPhones, Androids etc
You will be visually guided on how to effectively and efficiently manage all passwords, 2FA & the new Passkeys
You will be shown proven and effective cyber security software to keep your systems private and secure
You will confidently manage your emails, business files, computers, mobile devices and Internet browsing
You will feel safe, secure, and private on the Internet
[b]Requirements[/b]
Be ready to have a good time learning!
You do not need ANY PRIOR KNOWLEDGE or experience of Cyber Security to take this course!
A keen interest and excitement in protecting yourself, your family and your business from the bad guys
[b]Description[/b]
Are you worried about hackers social engineering you for your sensitive files, emails, or access to your computer or network? Are you scared your company passwords will be stolen?Are you anxious about being a victim of identity theft? Do you want to learn cyber security awareness and online self defense to protect yourself?Do you want to be taught in an engaging, memorable and effective way, how to securely manage all your sensitive emails, files, passwords, mobile phones, and browsing? Do you want to know how, where, and most importantly why you would be targeted?Do you want to feel safe, secure, and private on the Internet?Then this is the PERFECT course for you!And you are going to love it.I designed this '1:M Cyber Security' beginners course for company employees, and home users, looking for engaging, memorable and effective cyber security awareness training! This course is designed to teach you the BASICS of cyber security awareness, social engineering, network security and online self defense, even if you have no IT / Cyber Security experience or knowledge. What makes my course different, is that I speak passionately from the heart, using visuals, humor and storytelling throughout the training, to make it engaging, memorable and effective! The training is literally 98% real world images and examples! You will love watching the modules, because the curriculum is comprehensive enough to give you all the information you need to stay safe, secure and private on the Internet, and presented to you in a simple and entertaining way.And while the content is presented in VERY simple terms, everyone, (even people with IT/Cyber Security skills) could learn from this course, because to be frank, ANYONE can being socially engineered these days (even including experts in the IT industry sometimes).Furthermore, the entire time I was recording in studio, I kept thinking to myself "how can I make this material really fun and interesting??" I really tried to put myself in the mind of my students, so that I could present the information in a way that you would find interesting and engaging.What students are saying about this course:★★★★★ Engaging & interesting!"This is the greatest Security Awareness training I have ever attended. The presenter made me feel like I was in the room with him. He was extremely personable and knowledgeable." - Terrie★★★★★ Great instructing!I think.one of the best instructors I have found on Udemy. Good tone, easy to follow along. The presentations are visually appealing, superb body language and don't complicate things. Reza knows what he is talking about! - Nicholas★★★★★ Fantastic course!"The information presented, is clear, concise. Well thought out. The presenter is very knowledgeable and engaging in his delivery style. First class course." - Shaun★★★★★Very good material for beyond just introductory. There are a lot of quizzes which really are well thought out and challenge the thinking and the understanding. A huge amount of additional resources also accompany the material. - Harold★★★★★ Incredible!"A cyber security course that is IMMEDIATELY useful, and fun to watch!" - Andrew★★★★★ Amazing course!I have learned a lot and specially how to protect myself online. Great speaker with really good and catchy explanations! Recommended 100% - Ana★★★★★"Very excellent course. I will keep it close and watch over and over again" - Olukayode ★★★★★ Very relevant!"I liked that there were screen shots of actual attacks, with the red flags highlighted as its being discussed." - Heather★★★★★"Extremely valuable information security course. Everyone should attend!" - Michal ★★★★★"You do an amazing job of communicating technical content in a non-technical way. A participant could be 8 or 80 and the course material would be understood with your approach" - Richard★★★★★ Highly recommended!"A fantastic speaker and compelling material!" - Pedro★★★★★ "Very informative course""Reza's style is very engaging and we also benefit from his decades long experience in the field" - Kaushik★★★★★ "Brilliant course. Brilliant presenter." - Kevin★★★★★ Sensational!Provides very important tips. I recommend that everyone take this course. - Denis★★★★★ Far more interesting than I expected!"The instructor's knowledge and engaging manner added a level of entertainment. The flow and consistency made this an excellent training." - Jennifer★★★★★ This was a great course!"I learned a lot, was a good pace, excellent presentation by Reza and quizzes helped with enforcing the learning" - Lorraine★★★★★"The simplicity with which it is told is amazing "- Radha★★★★★"Explanations are crystal clear and concise. Information is presented in such a way that it is easy to remember. Instructor has a lot enthusiasm!" - Chris★★★★★ Great content!"A thorough but easy explanation that even someone who isn't tech savvy would understand. Thank you!" - JosephSOME BENEFITS OF TAKING MY COURSE:You will receive really engaging, memorable and effective security awareness training!You won't spend hours looking at boring PowerPoint slides! I intentionally cut out all the technical jargon, so that you are trained in simple plain EnglishMost of what you will learn can be applied both at home, and at workThis course is based on the real world, drawing on my 20 years of experience on the cyber front linesI have successfully trained over 80,000 people in the past, with very positive feedbackYou will receive a 50-page SUPPLEMENTAL TRAINING GUIDE PDF that has ALL the training material, and much more, written as notes for you to downloadYou will feel confident, and empowered to protect your personal, family and company data from the bad guysAnd remember, if for any reason you're not happy with the course (which would make me sad!) you have a 30-day money back guaranteeCONTENTS AND OVERVIEWThis course has 35 brand new '1:M Cyber Security' training videos, covering over 24 cyber security subjects. It's me in front of the camera, speaking passionately from the heart, and talking directly to you about the biggest cyber security threats facing you today.It's packed with the latest tricks hackers and scammers are using to social engineer you for your data, money and secrets.You will start by seeing numerous VISUAL examples of targeted phishing emails, and be taught in detail how to recognize the major red flags, so that you can READILY detect these emails in the future.Next we will cover some common ways that business and corporations are hacked and defrauded, via things such as malicious Macros, BEC Fraud scams, Ransomware attacks and more.We will also cover social engineering attacks that use your mobile phone to trick you into paying money or giving your secrets away. You will also be presented with many different social engineering attacks on the Internet, so you can see how easily people can be preyed upon using their sneaky methods.You will be shown how search engines such as Google are exploited for evil purposes. You will understand why Apple devices can be secure most of the time, but can sometimes be JUST as insecure as other computers, as well as some general things you can do to protect yourself whilst using a Mac computer. You will become well versed in the general differences in security between iPhones and Androids, some of their main security features, how to avoid downloading malicious apps, and much more.Then we will spend some time covering the major issues, as well as effective solutions, around password management, 2-Factor Authentication, as well as the new extremely easy to use, and extremely secure Passkeys!Next, you will be visually presented with the main privacy/security issues as well as solutions, when it comes to using browsers. Moreover, we will do a deep dive into the significance of Internet data privacy, the buying/selling of your private data, and the prevention of identity theft.You will then be taught what encryption is, why it is so very important to enforce security and privacy, and common encryption solutions you can use both at home, and at work. You will learn all about the major security issues involving IoT 'Internet of Things' / home connected devices, and be visually guided on how you can secure your home devices and networks to keep the bad guys at bay.Finally, we will review for you again all the great cyber security solutions presented in the training, plus even more cool tips 'n tricks on how to protect yourself when using computers, smartphones and the Internet. ===I promise, that by the end of this course, you will CONFIDENTLY, SAFELY and SECURELY manage emails, files, mobile phones, computers, and browse the Internet - both for yourself, your family and your company.Enroll now! I can't wait to see you in the course.-Reza
Overview
Section 1: Greetings from your instructor Reza
Lecture 1 Greetings from your instructor Reza
Lecture 2 IMPORTANT - Please Read
Section 2: Practical Training Guide
Lecture 3 Practical Training Guide & Resource Files
Section 3: How Hard is It To Get Hacked?
Lecture 4 How Hard Is It To Get Hacked?
Section 4: Targeted Email Phishing & Social Engineering
Lecture 5 Targeted Email Phishing Part I
Lecture 6 Targeted Email Phishing Part II
Lecture 7 Targeted Email Phishing Part III
Lecture 8 Targeted Email Phishing Part IV
Lecture 9 Phishing Resources
Section 5: Please Leave a Review and Feedback
Lecture 10 Please Leave a Review and Feedback
Section 6: Macro Malware
Lecture 11 Macro Malware
Lecture 12 Macro Malware Resources
Section 7: Business Email Compromise
Lecture 13 Business Email Compromise
Section 8: Smishing
Lecture 14 Smishing
Lecture 15 Smishing Resources
Section 9: Vishing
Lecture 16 Vishing
Lecture 17 Vishing Resources
Section 10: Ransomware
Lecture 18 Ransomware
Lecture 19 Ransomware Resources
Section 11: Red Flags
Lecture 20 Social Engineering Red Flags
Section 12: Search Engine Optimization
Lecture 21 Search Engine Optimization
Section 13: Apple
Lecture 22 Apple Part I
Lecture 23 Apple Part II
Lecture 24 Apple Resources
Section 14: Smartphones and Mobile Apps
Lecture 25 Smartphones and Mobile Apps Part I
Lecture 26 Smartphones and Mobile Apps Part II
Lecture 27 Smartphones and Mobile Apps Part III
Lecture 28 Smartphones and Mobile Apps Part IV
Lecture 29 Smartphone & Mobile App Resources
Section 15: Password Management
Lecture 30 Password Management
Lecture 31 Password Management Resources
Section 16: 2-Factor Authentication
Lecture 32 2-Factor Authentication Part I
Lecture 33 2-Factor Authentication Part II
Lecture 34 2-Factor Authentication Resources
Section 17: Passkeys
Lecture 35 Passkeys Part I
Lecture 36 Passkeys Part II
Section 18: Browser Security
Lecture 37 Browser Security Part I
Lecture 38 Browser Security Part II
Lecture 39 Browser Security Part III
Lecture 40 Browser Security Part IV
Lecture 41 Browser Security Resources
Section 19: Internet Data Privacy
Lecture 42 Internet Data Privacy
Lecture 43 Internet Data Privacy Resources
Section 20: Identity Theft
Lecture 44 Identity Theft
Lecture 45 Identity Theft Resources
Section 21: Encryption
Lecture 46 Encryption/Travel
Lecture 47 Encryption Resources
Section 22: IoT / Internet of Things
Lecture 48 IoT / Internet of Things
Lecture 49 IoT Resources
Section 23: What Else Can You Do To Protect Yourself
Lecture 50 What Else Can You Do To Protect Yourself Part I
Lecture 51 What Else Can You Do To Protect Yourself Part II
Lecture 52 Extra Resources
I created this beginners course for employees in a business or corporation, who wants to be trained on how to protect their sensitive customer data and network from hackers,This course is ideal for employees that need to be trained as part of annual Cyber Security Awareness Training requirements,I also wrote this course for any home computer users who are worried about being socially engineered by hackers for their emails, sensitive files, and passwords,Someone who wants to browse the Internet securely and privately, and not be tracked by marketing companies when on the Internet,It is PERFECT for complete beginners (with little experience or skills in IT/ Cyber Security), but who want to learn basic cyber security awareness in a non-technical way,Someone who doesn't necessarily WORK as a cyber security professional, but wants to be SKILLED in cyber security awareness,However, ANYONE (even people skilled in IT) will benefit from, and enjoy this course!