The Beginners 2022 Cyber Security Awareness Training Course

Video description

Learn about the several ways to prevent yourself from various kinds of hacks on the Internet.

About This Video

  • Learn how to securely configure your browser to block malicious scripts, cookies, trackers, and so on, as well as maintain good privacy/anonymity on the Internet
  • You will confidently manage your emails, business files, computers, mobile devices, and internet browsing
  • You will know the human emotions that hackers like to trigger, to trick you into giving them access to your money, personal accounts, systems, and company network

In Detail

You will start by seeing numerous visual examples of targeted phishing emails and be taught in detail how to recognize the major red flags so that you can readily detect these emails in the future.

Next, we will cover some common ways that businesses and corporations are hacked and defrauded, via things such as malicious macros, BEC fraud scams, ransomware attacks, and more.

We will also cover social engineering attacks that use your mobile phone to trick you into paying money or giving your secrets away. You will also be presented with many different social engineering attacks on the Internet, so you can see how easily people can be preyed upon using their sneaky methods.

You will understand why Apple devices can be secure most of the time but can sometimes be just as insecure as other computers, as well as some general things you can do to protect yourself whilst using a Mac computer. You will become well versed in the general differences in security between iPhones and Androids, some of their main security features, how to avoid downloading malicious apps, and much more.

Then we will spend some time covering the key issues, as well as effective solutions, around password management and 2-Factor Authentication.

You will then be taught what encryption is, why it is so particularly important to enforce security and privacy.

Finally, we will review for you again all the great cyber security solutions presented in the training, plus even more cool tips 'n' tricks on how to protect yourself when using computers, smartphones, and the Internet.


You do not need any prior knowledge or experience of Cyber Security to take this course. A keen interest and excitement in protecting yourself, your family, and your business from the bad guys

Publisher resources

Download Example Code

Table of contents

  1. Chapter 1 : Course Introduction
    1. Greeting from Your Instructor, Reza
  2. Chapter 2 : How Hard Is it to Get Hacked?
    1. How Hard Is it to Get Hacked?
  3. Chapter 3 : Targeted Email Phishing and Social Engineering
    1. Targeted Email Phishing Part I
    2. Targeted Email Phishing Part II
    3. Targeted Email Phishing Part III
    4. Targeted Email Phishing Part IV
  4. Chapter 4 : Macro Malware
    1. Macro Malware
  5. Chapter 5 : Business Email Compromise
    1. Business Email Compromise
  6. Chapter 6 : Instant Messaging
    1. Messaging
  7. Chapter 7 : Smishing
    1. Smishing
  8. Chapter 8 : Vishing
    1. Vishing
  9. Chapter 9 : Ransomware
    1. Ransomware
  10. Chapter 10 : Cryptomining
    1. Cryptomining
  11. Chapter 11 : Red Flags
    1. Social Engineering Red Flags
  12. Chapter 12 : Search Engine Optimization
    1. Search Engine Optimization
  13. Chapter 13 : Banking Trojan
    1. Banking Trojan
  14. Chapter 14 : Fake Antivirus
    1. Fake Antivirus
  15. Chapter 15 : Apple
    1. Apple Part I
    2. Apple Part II
  16. Chapter 16 : Smartphones and Mobile Apps
    1. Smartphones and Mobile Apps Part I
    2. Smartphones and Mobile Apps Part II
    3. Smartphones and Mobile Apps Part III
    4. Smartphones and Mobile Apps Part IV
  17. Chapter 17 : Password Management
    1. Password Management
  18. Chapter 18 : 2 – Factor Authentication
    1. 2-Factor Authentication Part I
    2. 2-Factor Authentication Part II
  19. Chapter 19 : Browser Security
    1. Browser Security Part I
    2. Browser Security Part II
    3. Browser Security Part III
    4. Browser Security Part IV
  20. Chapter 20 : Internet Data Privacy
    1. Internet Data Privacy
  21. Chapter 21 : Social Media
    1. Social Media
  22. Chapter 22 : Disinformation
    1. Disinformation
  23. Chapter 23 : Identity Theft
    1. Identity Theft
  24. Chapter 24 : GDPR
    1. GDPR
  25. Chapter 25 : Encryption
    1. Encryption/Travel
  26. Chapter 26 : Internet of Things
    1. IoT / Internet of Things
  27. Chapter 27 : What Else Can You Do to Protect Yourself
    1. What Else Can You Do to Protect Yourself Part I
    2. What Else Can You Do to Protect Yourself Part II

Product information

  • Title: The Beginners 2022 Cyber Security Awareness Training Course
  • Author(s): Reza Zaheri, Reza Zaheri
  • Release date: July 2020
  • Publisher(s): Packt Publishing
  • ISBN: 9781800560765