The Beginners 2024 Cyber Security Awareness Training Course

Video description

This comprehensive video course has been expertly designed to equip individuals of all levels of IT or cyber security experience with a deep understanding of how to detect and prevent cyber-attacks. You will start with visual examples of targeted phishing emails and learn how to recognize major red flags to detect these emails in the future. You will then gain insights into how businesses and corporations are hacked through malicious macros, BEC fraud scams, ransomware attacks, and other methods. The course will also cover social engineering attacks, using mobile phones to trick individuals into revealing sensitive information. You will become familiar with a range of social engineering attacks that prey on individuals using sneaky methods.

In addition to these key areas, you will gain a deeper understanding of security features and differences between iPhones and Androids, including how to avoid downloading malicious apps. The course will also cover general security practices for Mac computers, as well as general tips for protecting yourself when using computers, smartphones, and the Internet.

You will then move on to effective solutions for password management, two-factor authentication, and why encryption is essential for privacy and security. By the end of the course, you will be able to recognize and defend against various cyber-attacks, feel confident in securely managing emails, files, mobile phones, computers, and browsing the Internet, and apply best practices for maintaining personal and company security.

What you will learn

  • Effective management of passwords and cybersecurity software
  • How to spot and prevent social engineering attacks
  • Techniques for secure browsing and maintaining privacy online
  • Secure usage of various devices and management of passwords
  • Proven cyber security software for maintaining privacy and security
  • Learn about Passkeys which is a safer and easier alternative to passwords

Audience

No prior experience or knowledge of cyber security is required to enroll in this course. However, a strong desire to protect yourself, your family, and your business from cyber threats is highly encouraged.

About the Author

Reza Zaheri: Reza Zaheri is a cybersecurity professional with over 15 years of leadership and hands-on experience working in cybersecurity with Fortune 100 companies. After having lived and breathed cybersecurity for a very long time and having spent the first few years of his career conducting numerous security assessments and managing a security engineering team, he went on to fight cybercriminals on the cyber frontlines and has been doing so for the past 10 years, directing digital forensics and incident response teams for Fortune 100 companies.

The author was also responsible for incident detection, investigation, and digital forensics for all cybersecurity incidents across the United States, as well as providing digital forensics assistance to Latin American regional offices.

Table of contents

  1. Chapter 1 : Course Introduction
    1. Greeting from Your Instructor, Reza
  2. Chapter 2 : How Hard Is it to Get Hacked?
    1. How Hard Is it to Get Hacked?
  3. Chapter 3 : Targeted Email Phishing and Social Engineering
    1. Targeted Email Phishing Part I
    2. Targeted Email Phishing Part II
    3. Targeted Email Phishing Part III
    4. Targeted Email Phishing Part IV
  4. Chapter 4 : Macro Malware
    1. Macro Malware
  5. Chapter 5 : Business Email Compromise
    1. Business Email Compromise
  6. Chapter 6 : Smishing
    1. Smishing
  7. Chapter 7 : Vishing
    1. Vishing
  8. Chapter 8 : Ransomware
    1. Ransomware
  9. Chapter 9 : Red Flags
    1. Social Engineering Red Flags
  10. Chapter 10 : Search Engine Optimization
    1. Search Engine Optimization
  11. Chapter 11 : Apple
    1. Apple Part I
    2. Apple Part II
  12. Chapter 12 : Smartphones and Mobile Apps
    1. Smartphones and Mobile Apps Part I
    2. Smartphones and Mobile Apps Part II
    3. Smartphones and Mobile Apps Part III
    4. Smartphones and Mobile Apps Part IV
  13. Chapter 13 : Password Management
    1. Password Management
  14. Chapter 14 : Two-Factor Authentication
    1. 2-Factor Authentication Part I
    2. Two-Factor Authentication Part II
  15. Chapter 15 : Passkeys
    1. Passkeys Part I
    2. Passkeys Part II
  16. Chapter 16 : Browser Security
    1. Browser Security Part I
    2. Browser Security Part II
    3. Browser Security Part III
    4. Browser Security Part IV
  17. Chapter 17 : Internet Data Privacy
    1. Internet Data Privacy
  18. Chapter 18 : Identity Theft
    1. Identity Theft
  19. Chapter 19 : Encryption
    1. Encryption/Travel
  20. Chapter 20 : Internet of Things
    1. IoT / Internet of Things
  21. Chapter 21 : What Else Can You Do to Protect Yourself?
    1. What Else Can You Do to Protect Yourself Part I
    2. What Else Can You Do to Protect Yourself Part II

Product information

  • Title: The Beginners 2024 Cyber Security Awareness Training Course
  • Author(s): Reza Zaheri, Reza Zaheri
  • Release date: February 2021
  • Publisher(s): Packt Publishing
  • ISBN: 9781800560765