Video description
This comprehensive video course has been expertly designed to equip individuals of all levels of IT or cyber security experience with a deep understanding of how to detect and prevent cyber-attacks. You will start with visual examples of targeted phishing emails and learn how to recognize major red flags to detect these emails in the future. You will then gain insights into how businesses and corporations are hacked through malicious macros, BEC fraud scams, ransomware attacks, and other methods. The course will also cover social engineering attacks, using mobile phones to trick individuals into revealing sensitive information. You will become familiar with a range of social engineering attacks that prey on individuals using sneaky methods.
In addition to these key areas, you will gain a deeper understanding of security features and differences between iPhones and Androids, including how to avoid downloading malicious apps. The course will also cover general security practices for Mac computers, as well as general tips for protecting yourself when using computers, smartphones, and the Internet.
You will then move on to effective solutions for password management, two-factor authentication, and why encryption is essential for privacy and security. By the end of the course, you will be able to recognize and defend against various cyber-attacks, feel confident in securely managing emails, files, mobile phones, computers, and browsing the Internet, and apply best practices for maintaining personal and company security.
What you will learn
- Effective management of passwords and cybersecurity software
- How to spot and prevent social engineering attacks
- Techniques for secure browsing and maintaining privacy online
- Secure usage of various devices and management of passwords
- Proven cyber security software for maintaining privacy and security
- Learn about Passkeys which is a safer and easier alternative to passwords
Audience
No prior experience or knowledge of cyber security is required to enroll in this course. However, a strong desire to protect yourself, your family, and your business from cyber threats is highly encouraged.
About the Author
Reza Zaheri: Reza Zaheri is a cybersecurity professional with over 15 years of leadership and hands-on experience working in cybersecurity with Fortune 100 companies. After having lived and breathed cybersecurity for a very long time and having spent the first few years of his career conducting numerous security assessments and managing a security engineering team, he went on to fight cybercriminals on the cyber frontlines and has been doing so for the past 10 years, directing digital forensics and incident response teams for Fortune 100 companies.
The author was also responsible for incident detection, investigation, and digital forensics for all cybersecurity incidents across the United States, as well as providing digital forensics assistance to Latin American regional offices.
Table of contents
- Chapter 1 : Course Introduction
- Chapter 2 : How Hard Is it to Get Hacked?
- Chapter 3 : Targeted Email Phishing and Social Engineering
- Chapter 4 : Macro Malware
- Chapter 5 : Business Email Compromise
- Chapter 6 : Smishing
- Chapter 7 : Vishing
- Chapter 8 : Ransomware
- Chapter 9 : Red Flags
- Chapter 10 : Search Engine Optimization
- Chapter 11 : Apple
- Chapter 12 : Smartphones and Mobile Apps
- Chapter 13 : Password Management
- Chapter 14 : Two-Factor Authentication
- Chapter 15 : Passkeys
- Chapter 16 : Browser Security
- Chapter 17 : Internet Data Privacy
- Chapter 18 : Identity Theft
- Chapter 19 : Encryption
- Chapter 20 : Internet of Things
- Chapter 21 : What Else Can You Do to Protect Yourself?
Product information
- Title: The Beginners 2024 Cyber Security Awareness Training Course
- Author(s):
- Release date: February 2021
- Publisher(s): Packt Publishing
- ISBN: 9781800560765
You might also like
video
The Absolute Beginners Guide to Cyber Security 2023 - Part 1
Cyber security applies technologies, processes, and controls to protect systems, networks, programs, devices, and data from …
video
The Complete Cybersecurity Bootcamp, 2nd Edition
26 Hours of Video Instruction 26 Hours of Detailed, Curated Video Training to Take You from …
video
The Complete Ethical Hacking Course
A comprehensive course designed to cover from basic to the most advanced ethical hacking techniques using …
audiobook
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated …