Genre: eLearning | Language: English + .VTT | Duration: 2 hours | Size: 757 MB
What you'll learn
Able to be Cyber Safe, Protect and Guide their Family, Friends and Organizations
Be able to understand the tricks of trade of cyber criminals
Save cost
Prevent Data Breach and Information Leak
Apt idea to identify Fishy and non fishy email
Identify traps laid down by malicious cyber criminals
Requirements
Access to PC or Mobile Phone or Tab and PDF Reader
Description
Learn cyber security basic hygiene to advance defense, simple tips to powerful security, Bitcoin scams, protection against sensitive data theft, tips to counter social engineering threats, IoT, tips to protect your hard earned money, stay safe from cyber con artist, Not to be phished, exploited, defrauded, Tips, Counter ATP, Email Scams, Vishing Calls, Whatsapp Scams, Zero-day Threat, Cloud Security, Social engineering attacks, Ransomware risk, Online Banking Frauds, Dating Scams, PDoS, data security, Tor and lot more.
Course Highlights
Introduction
Don't fall in love with pdf attachments: PDF attacks - the dedication of the criminals
Image can hack your Whatsapp account - risk, threats and countermeasures
Hookups on public Wi-Fi could be deadly
Don't leave your cookies for others
You don't share underwear... Then why do you share your OTP (one time password)?
IoT: what is it? How vulnerable is it and how to protect your IoT devices?
What's on cloud? How it can be breached?
HTTPS security be compromised
Ftp File Transfer Security Risk. What is FTP? Threat, Risk, Vulnerability & Countermeasures
Online Job, Friendship Club Fraud and Dating Scams
Bot is not so hot! - Threats, protection and defense for you and your family, friends and organization.
Antivirus & free Antivirus: The Fake Zone of Security.
Endpoint protection - End Zero Day
Know how Firewall catch fire (Security holes)
Stinking passwords
Call frauds and card cloning - Don’t loose your hard earned money
Trash can crash your bottom line
Nude, Sex-texting
Web site vulnerability
Plain text attacks
Pop up Malicious ads
Whatsapp spam
Overlooked social media scams
Bitcoin Scams
Malicious apps
Secure your secured browser
Don't track me
2FA - double protection for you
Don't allow skimmers to skim away hard earned money from ATM Anti-zero-day
What's NFC? What's RFID? How hackable is it? What are the protection measures?
One click threats
Block ATP attacks: tips to deal and counter it
Email scams (credit limit lowered, jobs offers, private venture scams) & protection tips
Ransomware: Is the biggest threat to your data. Tips to protect your critical or sensitive data and information
P2P threats: All are invited.. But think twice before you join.
Risk Management Policy: How it's an countermeasure for cyber threats and security risks?
Safety tips for Tor users: Checklist for privacy revealed Link attacks
Human (Mind) re-engineering: Is the Number 1 threat. Protect yourself and create awareness culture.
Assess your vulnerability and patch it quickly
Super fast exploration targets - office, adobe reader, flash players, Internet Explorer RAT... Smell Awful! : Must know threats and tips to avoid RAT (Remote Access Trojan)
Google drive attacks and threats
Admin Rights is not the Birth Rights for everyone: Control and Strategies for administrative rights
Why should you keep your employees happy?
Targeted attacks via Mobile malware
Sound Transmit virus
Safe Internet banking Tips
Your Identity is mine… Modus operandi of identity theft and preventative tips
Browser Bot: What is it? How it hijack your data, privacy and launch hacking attacks.
Hacker can compromise your system with QR Code
What is Metadata? How hackers steal data? How privacy is at stake?
Dating apps and security risk
Don’t get pawned by Vishing Calls and Smishing Frauds
DDS (Default Deadly Settings)
Creepy apps on Google Play Store and tips to protect yourself
PDoS (Permanent Denial of Service
Cyber Bullying
Who is the target audience?
Beginners and Pro who wants to be cyber security awareness
Anyone who is serious about cyber security
Bust Cyber Criminals, Fraudster and Hackers Attempts to defraud you
Safeguard their Hard Earned Money
Who doesn't want to get pwn by cyber criminals
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.