(Last Updated: 11/2020)
https://www.udemy.com/course/security-awareness-for-everyone/
Learn to protect yourself and others from trouble brought on by the digital age and enhanced by a global pandemic
What you'll learn Learn to protect yourself and others at work and home from trouble brought on by the digital age and enhanced by a global pandemic. Requirements None whatsoever! Description Why This Matters Looking closely at the digital forensics of many breaches, the acquired evidence often points to a similar root cause: People are being deceived into doing things they shouldn’t be doing. Year after year, millions of people simply can’t resist the temptation of clicking on those interesting phishing emails, not to mention a wide range of other cyber no-nos. It is clear hackers are hacking people and not technology. Compounding this problem is the tendency people have to leave personal information on social media, which hackers can use against them. The more a hacker knows about a potential victim, the more they can target their attack with a convincing message. Even further compounding this problem is the increased threats resulting from the global pandemic reality we are living in. Cybercrime is the business of fraud and fraud is the business of emotional manipulation and at a time where we are all feeling incredibly emotional, and many of us are working from home, which typically tends to be less secure than a corporate office, the criminals are working overtime. Law Enforcement and This Program Cybercrime, not unlike traditional crime, can certainly be a costly, unwanted nightmare for organizations and individuals alike. For years now, various law enforcement agencies have been helping educate people on crime prevention by using something called The Crime Triangle. The Crime Triangle is essentially an equation that identifies three factors involved in a criminal offense. Authorities say that with all of the elements in the crime equation or triangle connected, it’s easier for criminals to commit crime. The factors of the triangle are: the offender committing the crime; the victim of the crime; and the opportunity or environment for the crime to be committed. Offender + Victim + Opportunity = Crime. Authorities use this crime equation to illustrate how you can prevent crime by avoiding vulnerable environments and not giving a criminal the opportunity to make you a victim. Bestselling author and cybersecurity awareness educator Danny Pehar has adapted The Crime Triangle to create the Cybercrime Equation, an incredibly powerful learning methodology: Target + Attack + Vulnerability = Impact What the Course Will Cover Target + Attack + Vulnerability = Impact Backed by the Cybercrime Equation, this course will go into detail about the specifics of a cyber criminal’s target. At the root of it, cyber criminals are targeting sensitive information. This course teaches people how to recognize sensitive information and how to protect it, the foundation to any effective cybersecurity awareness training. From there, you will learn how to recognize cyber attacks, diving into the type of attacks that are most popular with cyber criminals. You’ll learn not just about the different types of malware, but specifically how hackers use social engineering to play on the emotions of their victims. You will learn how to spot these attacks and how to avoid them. Once you understand what hackers are targeting and how they are attacking, you’ll learn where you are most vulnerable to a hacker, like passwords, email, computers, your workspace, public Wi-Fi and so on. And of-course you will learn how to protect yourself in these vulnerable avenues. Lastly, this course will educate you on what to do if you believe you’ve been impacted by a security incident and how to report it. The specifics that will be covered: - THE MOST IMPORTANT LESSON IN CYBERSECURITY - MAKING SECURITY AWARENESS GO VIRAL - BUT CAN'T MY TECHNOLOGY PROTECT ME? - WHY YOU'RE A TARGET - SENSITIVE INFORMATION AND HOW TO PROTECT IT - A CYBERCRIMINALS BEST WEAPON - HOW THE BAD GUYS ARE USING COVID-19 TO SCAM US - HOW TO PREVENT ZOOM BOMBING - THE SMART HOME CYBER HYGIENE CHECKLIST - MOBILE SECURITY - SOCIAL MEDIA SECURITY - PUBLIC WI-FI SECURITY - WEB BROWSING SECURITY - PASSWORD SECURITY - WORKSPACE SECURITY - COMPUTER SECURITY - INCIDENT REPORTING - FAKE NEWS - CYBERBULLYING - WHAT TO DO NEXT Teaching What You Learn To Others Not only will you learn how to easily protect yourself against the threats and vulnerabilities brought on by the digital age but you’ll be given numerous tools, tips and resources that will enable you to motivate, teach and empower any audience to do the same. Who this course is for: This is applicable to all audiences, from employees to students and everyone in-between.
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.