Companies Home Search Profile

Insider Secrets to Internet Safety MasterClass

Focused View

Terry Cutler

6:05:33

85 View
  • 1. Dangers Of The Internet.mp4
    22:15
  • 2. Are you a Target of a Cybercriminal.mp4
    29:15
  • 3. How to Secure Your Digital Life.mp4
    21:03
  • 1. Introduction.mp4
    03:57
  • 1. Why and how hackers and scammers are picking you Individual.mp4
    06:33
  • 1. Introduction.mp4
    00:40
  • 2. Installing and maintaining antivirus software for PC and Mac.mp4
    08:42
  • 3. M2-2 - Enabling Automatic Updates on Windows.mp4
    04:27
  • 4. M2-3 - Installing and maintaining antivirus software.mp4
    03:09
  • 5. M2-4 - Securing Your PC like a Mac.mp4
    07:45
  • 6. M2-5 - Physically protecting your computer from threats.mp4
    03:28
  • 7. M2-6 - How to create an unbreakable password.mp4
    04:05
  • 8. M2-7 - Updating and Securing Safari browser.mp4
    07:53
  • 1. M3-2 - How to clean up your email account after it was hacked.mp4
    03:24
  • 2. M3-3 - Dangers of Quizes and Status Updates.mp4
    03:19
  • 3. M3-4 - Setting up 2FA for Facebook.mp4
    00:52
  • 4. M3-5 - Setting up 2FA for iCloud.mp4
    02:21
  • 5. M3-6 - Setting up 2FA for PayPal.mp4
    00:32
  • 6. M3-7 - Setting up 2FA for LinkedIn.mp4
    00:55
  • 7. M3-8 - Setting up 2FA for Instagram.mp4
    00:38
  • 8. M3-9 - Fake Profiles and Dating Sites.mp4
    04:30
  • 9. M3-10 - How to Google Yourself.mp4
    05:30
  • 10. M3-11 - Google Chrome Password manager.mp4
    02:53
  • 11. M3-11 - Google Chrome Password manager.mp4
    02:53
  • 12. M3-12 - Microsoft Edge Password Manager.mp4
    02:44
  • 1. M4-1 - Most Popular Internet Scams Video 1.mp4
    02:25
  • 2. M4-2 - Most Popular Internet Scams Video 2.mp4
    05:24
  • 3. M4-3 - Most Popular Internet Scams Video 3.mp4
    02:08
  • 4. M4-4 - Most Popular Internet Scams Video 4.mp4
    01:56
  • 5. M4-5 - Most Popular Internet Scams Video 5.mp4
    05:05
  • 6. M4-6 - Most Popular Internet Scams Video 6.mp4
    00:51
  • 7. M4-7 - Most Popular Internet Scams Video 7.mp4
    00:56
  • 8. M4-8 - Most Popular Internet Scams Video 8.mp4
    00:54
  • 9. M4-9 - Most Popular Internet Scams Video 9.mp4
    00:50
  • 10. M4-10 - Most Popular Internet Scams Video 10.mp4
    01:06
  • 11. M4-11 - Most Popular Internet Scams Video 11.mp4
    01:09
  • 12. M4-12 -Most Popular Internet Scams Video 12.mp4
    01:20
  • 13. M4-13 -Most Popular Internet Scams Video 13.mp4
    01:43
  • 14. M4-14 -Most Popular Internet Scams Video 14.mp4
    00:41
  • 15. M4-15 -Most Popular Internet Scams Video 15.mp4
    01:10
  • 16. M4-16 -Most Popular Internet Scams Video 16.mp4
    00:32
  • 17. M4-17 -Most Popular Internet Scams Video 17.mp4
    00:54
  • 18. M4-18 -Most Popular Internet Scams Video 18.mp4
    00:45
  • 19. M4-19 -Most Popular Internet Scams Video 19.mp4
    04:58
  • 20. M4-20 -Most Popular Internet Scams video 20.mp4
    02:11
  • 21. M4-21 -Most Popular Internet Scams video 21.mp4
    14:39
  • 1. M5-1 - Ransomware Survival Guide - For Non-Technical Users.mp4
    07:26
  • 1. M6-1 - Small to Medium Size Business Security Video 1.mp4
    17:07
  • 2. M6-2 - Small to Medium Size Business Security Video 2.mp4
    17:35
  • 3. M6-3 - Small to Medium Size Business Security Video 3.mp4
    08:05
  • 4. M6-4 - Small to Medium Size Business Security Video 4.mp4
    12:08
  • 1. M7-1 - Internet safety for kids part 1.mp4
    08:01
  • 2. M7-2 - Internet safety for kids part 2.mp4
    04:42
  • 3. M7-3 - Internet safety for kids part 3.mp4
    10:03
  • 4. M7-4 - Internet safety for kids part 4.mp4
    03:54
  • 5. M7-5 - How hard is it to target you or your kid online.mp4
    05:35
  • 6. M7-6 - Online Gaming Safety For Kids.mp4
    36:33
  • 7. M7-7 - Acronyms And Abbreviations.mp4
    06:22
  • 8. M7-8 - How pimps recruit kids over social media.mp4
    22:42
  • Description


    Digital Security Essentials: Password Strength, Social Media Safety, Threat Detection, and Fraud Prevention

    What You'll Learn?


    • Learners will gain an in-depth understanding of the current cyber threat landscape, including the types of cybercrimes prevalent today
    • Participants will learn how to implement robust cyber defense strategies to protect their personal and professional digital environments
    • Learners will be trained on the steps to take when responding to a cyber incident.
    • Upon completion, learners will be capable of promoting a culture of cyber awareness and safety within their communities, families, and workplaces.

    Who is this for?


  • Individuals who use the internet regularly for personal activities, such as browsing, shopping online, using social media, and emailing, who want to ensure their activities are secure from cyber threats
  • Those responsible for children and want to ensure their family's online activities are safe and protected from potential cyber dangers.
  • Entrepreneurs and small business owners who need to protect their business data and customer information from cybercriminals without having a dedicated cybersecurity team.
  • Individuals working remotely or in an office setting who want to secure their work and personal data against cyber attacks, especially those dealing with sensitive information.
  • Teachers and students interested in learning about cybersecurity to both apply this knowledge in their personal digital lives and incorporate it into educational settings for the benefit of others.
  • Professionals outside the IT and cybersecurity fields who want to gain a better understanding of internet safety practices to safeguard their digital presence.
  • Senior Citizens who are looking for guidance on how to navigate the web safely and protect themselves from scams and frauds targeted at their demographic.
  • What You Need to Know?


  • Participants should be comfortable using a computer, navigating the internet, and performing common online tasks such as browsing websites, using email, and accessing social media platforms
  • More details


    Description

    In a world of digital technology, it is easy to forget one sobering fact: our identity can be stolen from under our nose, with one click of the mouse, propelling us into nightmares in a matter of minutes, anytime, anywhere and on any one of our darling gadgets. Hackers, malware, botnets and all form of digital threats are ever more sophisticated, waiting in the shadows for that one opportunity to steal your sensitive information.

    Terry Cutler, A Certified Ethical Hacker and international award winner reminds us of just how vulnerable our data really is, through chilling real-life stories, such as that of a simple USB key left purposefully behind, in any targeted enterprise’s lavatory, where an unsuspecting (albeit good-willed) employee can just pick it up, plug it in and thus, lead the hackers right into the company’s core data.


    Terry’s training will teach you how to

    · Easily come up with an undecipherable password

    · How to secure your information on social media

    · How to detect threats

    · How to identify frauds

    · How to find out what personal information about yourself is floating on the web

    But he reminds us that no matter how stringent our defenses are, there are no silver bullets against cyber crooks and that a computer’s security is only as strong as its weakest link. That weak link is usually human error.


    Come and crack the code in this course.

    Who this course is for:

    • Individuals who use the internet regularly for personal activities, such as browsing, shopping online, using social media, and emailing, who want to ensure their activities are secure from cyber threats
    • Those responsible for children and want to ensure their family's online activities are safe and protected from potential cyber dangers.
    • Entrepreneurs and small business owners who need to protect their business data and customer information from cybercriminals without having a dedicated cybersecurity team.
    • Individuals working remotely or in an office setting who want to secure their work and personal data against cyber attacks, especially those dealing with sensitive information.
    • Teachers and students interested in learning about cybersecurity to both apply this knowledge in their personal digital lives and incorporate it into educational settings for the benefit of others.
    • Professionals outside the IT and cybersecurity fields who want to gain a better understanding of internet safety practices to safeguard their digital presence.
    • Senior Citizens who are looking for guidance on how to navigate the web safely and protect themselves from scams and frauds targeted at their demographic.

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Terry Cutler
    Terry Cutler
    Instructor's Courses
    Terry Cutler is a renowned cybersecurity expert and the CEO of Cyology Labs. He is also the #1 Amazon Best Selling author of "Insider Secrets to Internet Safety: Advice from a Professional Hacker".With over 20 years of experience, Terry has advised some of Canada's largest companies on internal and external security penetration prevention and remedies. He is a Government cleared Ethical Hacker, known for his top-level consulting services, extensive coaching products, numerous TV appearances, and live public speaking events.Terry is also an educator and the creator of the effective online comprehensive learning program, Internet Safety University. This program focuses on cyber-crime, spying, security failures, Internet scams, and social networking dangers that families and individuals face every day. It has attracted more than 37,000 students from 150 countries since its inception in 2013.Terry's achievements in the cybersecurity field include being awarded the 2017 Cybersecurity Educator of the year award, named to IFSEC Global's Top 20 Most Influential People in Cybersecurity for 2018, 2019 and 2020, and named to the CISO Platform Global TOP 100 List.In addition to his consulting and educational services, Terry has also launched a mobile app called Fraudster for both Apple and Android devices to help individuals and businesses stay safe online.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 59
    • duration 6:05:33
    • Release Date 2024/07/23