Companies Home Search Profile

Learn about VOIP scams(Real time work) Data Loss Prevention

Focused View

Mandy Singh

39:17

82 View
  • 1. Introduction.mp4
    02:26
  • 2. VOIP SCAMS.mp4
    13:22
  • 3. Facebook Scams in Cyber Security Environment.mp4
    03:30
  • 4. Scams with Buyer and Seller.mp4
    07:30
  • 5. Think you are smarter then Scammer. Take this quiz to find out.html
  • 1. DATA LOSS PREVENTION.mp4
    12:29
  • Description


    VOIP,GUMTREE,FACEBOOK SCAMS,Data Loss Prevention All real time work

    What You'll Learn?


    • VOIP SCAM,GUM TREE SCAM
    • TYPES OF VOIP SCAM
    • Data Loss Prevention
    • QUIZ

    Who is this for?


  • Anyone who wants to work in Cyber Security
  • NO Experience required. Anyone who wants to learn Cyber security or are already in the field
  • What You Need to Know?


  • Anyone
  • NO Experience required. Anyone who wants to learn Cyber security or are already in the field
  • More details


    Description

    In this lecture I will be talking about the real time work in Cyber Security Enviornment related to VOIP,GUMTREE and FACEBOOK Scams.Some real time examples and how do you take it down and where to report and how does ACCC Scam Watch comes into the picture in this.

    Scammers contact targets by phone, email, text message, or in the case of VoIP phishing, Internet phone. The scammers pretend to be part of a legitimate group, company, or governmental organization in the hopes of encouraging targets to trust them. Then they abuse this trust to trick victims into sharing personal information.

    In one vishing case, scammers targeted PayPal users by including a telephone number in a spam e-mail. In the other case, the criminals configured an automatic telephone dialer to dial phone numbers; when the phone was answered, the dialer played an automated recording saying the telephone customer's credit card had fraudulent activity and asking the customer to call a number with a spoofed caller ID related to the credit card issuer, Secure Computing says. Once users called, they were asked for personal account information.


    Those scam could impersonate as Norton or any other company .

    SMS phish associated with the VOIP Scams (also known as VISHING) don't normally include a clickable links but will have a "call to action" statement and a phone number to convince people to call the scammers back

    Apart from this TAKE A QUIZ and learn about Data Loss prevention real time work. What kind of tickets come in the day to day work.

    Who this course is for:

    • Anyone who wants to work in Cyber Security
    • NO Experience required. Anyone who wants to learn Cyber security or are already in the field

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    I am cyber security professional with 13+ years of experience in Network and Security.Apart from my 9 to 5 job I am a part time Udemy Instructor .I am going to introduce you with some real time environment work.I work in Australia as a Cyber Security Professional.I have worked in various other countries like US,Dubai and India.Whether you are a beginner or experienced my courses will help you understand the basics of it. So far I have created three courses 2 related to Cyber Security and 1 Helpdesk course.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 5
    • duration 39:17
    • Release Date 2023/10/04

    Courses related to Ethical Hacking

    Courses related to Cyber Security

    Courses related to Penetration Testing

    Courses related to Cyber Security Awareness

    Courses related to VoIP