Companies Home Search Profile

The Beginners 2023 Cyber Security Awareness Training Course

Focused View

Reza Zaheri

3:22:05

13 View
  • 01 - Greetings from your instructor Reza.mp4
    01:31
  • 02 - Who are the Hackers.mp4
    04:07
  • 03 - How Hard is It to Get Hacked.mp4
    02:33
  • 04 - Targeted Email Phishing Part I.mp4
    04:44
  • 05 - Targeted Email Phishing Part II.mp4
    01:32
  • 06 - Targeted Email Phishing Part III.mp4
    04:09
  • 07 - Targeted Email Phishing Part IV.mp4
    12:47
  • 08 - Macro Malware.mp4
    04:01
  • 09 - Business Email Compromise.mp4
    06:06
  • 10 - Messaging.mp4
    01:41
  • 11 - Smishing.mp4
    04:07
  • 12 - Vishing.mp4
    05:17
  • 13 - Ransomware.mp4
    04:32
  • 14 - Cryptomining.mp4
    08:41
  • 15 - Social Engineering Red Flags.mp4
    05:11
  • 16 - Search Engine Optimization.mp4
    07:29
  • 17 - Banking Trojan.mp4
    03:16
  • 18 - Fake AntiVirus.mp4
    02:05
  • 19 - Apple Part I.mp4
    04:10
  • 20 - Apple Part II.mp4
    05:51
  • 21 - Smartphones and Mobile Apps Part I.mp4
    04:22
  • 22 - Smartphones and Mobile Apps Part II.mp4
    04:44
  • 23 - Smartphones and Mobile Apps Part III.mp4
    01:19
  • 24 - Smartphones and Mobile Apps Part IV.mp4
    02:50
  • 25 - Password Management.mp4
    07:51
  • 26 - 2-Factor Authentication Part I.mp4
    08:44
  • 27 - 2-Factor Authentication Part II.mp4
    02:27
  • 28 - Browser Security Part I.mp4
    08:40
  • 29 - Browser Security Part II.mp4
    06:25
  • 30 - Browser Security Part III.mp4
    07:03
  • 31 - Browser Security Part IV.mp4
    04:16
  • 32 - Internet Data Privacy.mp4
    07:07
  • 33 - Social Media.mp4
    02:59
  • 34 - Disinformation.mp4
    07:32
  • 35 - Identity Theft.mp4
    03:33
  • 36 - GDPR.mp4
    02:06
  • 37 - Encryption.mp4
    07:12
  • 38 - IoT Internet of Things.mp4
    06:16
  • 39 - What Else Can You Do To Protect Yourself Part I.mp4
    06:48
  • 40 - What Else Can You Do To Protect Yourself Part II.mp4
    06:01
  • Description


    This comprehensive video course has been expertly designed to equip individuals of all levels of IT or cyber security experience with a deep understanding of how to detect and prevent cyber-attacks. You will start with visual examples of targeted phishing emails and learn how to recognize major red flags to detect these emails in the future. You will then gain insights into how businesses and corporations are hacked through malicious macros, BEC fraud scams, ransomware attacks, and other methods. The course will also cover social engineering attacks, using mobile phones to trick individuals into revealing sensitive information. You will become familiar with a range of social engineering attacks that prey on individuals using sneaky methods. In addition to these key areas, you will gain a deeper understanding of security features and differences between iPhones and Androids, including how to avoid downloading malicious apps. The course will also cover general security practices for Mac computers, as well as general tips for protecting yourself when using computers, smartphones, and the Internet. You will then move on to effective solutions for password management, two-factor authentication, and why encryption is essential for privacy and security. By the end of the course, you will be able to recognize and defend against various cyber-attacks, feel confident in securely managing emails, files, mobile phones, computers, and browsing the Internet, and apply best practices for maintaining personal and company security.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Reza Zaheri is a cybersecurity professional with over 15 years of leadership and hands-on experience working in cybersecurity with Fortune 100 companies. After having lived and breathed cybersecurity for a very long time and having spent the first few years of his career conducting numerous security assessments and managing a security engineering team, he went on to fight cybercriminals on the cyber frontlines and has been doing so for the past 10 years, directing digital forensics and incident response teams for Fortune 100 companies. The author was also responsible for incident detection, investigation, and digital forensics for all cybersecurity incidents across the United States, as well as providing digital forensics assistance to Latin American regional offices.
    Packt is a publishing company founded in 2003 headquartered in Birmingham, UK, with offices in Mumbai, India. Packt primarily publishes print and electronic books and videos relating to information technology, including programming, web design, data analysis and hardware.
    • language english
    • Training sessions 40
    • duration 3:22:05
    • Release Date 2024/03/15