Companies Home Search Profile

Trustee Shield: Cybersecurity Foundation for Kids and Teens

Focused View

KIDS SHIELD SERVICES INC.,Maryam Raiyat Aliabadi

3:50:13

527 View
  • 1.1 1. Passwords-Slieds 2024.pdf
  • 1. Introduction.mp4
    00:55
  • 2. Real Story.mp4
    01:55
  • 3. Password Definition.mp4
    03:11
  • 4. Hackers Perspective.mp4
    02:18
  • 5. Making unhackable password.mp4
    07:07
  • 6. Making Unforgettable Password.mp4
    02:28
  • 7. Video game Time.mp4
    02:02
  • 8. Passwords.html
  • 1.1 2. MFA-Slieds 2024.pdf
  • 1. Introduction.mp4
    00:45
  • 2. Smart Password Review.mp4
    01:22
  • 3. Real Story.mp4
    01:56
  • 4. A Hackers Perspective.mp4
    01:11
  • 5. Authentication.mp4
    02:29
  • 6. Two-Factor Authentication (2FA).mp4
    03:30
  • 7. Setting up 2FA for Discord.mp4
    02:09
  • 8. Password Managers.mp4
    05:08
  • 9. Cyber Hero Rules.mp4
    02:15
  • 10. Multi-Factor Authentication (MFA).html
  • 1.1 3. Malwares-Slieds 2024.pdf
  • 1. Introduction.mp4
    00:41
  • 2. Real Story.mp4
    01:49
  • 3. What is Malware.mp4
    01:47
  • 4. Hackers Perspective.mp4
    02:11
  • 5. Viruses.mp4
    02:47
  • 6. Worms.mp4
    03:07
  • 7. Trojan Horses.mp4
    04:40
  • 8. Adware.mp4
    02:17
  • 9. Spyware.mp4
    01:35
  • 10. Signs of a Sick Computer.mp4
    02:49
  • 11. How to Remain Safe.mp4
    03:51
  • 12. Defensive Methods against Malware.mp4
    03:55
  • 13. Malware.html
  • 1.1 4. Insecure Websites-Slieds 2024.pdf
  • 1. Introduction.mp4
    00:51
  • 2. Real Story.mp4
    02:04
  • 3. What is an Insecure Website.mp4
    01:43
  • 4. Hackers Perspective.mp4
    01:55
  • 5. Search Engine.mp4
    04:35
  • 6. Website Address.mp4
    03:40
  • 7. Why HTTPS is More Secure than HTTP.mp4
    03:27
  • 8. Detecting Insecure Websites from the URL.mp4
    03:47
  • 9. Detecting Insecure Websites from the Content.mp4
    02:28
  • 10. Cyber Hero Rules.mp4
    01:36
  • 11. Insecure Websites.html
  • 1.1 5. Cookies-Slieds 2024.pdf
  • 1. Introduction.mp4
    01:23
  • 2. Real Story.mp4
    02:00
  • 3. Internet Cookies.mp4
    05:14
  • 4. Hackers Perspective.mp4
    01:43
  • 5. Cookies Risks for Online Privacy.mp4
    05:04
  • 6. Protection against Cookie risks.mp4
    07:43
  • 7. How to Manage Cookies.mp4
    02:35
  • 8. Cyberhero Rules.mp4
    02:16
  • 9. Internet Cookies.html
  • 1.1 6. Privacy-Slieds 2024.pdf
  • 1. Introduction.mp4
    00:54
  • 2. Real Story.mp4
    01:44
  • 3. Online Privacy.mp4
    02:10
  • 4. Hackers Perspective.mp4
    02:07
  • 5. Digital Footprint.mp4
    01:31
  • 6. How do you create a digital footprint.mp4
    02:17
  • 7. Digital Footprint Versus Online Privacy.mp4
    02:36
  • 8. Digital Footprint Impacts.mp4
    02:51
  • 9. Identity Theft.mp4
    03:20
  • 10. Dark Web.mp4
    02:13
  • 11. Cyberbully.mp4
    02:13
  • 12. How To Protect Privacy- Part (1).mp4
    05:50
  • 13. How To Protect Privacy- Part (2).mp4
    06:12
  • 14. Cyber Hero Rules.mp4
    02:39
  • 15. Online Privacy.html
  • 1.1 7. Phishing-Slieds 2024.pdf
  • 1. Introduction.mp4
    01:00
  • 2. Real Story.mp4
    02:16
  • 3. What is phishing.mp4
    02:12
  • 4. Hackers Perspective.mp4
    02:05
  • 5. Different Types of Phishing Scams.mp4
    02:01
  • 6. How to detect email phishing.mp4
    02:44
  • 7. Vishing.mp4
    01:40
  • 8. What are the signs of vishing scammer.mp4
    02:15
  • 9. Smishing.mp4
    01:22
  • 10. How to detect smishing.mp4
    01:34
  • 11. Malicious URL.mp4
    03:15
  • 12. What to do if mistakenly trapped in a phishing situation.mp4
    02:02
  • 13. Activity Revised.mp4
    06:12
  • 14. Cyber Hero Rules.mp4
    03:09
  • 15. Game Time -Cyber guardians- scanners.mp4
    01:25
  • 16. Phishing.html
  • 1.1 8.Social Enginerring- Slieds 2024.pdf
  • 1. Introduction.mp4
    01:35
  • 2. Real Story.mp4
    02:06
  • 3. What is Social Engineering.mp4
    03:26
  • 4. Hackers Perspective.mp4
    03:09
  • 5. Scareware.mp4
    01:59
  • 6. Signs of Scareware.mp4
    02:13
  • 7. Catfishing.mp4
    01:32
  • 8. How to identify a catfisher.mp4
    02:47
  • 9. Ransomwares.mp4
    04:09
  • 10. Protection against Social Engineering attacks.mp4
    03:43
  • 11. Cyber Hero Rules for Social Engineering.mp4
    03:31
  • 12. Social Engineering.html
  • Description


    Gain fundamental knowledge of self-protection in the online world! This course is intended for purchase by adults

    What You'll Learn?


    • Proven basic knowledge of online threats and avoidance strategies.
    • Learn cyber security essentials, including various online risks.
    • Understand how to spot hacker tricks.
    • Learn protection methods against hackers and how to make smart choices to prevent attacks.

    Who is this for?


  • Kids and Teens aged 9-15 years old
  • What You Need to Know?


  • No background knowledge is required.
  • More details


    Description

    Prepare your young learners for a safe and secure digital journey with our engaging and educational "Cybersecurity Foundation for Kids and Teens" course. In this course, children will go through an exciting exploration of the digital world, focusing on essential topics that empower them to navigate the online landscape with confidence and responsibility. Throughout this course, young participants will uncover the secrets of strong passwords, discovering how to protect their personal information. They'll uncover the mysteries of malware, learning how to spot digital threats and take action to keep their devices and data safe. Websites can be both fascinating and potentially risky. Our young adventurers will learn about insecure websites and gain the knowledge needed to make smarter choices when browsing the web. They'll also discover cookies. learning how to manage cookies responsibly will help them safeguard their privacy. Social Engineering is like a puzzle, and our young participants will become skilled detectives, learning how to spot manipulative tactics and protect themselves from online tricksters.  Kids will learn how to protect their Privacy and build a positive and respectful online community. They'll understand why it's essential to guard their personal information and explore the rules and guidelines that help keep their data safe.

    Who this course is for:

    • Kids and Teens aged 9-15 years old

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    KIDS SHIELD SERVICES INC.
    KIDS SHIELD SERVICES INC.
    Instructor's Courses
    KIDS' SHIELD SERVICES Inc. establishes innovative cyber security education to protect children from cybercriminals. KIDS' SHIELD SERVICES INC. is committed to addressing online risks through education. Our comprehensive global cybersecurity certification program empowers children to understand and protect themselves from cyber threats. Featuring various training and certification levels, KIDS' SHIELD SERVICES provides the tools for children to effectively navigate online risks. Learning options include virtual classrooms and self-paced sessions. The Certification Program consists of three online courses that cover the fundamentals of cybersecurity, catering to both beginners and advanced learners. These courses integrate engaging content, interactive games, and certifications across three proficiency levels: Trustee Shield, Defender Shield, and Guardian Shield.
    Maryam Raiyat Aliabadi
    Maryam Raiyat Aliabadi
    Instructor's Courses
    I am a Teaching Faculty and Postdoctoral Fellow in the Faculty of Computer Science at the University of British Columbia, Vancouver, Canada. My academic journey has been enriched by diverse experiences across the globe. I earned my BSc degree from Shahid Beheshti University (SBU) in Tehran, Iran, and later pursued my MSc degree in Electrical and Computer Engineering from the University of British Columbia (UBC), where I am now proud to contribute as an educator. Guided by a passion for innovation and security, my academic pursuits led me to delve into the world of Cybersecurity. This culminated in my noteworthy PhD thesis, meticulously crafted at both UBC's and SBU's esteemed Computer Science departments. I have over 10 years’ international industrial experience as an R&D engineer and IT project manager and 4 years’ of teaching experience in international universities such as UBC and New York Tech – Vancouver, Canada. My commitment to the digital world's safety extends beyond academia - I am the trailblazer behind Cyber Security Education for children through Gamification. The culmination of this vision is KIDS SHIELD (www.kidsshield.caLinks to an external site.), a pioneering initiative in Canada.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 86
    • duration 3:50:13
    • Release Date 2024/06/12