Cyber Security Awareness Training Course

1- Welcome to 1M Cyber Security!-
2- Greetings from your instructor Reza-
4- Who are The Hackers
5- How Hard Is It To Get Hacked
5- Targeted Email Phishing Part IV-
6-1- Targeted Email Phishing Part I
6-2- Targeted Email Phishing Part II-
6-4- Targeted Email Phishing Part III-
7- Macro Malware
8- Business Email Compromise-
9- Messaging
10- Smishing
11- Vishing
12- Ransomware
13- Cryptomining
14- Social Engineering Red Flags-
15- Search Engine Optimization-
16- Banking Trojan-
17- Fake AntiVirus
18-1- Apple Part I-
18-2- Apple Part II-
19-4- Smartphones and Mobile Apps Part IV-
20-1- Password Management
21- 1-Factor Authentication Part I-
21- 2-Factor Authentication Part II-
22-1- Browser Security Part I-
22-2- Browser Security Part II-
22-3- Browser Security Part III-
23-1- Social Media-
24-1- Disinformation-
25-1- Internet Data Privacy-
26-1- Identity Theft-
27-1- GDPR-
28-1- EncryptionTravel-
29-1- IoT Internet of Things-
30-1- What Else Can You Do To Protect Yourself Part I-
30-2- What Else Can You Do To Protect Yourself Part II-

Comments