Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security Awareness Training
Section 1: Greetings from your instructor Reza
Greetings from your instructor Reza (1:24)
Section 2: Practical Training Guide
Practical Training Guide & Resource Files
Section 3: How Hard is It To Get Hacked?
How Hard Is It To Get Hacked? (2:35)
Section 4: Targeted Email Phishing & Social Engineering
Targeted Email Phishing Part I (4:44)
Targeted Email Phishing Part II (1:32)
Targeted Email Phishing Part III (4:09)
Targeted Email Phishing Part IV (12:44)
Phishing Resources
Quiz: Targeted Email Phishing & Social Engineering Quiz
Section 5: Macro Malware
Macro Malware (4:01)
Macro Malware Resources
Section 6: Business Email Compromise
Business Email Compromise (6:07)
Quiz: Business Email Compromise Quiz
Section 7: Smishing
Smishing (4:07)
Smishing Resources
Quiz: Smishing Quiz
Section 8: Vishing
Vishing (5:13)
Vishing Resources
Quiz: Vishing Quiz
Section 9: Ransomware
Ransomware (4:20)
Ransomware Resources
Quiz: Ransomware Quiz
Section 10: Red Flags
Social Engineering Red Flags (5:07)
Quiz: Social Engineering Red Flags Quiz
Section 11: Search Engine Optimization
Search Engine Optimization (7:19)
Section 12: Apple
Apple Part I (4:10)
Apple Part II (5:10)
Apple Resources
Quiz: Quiz about Apple Macs
Section 13: Smartphones and Mobile Apps
Smartphones and Mobile Apps Part I (3:47)
Smartphones and Mobile Apps Part II (4:44)
Smartphones and Mobile Apps Part III (1:18)
Smartphones and Mobile Apps Part IV (2:24)
Smartphone & Mobile App Resources
Quiz: Quiz about Smartphones and Mobile Apps
Section 14: Password Management
Password Management (7:38)
Password Management Resources
Quiz: Quiz about Password Management
Section 15: 2-Factor Authentication
2-Factor Authentication Part I (7:58)
2-Factor Authentication Part II (2:28)
2-Factor Authentication Resources
Quiz: Quiz about 2-Factor Authentication
Section 16: Passkeys
Passkeys Part I (10:52)
Passkeys Part II (7:29)
Quiz about Passkeys
Section 17: Browser Security
Browser Security Part I (8:40)
Browser Security Part II (6:25)
Browser Security Part III (5:51)
Browser Security Part IV (4:16)
Browser Security Resources
Quiz: Quiz about Browser Security
Section 18: Internet Data Privacy
Internet Data Privacy (6:35)
Internet Data Privacy Resources
Section 19: Identity Theft
Identity Theft (3:24)
Identity Theft Resources
Quiz: Quiz about Identity Theft
Section 20: Encryption
Encryption/Travel (7:12)
Encryption Resources
Quiz: Quiz about Encryption/Travel
Section 21: IoT / Internet of Things
IoT / Internet of Things (5:53)
IoT Resources
Quiz: Quiz about IoT Internet of Things
Section 22: What Else Can You Do To Protect Yourself
What Else Can You Do To Protect Yourself Part I (6:49)
What Else Can You Do To Protect Yourself Part II (5:47)
Extra Resources
Quiz: Quiz about What Else Can You Do To Protect Yourself
Encryption/Travel
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock