Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security Awareness Training
Section 1: Greetings from your instructor Reza
Greetings from your instructor Reza (1:24)
Section 2: Practical Training Guide
Practical Training Guide & Resource Files
Section 3: How Hard is It To Get Hacked?
How Hard Is It To Get Hacked? (2:35)
Section 4: Targeted Email Phishing & Social Engineering
Targeted Email Phishing Part I (4:44)
Targeted Email Phishing Part II (1:32)
Targeted Email Phishing Part III (4:09)
Targeted Email Phishing Part IV (12:44)
Phishing Resources
Quiz: Targeted Email Phishing & Social Engineering Quiz
Section 5: Macro Malware
Macro Malware (4:01)
Macro Malware Resources
Section 6: Business Email Compromise
Business Email Compromise (6:07)
Quiz: Business Email Compromise Quiz
Section 7: Smishing
Smishing (4:07)
Smishing Resources
Quiz: Smishing Quiz
Section 8: Vishing
Vishing (5:13)
Vishing Resources
Quiz: Vishing Quiz
Section 9: Ransomware
Ransomware (4:20)
Ransomware Resources
Quiz: Ransomware Quiz
Section 10: Red Flags
Social Engineering Red Flags (5:07)
Quiz: Social Engineering Red Flags Quiz
Section 11: Search Engine Optimization
Search Engine Optimization (7:19)
Section 12: Apple
Apple Part I (4:10)
Apple Part II (5:10)
Apple Resources
Quiz: Quiz about Apple Macs
Section 13: Smartphones and Mobile Apps
Smartphones and Mobile Apps Part I (3:47)
Smartphones and Mobile Apps Part II (4:44)
Smartphones and Mobile Apps Part III (1:18)
Smartphones and Mobile Apps Part IV (2:24)
Smartphone & Mobile App Resources
Quiz: Quiz about Smartphones and Mobile Apps
Section 14: Password Management
Password Management (7:38)
Password Management Resources
Quiz: Quiz about Password Management
Section 15: 2-Factor Authentication
2-Factor Authentication Part I (7:58)
2-Factor Authentication Part II (2:28)
2-Factor Authentication Resources
Quiz: Quiz about 2-Factor Authentication
Section 16: Passkeys
Passkeys Part I (10:52)
Passkeys Part II (7:29)
Quiz about Passkeys
Section 17: Browser Security
Browser Security Part I (8:40)
Browser Security Part II (6:25)
Browser Security Part III (5:51)
Browser Security Part IV (4:16)
Browser Security Resources
Quiz: Quiz about Browser Security
Section 18: Internet Data Privacy
Internet Data Privacy (6:35)
Internet Data Privacy Resources
Section 19: Identity Theft
Identity Theft (3:24)
Identity Theft Resources
Quiz: Quiz about Identity Theft
Section 20: Encryption
Encryption/Travel (7:12)
Encryption Resources
Quiz: Quiz about Encryption/Travel
Section 21: IoT / Internet of Things
IoT / Internet of Things (5:53)
IoT Resources
Quiz: Quiz about IoT Internet of Things
Section 22: What Else Can You Do To Protect Yourself
What Else Can You Do To Protect Yourself Part I (6:49)
What Else Can You Do To Protect Yourself Part II (5:47)
Extra Resources
Quiz: Quiz about What Else Can You Do To Protect Yourself
What Else Can You Do To Protect Yourself Part II
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock