• Post category:StudyBullet-6
  • Reading time:3 mins read


Security Awareness Training Video Course

What you will learn

Identify types of phishing attacks and how to protect oneself against them

Learn the characteristics of a fake email

How and why cyber criminals target specific people

The modus operandi of cyber criminals

Ways in which a cyber attacker could get into your email account and how to keep him out for good

Description

This course teaches you how to recognize types of phishing attacks and scams and how to protect yourself against them. The course shows different situations in which social engineering tactics are used to get consumers to give up their confidential data. It takes students under the hood of cyber attackers’ sophisticated strategies and tactics and reveal their modus operandi:  Students learn the things that make consumers vulnerable to cyber attacks and how to close those doorways that provide entry to cyber attackers.


Get Instant Notification of New Courses on our Telegram channel.


The course highlighs current scams that target specific consumers. It also touches on some main tools that cyber criminals use to get people’s confidential information such as text messaging, voIP, and email, and how to protect yourself from being tricked into revealing your personal and confidential information. The course teaches you about email security.  It shows how to spot fake emails and how to secure different areas of your email account in order to prevent a cyber hacker from gaining access to it. Throughout this course, you are provided with cases in point for each lesson, how to protect and defend yourself from each type of attacks, and step by step instructions for securing your confidential information. The course is all about making you cyber security alert ready at all times against cyber attacks and scams.

English
language

Content

Introduction

Introduction to phishing
How to detect a fake email
How to protect your computer system against ransomware
How to protect yourself against spear phishing attacks
How to not fall victim to wire transfer scams
How to keep hackers out of your email account