Curriculum
Available in
days
days
after you enroll
- Greetings from your instructor Reza (1:24)
- Download - Practical Training Guide
- How Hard is It To Get Hacked? (2:35)
- Targeted Email Phishing Part I (4:44)
- Targeted Email Phishing Part II (1:32)
- Targeted Email Phishing Part III (4:09)
- Targeted Email Phishing Part IV (12:44)
- Macro Malware (4:01)
- Business Email Compromise (6:06)
- Instant Messaging (1:34)
- Smishing (4:07)
- Vishing (5:13)
Available in
days
days
after you enroll
- Ransomware (4:32)
- Cryptomining (8:41)
- Red Flags (5:11)
- Search Engine Optimization (7:29)
- Banking Trojans (3:16)
- Fake AntiVirus (2:05)
- Apple Part I (4:10)
- Apple Part II (5:51)
- Smartphone Security Part I (4:22)
- Smartphone Security Part II (4:44)
- Smartphone Security Part III (1:19)
- Smartphone Security Part IV (2:47)
Available in
days
days
after you enroll
Available in
days
days
after you enroll