Autoplay
Autocomplete
Previous Lesson
Complete and Continue
[ADVANCED] Cybersecurity Training Course
Module 1. Phishing & Malware
Greetings from your instructor Reza (1:24)
Download - Practical Training Guide
How Hard is It To Get Hacked? (2:35)
Targeted Email Phishing Part I (4:44)
Targeted Email Phishing Part II (1:32)
Targeted Email Phishing Part III (4:09)
Targeted Email Phishing Part IV (12:44)
Macro Malware (4:01)
Business Email Compromise (6:06)
Instant Messaging (1:34)
Smishing (4:07)
Vishing (5:13)
Module 2. Ransomware & Smartphone
Ransomware (4:32)
Cryptomining (8:41)
Red Flags (5:11)
Search Engine Optimization (7:29)
Banking Trojans (3:16)
Fake AntiVirus (2:05)
Apple Part I (4:10)
Apple Part II (5:51)
Smartphone Security Part I (4:22)
Smartphone Security Part II (4:44)
Smartphone Security Part III (1:19)
Smartphone Security Part IV (2:47)
Module 3. Authentication & Browser
Password Management (7:51)
2 Factor Authentication Part I (8:44)
2 Factor Authentication Part II (2:27)
Browser Security Part I (8:40)
Browser Security Part II (6:25)
Browser Security Part III (7:03)
Browser Security Part IV (4:16)
Module 4. Wrap Up
Internet Data Privacy (7:07)
Social Media (2:59)
Disinformation (7:32)
Identity Theft (3:33)
GDPR (2:06)
Encryption (7:12)
IoT / Internet of Things (6:16)
Wrap Up Part I (6:48)
Wrap Up Part II (6:01)
IoT / Internet of Things
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock