The Ultimate Cyber Security Awareness Training Course
- Are you worried about hackers social engineering you for your sensitive files, business emails, or access to your computer or network?
- Are you scared your company passwords will be stolen?
- Are you anxious about being a victim of identity theft?
- Do you want to learn cyber security awareness and online self defense to protect yourself?
- Do you want to be taught,in a memorable and entertaining way, how to securely manage all your sensitive emails, files, passwords, mobile phones, and browsing?
- Do you want to feel safe, secure, and private on the Internet?
Then this is the PERFECT course for you!
And you are going to LOVE IT!
I designed this beginners course for company employees, and home users, looking for simple, fun, and engaging cyber security training!
This course is designed to teach you the BASICS of cyber security awareness, social engineering, network security and online self defense, even if you have no IT / Cyber Security experience or knowledge.
What makes my course different, is that I speak passionately from the heart, using visuals, humor and storytelling throughout the training, to make it memorable, effective, and entertaining! The training is literally 98% real world images and examples!
You will love watching the modules, because the curriculum is comprehensive enough to give you all the information you need to stay safe, secure and private on the Internet, and presented to you in a simple and entertaining way.
And while the content is presented in VERY simple terms, everyone, (even people with IT/Cyber Security skills) could learn from this course, because to be frank, ANYONE can being socially engineered these days (even including experts in the IT industry sometimes).
I promise, that by the end of this course, you will CONFIDENTLY, SAFELY and SECURELY manage emails, files, mobile phones, computers, and browse the Internet – both for yourself, your family and your company.
Enroll now! I can’t wait to see you in the course…
Greetings from your instructor Reza
Welcome to the training guys! Here is a brief video introducing 1:M Cyber Security, and why this course is the most effective, entertaining and memorable cyber security awareness training you will take! You will learn a little about me as your instructor, and what you should expect to feel, see and learn during this security awareness training course
Who are The Hackers?
You will learn who the various types of hacker entities are out in the world today, as well as their various agendas and tactics
Answer questions about Hackers
Practical Training Guide
Please feel free to download this Practical Training Guide. It includes all the material you are about to watch, numerous practical/actionable steps you can implement ASAP, plus much more! I wanted to make sure you don't stress about having to take a ton of notes, so you can sit back and enjoy the training :)
How Hard is It To Get Hacked?
You will learn how hard it has become to hack into systems and company networks these days
Targeted Email Phishing & Social Engineering
In Part I of this engaging module, you will learn how targeted email phishing is executed against you, as well as recognize some of the major red flags to be able to readily detect these emails in the future
In Part II of this engaging module, you will continue to see new examples of targeted phishing emails, and to recognize some of the major red flags in them
In Part III of this module, you will continue to see a number of ways in which hackers and scammers are social engineering us, via emails and webpages. Even more major red flags are exposed, so that these now become ingrained in our brains
In Part IV of this entertaining module, you will learn the common patterns in all common social engineering attacks, how these are all very similar, and how they can be caught easily
Let's test your knowledge on targeted email phishing, & social engineering! And because this happens to be one of THE most important sections of this entire training, I added some extra questions to REALLY drive home some very crucial points for you!
You will learn all about Macro malware, why they are so popular, having become a go-to means of infiltrating a computer in devastating fashion. You will also learn how to easily spot malicious macros, as well as protect yourself against them
Let's test our knowledge on macro malware!
Business Email Compromise
In this interesting module, you will learn about Business Email Compromise attacks, also known as 'CEO Fraud'. You will visually see how they trick us into initiating large wire transfers, what the red flags are, and then you will learn how to stop these dangerous attacks right in their tracks!
Lets test your knowledge on Business Email Compromise!
In this revealing video, you will learn how similar and effective Messaging attacks are to other common social engineering methods. You will also learn how they use some of the very same tactics as used in phishing emails to hack you
Let's test your knowledge on Messaging!
In this funny video module, you will learn about the sneaky art of social engineering using SMS text messaging on your mobile device. You will be shown examples of Smishing, and we will discuss the red flags that can be easily spotted in these attacks. You will also learn what to do when you receive such fraudulent SMS text messages
Let's test your knowledge on Smishing!
In this entertaining module, you will learn how scammers are social engineering us by spoofing Caller ID numbers, and calling us on our phones, asking for money, personal information or access to our computers. You will be played several audio tracks of actual Vishing attacks, so you can hear for yourself what they sound like (chances are, you may have received one lately yourself). Then we will explain some common red flags that can be easily spotted when you receive such calls, as well as how to handle the caller
Let's test your knowledge on Vishing!
You will be learning about all of the recent ransomware attacks you may have heard about in the news, and why they are so effective in forcing their victims to hand money over to the hackers. You will see various examples of what they look like, and most importantly, how to prevent being a ransomware victim
Let's test your knowledge of ransomware!
In this eye-opening lecture, you will learn, in simple terms, all about what cryptomining (or 'cryptojacking' as we call it in the Security industry), and why hackers have gravitated to it to make money by socially engineering us. You will visually see some examples of various cryptomining attack, and learn how to prevent yourself from being a victim of such an attack. We will also discuss some common ways of detecting if it is running on your system.
Let's test your knowledge of Cryptomining!
You will revisit, and discuss again, all the major social engineering red flags that you can spot in targeted phishing emails, texts and phone calls, as well as social engineering attacks in general. You will understand the main emotions that social engineers try to invoke in you, to make you do what they want. You will go over, in detail, how to detect, and respond accordingly, to a phishing attack against you
Let's test your knowledge about social engineering red flags!
Search Engine Optimization
You will learn how your trust for popular search engines is being exploited, so that hackers can deliver malware to your system, phish you for your credentials, as well as social engineer you into handing over your private information. You will see some examples of these attacks in real life, as well as examples of Google's AdWords service being manipulated to serve you malicious webpages. You will also discover different ways to defeat 'black-hat search engine optimization' as it is commonly known.
Let's test your knowledge of Black-Hat SEO!
You will learn what Banking Trojans are, a common type of cyber attack that effectively depletes your bank accounts of funds. We will then discuss the various ways you can be infected with a Banking Trojan, as well as what you can do if you suspect you have been infected with a banking Trojan
Let's test your knowledge about Banking Trojans!
You will learn about Fake AntiVirus, a very effective and successful method of socially engineering people into handing over their credit card details, by presenting them with fake anti-virus alerts. You will be visually presented with several real-world examples, and then you will be taught some of the red flags to spot these fraudulent attempts at socially engineering you for your money
Let's test your knowledge about Fake AntiVirus!
You will learn about the general security around Apple computers. You will also learn why Apple operating systems can be very secure most of the time, but can sometimes be JUST as insecure as other computers. In addition, you will be presented with some of the common cyber attacks that can affect the Apple platform
You will be presented with some of the main ways in which Apple protects you from evilness on the Internet, as well as some general things you can do to protect yourself whilst using a Mac computer
Let's test your knowledge on Apple computers!
Smartphones and Mobile Apps
In Part I of this module, you will learn the general differences in security between iPhones and Androids, and why Androids can have some serious security issues that need to be addressed
In Part II, you will learn how hackers are uploading malicious apps into the Google Play Store, and we will discuss the major red flags to take note of, when you are considering downloading an app onto your mobile device. You will also be visually presented with real-world examples of malicious apps that exploit app permissions, as well as malicious 3rd party app stores.
In Part III, you will learn some great solutions that Google has put in place, to protect you from the bad guys when you are using an Android device. We will also discuss Google Play Protect, and how it is designed to help you detect and remove malicious apps from your phone
In Part IV, you will learn about security on Apple iPhones, and why they are generally more secure than Android phones. You will also be shown various settings on the phone that Apple has in place to protect you from malicious apps, and some things you can do to lock down your mobile device
Let's test your knowledge about Smartphones and Mobile Apps!
In this funny video, you will understand the major (and sometimes annoying) issues around password management. This includes how to keep track of ALL of your passwords in a secure manner, and why sharing weak passwords across multiple websites is something you need to address today. You will then be introduced to some solutions on how to create GREAT passwords, using passphrases, and how to store them with you securely on all of your devices
Let's test your knowledge on password management!
In this 2-part eye-opening video module, you will learn all about wonderful 2-Factor Authentication: an excellent solution for preventing hackers hijacking your account! The term 2FA will be explained in simple terms, and then you will be visually guided, using step-by-step instructions, on how to set up 2FA for popular websites such as Facebook. You will also understand why 2FA also greatly helps mitigate the risks with using the same weak passwords across websites
In part 2 of this eye-opening video module, you will learn about the various types of 2FA, and in particular about the highly respected security keys, which all 85000 of Google's employees have been using lately, and which has stopped 100% account hijacking! You will also be taught how easy it is to set up, and valuable security keys are to your account security
Let's test your knowledge on 2FA!
In part 1 of this video series, you will be presented with the main security issues when it comes to using the major browsers on the market today. You will learn about invasive and dangerous things such as browser scripts, trackers, cookies and fake browser updates
In part 2 of this video series, you will be trained on the issues surrounding Java and Flash running in your browser, as well as malicious browser extensions that can take over your browser, and even your computer! Next, we will discuss the privacy and security strengths/weaknesses of the major browsers such as Safari, Edge, Chrome, Firefox and Brave.
In part 3 of this fact-filled video series, you will again be shown, using visual examples, all the different ways you can securely lock down your browser from the bad guys, as well as invasive marketing companies that want to track your browsing habits! You will be presented with some awesome solutions for blocking trackers, ads, scripts and malicious code that can secretly run inside your browser.
In part 4 of this module, you will continue to learn some really good browser settings that can protect your privacy and security on the Internet. We discuss browser scripts in depth, how they work, why some are very bad for you, and how you can shut these malicious scripts in their tracks using a few very useful browser addons. You will also see how you can browse securely, and privately, on the web using your mobile device.
Let's test your knowledge on browser security!
Internet Data Privacy
In this video, you will be presented with the main issues around the industrial-level analysis, and trading of our private data, by certain browsers, marketing firms and tech companies. You will come to understand that nothing is really for free on the Internet, and when you are using popular free services on the Internet (such as email and social media), that much of your behavior/interests/habits are being analyzed and profiled for future advertising. You will also be presented with some great solutions to keep your Internet browsing somewhat private, and be able to see for yourself what data is being collected about you when your use these services.
Let's test your knowledge on Internet Data Privacy!
In this hilarious video, you will learn how social media websites are the perfect platform for downloading malware, and being scammed into parting with our private and sensitive information. You will be shown real-world examples of funny (and sometimes worrisome scams being posted), you will also learn the red flags to spot in the future whenever you come across these types of fraudulent posts on social media.
Let's test your knowledge on Social Media!
In this controversial module, you will see actual images on social media, of how nation states, and ideologues, have exploited the platform to spread misinformation/false news. You will understand how these campaigns have been so effective and successful in socially engineering our minds. You will also learn how social media companies are developing new solutions to tackle this serious issue, and how they are working to protect us. Just as important, we will discuss why all of this is significant from a cyber security perspective!
Let's test your knowledge on Disinformation!
In this interesting module, you will learn how devastating the Equifax hack was for most of us, and how our personal data is most likely already on the Dark Web and in the hands of hackers and fraudsters. You will then be shown how you can protect your credit profile, with some really amazing and easy solutions you can implement in minutes, in light of all the large data breaches that have occurred in recent years
Let's test your knowledge on Identity Theft!
In this presentation, you will learn about all of the great data privacy rights we now have with GDPR regulation in the EU. You will be taught the main rules around GDPR that are forcing Internet companies to handle your private data securely, and how it can help protect US citizen data as well from prying hands. You will also understand the serious implications if customer data is not strictly handled according to GDPR.