fbpx
4.6 out of 5
4.6
65 reviews on Udemy

The Ultimate Cyber Security Awareness Training Course

Learn to Spot Targeted Email Phishing, Social Engineering & Hacker Tricks, Malicious Browser & Mobile Threats & More!
Instructor:
Reza Zaheri
543 students enrolled
English
You will be trained on all the ways hackers can socially engineer you, at your work or home, through email, SMS text, phone calls, browsing, downloaded files, mobile phones, connected home devices etc
You will know the common human emotions that hackers like to trigger, to trick you into giving them access to your money, personal accounts, systems and company network
You will stop successful social engineering attacks, by spotting red flags in phishing emails, text messages and phone calls
Learn how to securely configure your browser to block malicious scripts, cookies, trackers etc. as well as maintain good privacy/anonymity on the Internet
You will be well versed on how to securely use Windows, Apple Macs, iPhones, Androids etc
You will be visually guided on how to effectively and efficiently manage all your passwords
You will be shown proven and effective cyber security software to keep your systems private and secure
You will confidently manage your emails, business files, computers, mobile devices and Internet browsing
You will feel safe, secure, and private on the Internet
  • Are you worried about hackers social engineering you for your sensitive files, business emails, or access to your computer or network?
  • Are you scared your company passwords will be stolen?
  • Are you anxious about being a victim of identity theft?
  • Do you want to learn cyber security awareness and online self defense to protect yourself?
  • Do you want to be taught,in a memorable  and entertaining way, how to securely manage all your sensitive emails, files, passwords, mobile phones, and browsing?
  • Do you want to feel safe, secure, and private on the Internet?

Then this is the PERFECT course for you!

And you are going to LOVE IT!

I designed this beginners course for company employees, and home users, looking for simple, fun, and engaging cyber security training!

This course is designed to teach you the BASICS of cyber security awareness, social engineering, network security and online self defense, even if you have no IT / Cyber Security experience or knowledge.

What makes my course different, is that I speak passionately from the heart, using visuals, humor and storytelling throughout the training, to make it memorable, effective, and entertaining! The training is literally 98% real world images and examples!

You will love watching the modules, because the curriculum is comprehensive enough to give you all the information you need to stay safe, secure and private on the Internet, and presented to you in a simple and entertaining way.

And while the content is presented in VERY simple terms, everyone, (even people with IT/Cyber Security skills) could learn from this course, because to be frank, ANYONE can being socially engineered these days (even including experts in the IT industry sometimes).

I promise, that by the end of this course, you will  CONFIDENTLY, SAFELY and SECURELY manage emails, files, mobile phones, computers, and browse the Internet – both for yourself, your family and your company.

 

Enroll now! I can’t wait to see you in the course…

 

-Reza

 

Greetings from your instructor Reza

1
Greetings from your instructor Reza

Welcome to the training guys! Here is a brief video introducing 1:M Cyber Security, and why this course is the most effective, entertaining and memorable cyber security awareness training you will take! You will learn a little about me as your instructor, and what you should expect to feel, see and learn during this security awareness training course

2
IMPORTANT - Please Read

Who are The Hackers?

1
Who are The Hackers?

You will learn who the various types of hacker entities are out in the world today, as well as their various agendas and tactics


2
Who Are The Hackers Quiz

Answer questions about Hackers

Practical Training Guide

1
Practical Training Guide & Resource Files

Please feel free to download this Practical Training Guide. It includes all the material you are about to watch, numerous practical/actionable steps you can implement ASAP, plus much more! I wanted to make sure you don't stress about having to take a ton of notes, so you can sit back and enjoy the training :)

How Hard is It To Get Hacked?

1
How Hard Is It To Get Hacked?

You will learn how hard it has become to hack into systems and company networks these days

2
How Hard Is It To Get Hacked Quiz?

Targeted Email Phishing & Social Engineering

1
Targeted Email Phishing Part I

In Part I of this engaging module, you will learn how targeted email phishing is executed against you, as well as recognize some of the major red flags to be able to readily detect these emails in the future

2
Targeted Email Phishing Part II

In Part II of this engaging module, you will continue to see new examples of targeted phishing emails, and to recognize some of the major red flags in them

3
Targeted Email Phishing Part III

In Part III of this module, you will continue to see a number of ways in which hackers and scammers are social engineering us, via emails and webpages.  Even more major red flags are exposed, so that these now become ingrained in our brains

4
Targeted Email Phishing Part IV

In Part IV of this entertaining module, you will learn the common patterns in all common social engineering attacks, how these are all very similar, and how they can be caught easily

5
Phishing Resources
6
Targeted Email Phishing & Social Engineering Quiz

Let's test your knowledge on targeted email phishing, & social engineering! And because this happens to be one of THE most important sections of this entire training, I added some extra questions to REALLY drive home some very crucial points for you!

Macro Malware

1
Macro Malware

You will learn all about Macro malware, why they are so popular, having become a go-to means of infiltrating a computer in devastating fashion. You will also learn how to easily spot malicious macros, as well as protect yourself against them

2
Macro Malware Resources
3
Macro Malware Quiz

Let's test our knowledge on macro malware!

Business Email Compromise

1
Business Email Compromise

In this interesting module, you will learn about Business Email Compromise attacks, also known as 'CEO Fraud'. You will visually see how they trick us into initiating large wire transfers, what the red flags are, and then you will learn how to stop these dangerous attacks right in their tracks!

2
Business Email Compromise Quiz

Lets test your knowledge on Business Email Compromise!

Instant Messaging

1
Messaging

In this revealing video, you will learn how similar and effective Messaging attacks are to other common social engineering methods. You will also learn how they use some of the very same tactics as used in phishing emails to hack you

2
Messaging Quiz

Let's test your knowledge on Messaging!

Smishing

1
Smishing

In this funny video module, you will learn about the sneaky art of social engineering using SMS text messaging on your mobile device. You will be shown examples of Smishing, and we will discuss the red flags that can be easily spotted in these attacks. You will also learn what to do when you receive such fraudulent SMS text messages

2
Smishing Resources
3
Smishing Quiz

Let's test your knowledge on Smishing!

Vishing

1
Vishing

In this entertaining module, you will learn how scammers are social engineering us by spoofing Caller ID numbers, and calling us on our phones, asking for money, personal information or access to our computers. You will be played several audio tracks of actual Vishing attacks, so you can hear for yourself what they sound like (chances are, you may have received one lately yourself). Then we will explain some common red flags that can be easily spotted when you receive such calls, as well as how to  handle the caller

2
Vishing Resources
3
Vishing Quiz

Let's test your knowledge on Vishing!

Ransomware

1
Ransomware

You will be learning about all of the recent ransomware attacks you may have heard about in the news, and why they are so effective in forcing their victims to hand money over to the hackers. You will see various examples of what they look like, and most importantly, how to prevent being a ransomware victim

2
Ransomware Resources
3
Ransomware Quiz

Let's test your knowledge of ransomware!

Cryptomining

1
Cryptomining

In this eye-opening lecture, you will learn, in simple terms, all about what cryptomining  (or 'cryptojacking' as we call it in the Security industry), and why hackers have gravitated to it to make money by socially engineering us. You will visually see some examples of various cryptomining attack, and learn how to prevent yourself from being a victim of such an attack. We will also discuss some common ways of detecting if it is running on your system.

2
Cryptomining Resources
3
Cryptomining Quiz

Let's test your knowledge of Cryptomining!

Red Flags

1
Social Engineering Red Flags

You will revisit, and discuss again, all the major social engineering red flags that you can spot in targeted phishing emails, texts and phone calls, as well as social engineering attacks in general. You will understand the main emotions that social engineers try to invoke in you, to make you do what they want. You will go over, in detail, how to detect, and respond accordingly, to a phishing attack against you

2
Social Engineering Red Flags Quiz

Let's test your knowledge about social engineering red flags!

Search Engine Optimization

1
Search Engine Optimization

You will learn how your trust for popular search engines is being exploited, so that hackers can deliver malware to your system, phish you for your credentials, as well as social engineer you into handing over your private information. You will see some examples of these attacks in real life, as well as examples of Google's AdWords service being manipulated to serve you malicious webpages. You will also discover different ways to defeat 'black-hat search engine optimization' as it is commonly known.

2
Quiz about Search Engine Optimization

Let's test your knowledge of Black-Hat SEO!

Banking Trojan

1
Banking Trojan

You will learn what Banking Trojans are, a common type of cyber attack that effectively depletes your bank accounts of funds. We will then discuss the various ways you can be infected with a Banking Trojan, as well as what you can do if you suspect you have been infected with a banking Trojan


2
Quiz about Banking Trojan

Let's test your knowledge about Banking Trojans!

Fake AntiVirus

1
Fake AntiVirus

You will learn about Fake AntiVirus, a very effective and successful method of socially engineering people into handing over their credit card details, by presenting them with fake anti-virus alerts. You will be visually presented with several real-world examples, and then you will be taught some of the red flags to spot these fraudulent attempts at socially engineering you for your money

2
Quiz about Fake AntiVirus

Let's test your knowledge about Fake AntiVirus!

Apple

1
Apple Part I

You will learn about the general security around Apple computers. You will also learn why Apple operating systems can be very secure most of the time, but can sometimes be JUST as insecure as other computers. In addition, you will be presented with some of the common cyber attacks that can affect the Apple platform

2
Apple Part II

You will be presented with some of the main ways in which Apple protects you from evilness on the Internet, as well as some general things you can do to protect yourself whilst using a Mac computer

3
Apple Resources
4
Quiz about Apple Macs

Let's test your knowledge on Apple computers!

Smartphones and Mobile Apps

1
Smartphones and Mobile Apps Part I

In Part I of this module, you will learn the general differences in security between iPhones and Androids, and why Androids can have some serious security issues that need to be addressed

2
Smartphones and Mobile Apps Part II

In Part II, you will learn how hackers are uploading malicious apps into the Google Play Store, and we will discuss the major red flags to take note of, when you are considering downloading an app onto your mobile device. You will also be visually presented with real-world examples of malicious apps that exploit app permissions, as well as malicious 3rd party app stores.

3
Smartphones and Mobile Apps Part III

In Part III, you will learn some great solutions that Google has put in place, to protect you from the bad guys when you are using an Android device. We will also discuss Google Play Protect, and how it is designed to help you detect and remove malicious apps from your phone

4
Smartphones and Mobile Apps Part IV

In Part IV, you will learn about security on Apple iPhones, and why they are generally more secure than Android phones. You will also be shown various settings on the phone that Apple has in place to protect you from malicious apps, and some things you can do to lock down your mobile device

5
Smartphone & Mobile App Resources
6
Quiz about Smartphones and Mobile Apps

Let's test your knowledge about Smartphones and Mobile Apps!

Password Management

1
Password Management

In this funny video, you will understand the major (and sometimes annoying) issues around password management. This includes how to keep track of ALL of your passwords in a secure manner, and why sharing weak passwords across multiple websites is something you need to address today. You will then be introduced to some  solutions on how to create GREAT passwords, using passphrases, and how to store them with you securely on all of your devices

2
Password Management Resources
3
Quiz about Password Management

Let's test your knowledge on password management!

2-Factor Authentication

1
2-Factor Authentication Part I

In this 2-part eye-opening video module, you will learn all about wonderful 2-Factor Authentication: an excellent solution for preventing hackers hijacking your account! The term 2FA will be explained in simple terms, and then you will be visually guided, using step-by-step instructions, on how to set up 2FA for popular websites such as Facebook.  You will also understand why 2FA also greatly helps mitigate the risks with using the same weak passwords across websites

2
2-Factor Authentication Part II

In part 2 of this eye-opening video module, you will learn about the various types of 2FA, and in particular about the highly respected security keys, which all 85000 of Google's employees have been using lately, and which has stopped 100% account hijacking! You will also be taught how easy it is to set up, and valuable security keys are to your account security

3
2-Factor Authentication Resources
4
Quiz about 2-Factor Authentication

Let's test your knowledge on 2FA!

Browser Security

1
Browser Security Part I

In part 1 of this video series, you will be presented with the main security issues when it comes to using the major browsers on the market today. You will learn about invasive and dangerous things such as browser scripts, trackers, cookies and fake browser updates

2
Browser Security Part II

In part 2 of this video series, you will be trained on the issues surrounding Java and Flash running in your browser, as well as malicious browser extensions that can take over your browser, and even your computer! Next, we will discuss the privacy and security strengths/weaknesses of the major browsers such as Safari, Edge, Chrome, Firefox and Brave.

3
Browser Security Part III

In part 3 of this fact-filled video series, you will again be shown, using visual examples, all the different ways you can securely lock down your browser from the bad guys, as well as invasive marketing companies that want to track your browsing habits! You will be presented with some awesome solutions for blocking trackers, ads, scripts and malicious code that can secretly run inside your browser.

4
Browser Security Part IV

In part 4 of this module, you will continue to learn some really good browser settings that can protect your privacy and security on the Internet. We discuss browser scripts in depth, how they work, why some are very bad for you, and how you can shut these malicious scripts in their tracks using a few very useful browser addons. You will also see how you can browse securely, and privately, on the web using your mobile device.

5
Browser Security Resources
6
Quiz about Browser Security

Let's test your knowledge on browser security!

Internet Data Privacy

1
Internet Data Privacy

In this video, you will be presented with the main issues around the industrial-level analysis, and trading of our private data, by certain browsers, marketing firms and tech companies. You will come to understand that nothing is really for free on the Internet, and when you are using popular free services on the Internet (such as email and social media), that much of your behavior/interests/habits are being analyzed and profiled for future advertising. You will also be presented with some great solutions to keep your Internet browsing somewhat private, and be able to see for yourself what data is being collected about you when your use these services.

2
Internet Data Privacy Resources
3
Quiz about Internet Data Privacy

Let's test your knowledge on Internet Data Privacy!

Social Media

1
Social Media

In this hilarious video, you will learn how social media websites are the perfect platform for downloading malware, and being scammed into parting with our private and sensitive information. You will be shown real-world examples of funny (and sometimes worrisome scams being posted), you will also learn the red flags to spot in the future whenever you come across these types of fraudulent posts on social media.

2
Quiz about Social Media

Let's test your knowledge on Social Media!

Disinformation

1
Disinformation

In this controversial module, you will see actual images on social media, of how nation states, and ideologues, have exploited the platform to spread misinformation/false news. You will understand how these campaigns have been so effective and successful in socially engineering our minds. You will also learn how social media companies are developing new solutions to tackle this serious issue, and how they are working to protect us. Just as important, we will discuss why all of this is significant from a cyber security perspective!

2
Quiz about Disinformation

Let's test your knowledge on Disinformation!

Identity Theft

1
Identity Theft

In this interesting module, you will learn how devastating the Equifax hack was for most of us, and how our personal data is most likely already on the Dark Web and in the hands of hackers and fraudsters. You will then be shown how you can protect your credit profile, with some really amazing and easy solutions you can implement in minutes, in light of all the large data breaches that have occurred in recent years

2
Identity Theft Resources
3
Quiz about Identity Theft

Let's test your knowledge on Identity Theft!

GDPR

1
GDPR

In this presentation, you will learn about all of the great data privacy rights we now have with GDPR regulation in the EU. You will be taught the main rules around GDPR that are forcing Internet companies to handle your private data securely, and how it can help protect US citizen data as well from prying hands. You will also understand the serious implications if customer data is not strictly handled according to GDPR.

You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don`t have an internet connection, some instructors also let their students download course lectures. That`s up to the instructor though, so make sure you get on their good side!
4.6
4.6 out of 5
65 Ratings

Detailed Rating

Stars 5
45
Stars 4
14
Stars 3
4
Stars 2
3
Stars 1
0