Tags
Language
Tags
May 2024
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Insider Secrets To Internet Safety Masterclass

Posted By: ELK1nG
Insider Secrets To Internet Safety Masterclass

Insider Secrets To Internet Safety Masterclass
Published 4/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 5.91 GB | Duration: 6h 6m

Digital Security Essentials: Password Strength, Social Media Safety, Threat Detection, and Fraud Prevention

What you'll learn

Learners will gain an in-depth understanding of the current cyber threat landscape, including the types of cybercrimes prevalent today

Participants will learn how to implement robust cyber defense strategies to protect their personal and professional digital environments

Learners will be trained on the steps to take when responding to a cyber incident.

Upon completion, learners will be capable of promoting a culture of cyber awareness and safety within their communities, families, and workplaces.

Requirements

Participants should be comfortable using a computer, navigating the internet, and performing common online tasks such as browsing websites, using email, and accessing social media platforms

Description

In a world of digital technology, it is easy to forget one sobering fact: our identity can be stolen from under our nose, with one click of the mouse, propelling us into nightmares in a matter of minutes, anytime, anywhere and on any one of our darling gadgets. Hackers, malware, botnets and all form of digital threats are ever more sophisticated, waiting in the shadows for that one opportunity to steal your sensitive information.Terry Cutler, A Certified Ethical Hacker and international award winner reminds us of just how vulnerable our data really is, through chilling real-life stories, such as that of a simple USB key left purposefully behind, in any targeted enterprise’s lavatory, where an unsuspecting (albeit good-willed) employee can just pick it up, plug it in and thus, lead the hackers right into the company’s core data.Terry’s training will teach you how to· Easily come up with an undecipherable password· How to secure your information on social media· How to detect threats· How to identify frauds· How to find out what personal information about yourself is floating on the webBut he reminds us that no matter how stringent our defenses are, there are no silver bullets against cyber crooks and that a computer’s security is only as strong as its weakest link. That weak link is usually human error.Come and crack the code in this course.

Overview

Section 1: Securing Your Digital Life: Recognizing & Dodging Internet Dangers

Lecture 1 Dangers Of The Internet

Lecture 2 Are you a Target of a Cybercriminal?

Lecture 3 How to Secure Your Digital Life

Section 2: Welcome to the Internet Safety University MasterClass

Lecture 4 Introduction

Section 3: Module 1 - Why and how hackers and scammers are picking you Individual

Lecture 5 Why and how hackers and scammers are picking you Individual

Section 4: Module 02: How to Tighten Your Computer’s Security

Lecture 6 Introduction

Lecture 7 Installing and maintaining antivirus software for PC and Mac

Lecture 8 M2-2 - Enabling Automatic Updates on Windows

Lecture 9 M2-3 - Installing and maintaining antivirus software

Lecture 10 M2-4 - Securing Your PC like a Mac

Lecture 11 M2-5 - Physically protecting your computer from threats

Lecture 12 M2-6 - How to create an unbreakable password

Lecture 13 M2-7 - Updating and Securing Safari browser

Section 5: Module 3 How to stay safe and protect yourself from hackers and scammers online

Lecture 14 M3-2 - How to clean up your email account after it was hacked

Lecture 15 M3-3 - Dangers of Quizes and Status Updates

Lecture 16 M3-4 - Setting up 2FA for Facebook

Lecture 17 M3-5 - Setting up 2FA for iCloud

Lecture 18 M3-6 - Setting up 2FA for PayPal

Lecture 19 M3-7 - Setting up 2FA for LinkedIn

Lecture 20 M3-8 - Setting up 2FA for Instagram

Lecture 21 M3-9 - Fake Profiles and Dating Sites

Lecture 22 M3-10 - How to Google Yourself

Lecture 23 M3-11 - Google Chrome Password manager

Lecture 24 M3-11 - Google Chrome Password manager

Lecture 25 M3-12 - Microsoft Edge Password Manager

Section 6: Module 4 - Most Popular Internet Scams

Lecture 26 M4-1 - Most Popular Internet Scams Video 1

Lecture 27 M4-2 - Most Popular Internet Scams Video 2

Lecture 28 M4-3 - Most Popular Internet Scams Video 3

Lecture 29 M4-4 - Most Popular Internet Scams Video 4

Lecture 30 M4-5 - Most Popular Internet Scams Video 5

Lecture 31 M4-6 - Most Popular Internet Scams Video 6

Lecture 32 M4-7 - Most Popular Internet Scams Video 7

Lecture 33 M4-8 - Most Popular Internet Scams Video 8

Lecture 34 M4-9 - Most Popular Internet Scams Video 9

Lecture 35 M4-10 - Most Popular Internet Scams Video 10

Lecture 36 M4-11 - Most Popular Internet Scams Video 11

Lecture 37 M4-12 -Most Popular Internet Scams Video 12

Lecture 38 M4-13 -Most Popular Internet Scams Video 13

Lecture 39 M4-14 -Most Popular Internet Scams Video 14

Lecture 40 M4-15 -Most Popular Internet Scams Video 15

Lecture 41 M4-16 -Most Popular Internet Scams Video 16

Lecture 42 M4-17 -Most Popular Internet Scams Video 17

Lecture 43 M4-18 -Most Popular Internet Scams Video 18

Lecture 44 M4-19 -Most Popular Internet Scams Video 19

Lecture 45 M4-20 -Most Popular Internet Scams video 20

Lecture 46 M4-21 -Most Popular Internet Scams video 21

Section 7: Module 5 - Ransomware Survival Guide

Lecture 47 M5-1 - Ransomware Survival Guide - For Non-Technical Users

Section 8: Module 6 - Small to Medium Size Business Security

Lecture 48 M6-1 - Small to Medium Size Business Security Video 1

Lecture 49 M6-2 - Small to Medium Size Business Security Video 2

Lecture 50 M6-3 - Small to Medium Size Business Security Video 3

Lecture 51 M6-4 - Small to Medium Size Business Security Video 4

Section 9: Module 7 - Internet safety for kids

Lecture 52 M7-1 - Internet safety for kids part 1

Lecture 53 M7-2 - Internet safety for kids part 2

Lecture 54 M7-3 - Internet safety for kids part 3

Lecture 55 M7-4 - Internet safety for kids part 4

Lecture 56 M7-5 - How hard is it to target you or your kid online

Lecture 57 M7-6 - Online Gaming Safety For Kids

Lecture 58 M7-7 - Acronyms And Abbreviations

Lecture 59 M7-8 - How pimps recruit kids over social media

Individuals who use the internet regularly for personal activities, such as browsing, shopping online, using social media, and emailing, who want to ensure their activities are secure from cyber threats,Those responsible for children and want to ensure their family's online activities are safe and protected from potential cyber dangers.,Entrepreneurs and small business owners who need to protect their business data and customer information from cybercriminals without having a dedicated cybersecurity team.,Individuals working remotely or in an office setting who want to secure their work and personal data against cyber attacks, especially those dealing with sensitive information.,Teachers and students interested in learning about cybersecurity to both apply this knowledge in their personal digital lives and incorporate it into educational settings for the benefit of others.,Professionals outside the IT and cybersecurity fields who want to gain a better understanding of internet safety practices to safeguard their digital presence.,Senior Citizens who are looking for guidance on how to navigate the web safely and protect themselves from scams and frauds targeted at their demographic.