17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
Language: English | Size: 635.27 MB | Duration: 2h 1m
Techniques for protecting passwords, foiling social engineering, defeating ransomware, safe browsing, & mobile security.
What you'll learn
Understand the importance of using strong and unique passwords and recognize weak passwords.
Learn how to implement two-factor authentication for online accounts.
Understand the use of password managers to securely store and manage passwords.
Understand the online cyber security risks associated with Personally Identifying Information (PII).
Learn about common methods used to steal PII such as social engineering and phishing.
Be able to identify and avoid phishing emails and SMS, as well as common scams such as gift card and tech support scams.
Understand the risks associated with malware, including ransomware, and how to safeguard against these cyber threats.
Learn how to secure your web browser and safe browsing habits.
Learn techniques for protecting yourself while shopping online.
Learn about the importance of securing your mobile device and how to do so.
Learn about the importance of protecting your home Wi-Fi network and how to do so.
Learn about the benefits of using a VPN to protect your online activity.
Requirements
There are no specific requirements or prerequisites for taking this course. All that is needed is a computer or device with an internet connection and the desire to learn how to protect your personal and company information online.
If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com
Get More Tutorials and Support Us -->> https://FreeCourseWeb.com
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
~Get Your Files Here !/1 - Introduction/1 - Protect Yourself Online A Cyber Security Awareness Course.mp4
24.4 MB
~Get Your Files Here !/2 - Keeping Your Login Credentials Safe/2 - Intro.mp4
2 MB
~Get Your Files Here !/2 - Keeping Your Login Credentials Safe/3 - Unlocking the Secrets to Strong and Secure Passwords.mp4
23.8 MB
~Get Your Files Here !/2 - Keeping Your Login Credentials Safe/4 - Step-by-step-guide-on-how-to-enable-2FA.pdf
132.4 KB
~Get Your Files Here !/2 - Keeping Your Login Credentials Safe/4 - TwoFactor Authentication 2FA Doubling Down on Security.mp4
23 MB
~Get Your Files Here !/2 - Keeping Your Login Credentials Safe/5 - Best Practices for Creating Effective Security Questions.mp4
4.7 MB
~Get Your Files Here !/2 - Keeping Your Login Credentials Safe/6 - Choosing-a-Password-Manager-Handout.pdf
102.5 KB
~Get Your Files Here !/2 - Keeping Your Login Credentials Safe/6 - Password Managers Your Personal Assistant to Better Security.mp4
20.8 MB
~Get Your Files Here !/3 - Addressing Social Engineering and Malware Threats/10 - RealLife and Simulated Examples of Phishing in Action.mp4
37.3 MB
~Get Your Files Here !/3 - Addressing Social Engineering and Malware Threats/11 - Understanding and Avoiding Tech Support and Gift Card Scams.mp4
19.5 MB
~Get Your Files Here !/3 - Addressing Social Engineering and Malware Threats/12 - Understanding URLs and Domain Names.mp4
30.5 MB
~Get Your Files Here !/3 - Addressing Social Engineering and Malware Threats/13 - Defending Against Malware and Ransomware.mp4
38.4 MB
~Get Your Files Here !/3 - Addressing Social Engineering and Malware Threats/13 - Enable-your-firewall-on-Mac-Handout.pdf
84.4 KB
~Get Your Files Here !/3 - Addressing Social Engineering and Malware Threats/7 - Ensuring the Confidentiality of Personally Identifiable Information PII.mp4
22.8 MB
~Get Your Files Here !/3 - Addressing Social Engineering and Malware Threats/8 - Unmasking Social Engineering Tactics Threats and Solutions.mp4
40.2 MB
~Get Your Files Here !/3 - Addressing Social Engineering and Malware Threats/9 - The Danger of Phishing How to Spot and Avoid It.mp4
27.3 MB
~Get Your Files Here !/4 - Staying Safe While Browsing and Shopping Online/14 - Enable-automatic-updates-in-Firefox-Chrome-Safari.pdf
96.5 KB
~Get Your Files Here !/4 - Staying Safe While Browsing and Shopping Online/14 - Protecting Your Web Browser.mp4
46.1 MB
~Get Your Files Here !/4 - Staying Safe While Browsing and Shopping Online/15 - An Insight into Web Cookies and Privacy.mp4
21.8 MB
~Get Your Files Here !/4 - Staying Safe While Browsing and Shopping Online/16 - Exploration of Browser History and Privacy.mp4
21.2 MB
~Get Your Files Here !/4 - Staying Safe While Browsing and Shopping Online/17 - Evaluating the Security of a Website.mp4
26.9 MB
~Get Your Files Here !/4 - Staying Safe While Browsing and Shopping Online/18 - Protecting Yourself When Shopping Online.mp4
21.2 MB
~Get Your Files Here !/5 - Securing Your Mobile Device Recognizing Common Scams/19 - Securing Your Mobile Devices.mp4
64 MB
~Get Your Files Here !/5 - Securing Your Mobile Device Recognizing Common Scams/20 - How to Spot and Avoid Common Mobile Scams.mp4
29 MB
~Get Your Files Here !/6 - Protecting Your Home WiFi Internet Connection/21 - Securing Your Home WiFi network.mp4
52.4 MB
~Get Your Files Here !/6 - Protecting Your Home WiFi Internet Connection/22 - Using Virtual Private Network VPN.mp4
37.4 MB
~Get Your Files Here !/6 - Protecting Your Home WiFi Internet Connection/22 - Which-VPN-should-you-use.pdf