1m Cyber Security Awareness

Learn to Spot Targeted Email Phishing, Social Engineering Attacks, Hacker Tactics, Browser & Mobile Threats & Much More

Last updated 2022-01-10 | 4.6

- You will be trained
- on all the ways hackers can socially engineer you
- through email
- text
- calls
- browsing
- files
- mobile phones
- connected home devices etc
- You will know the human emotions that hackers like to trigger
- to trick you into giving them access to your money
- personal accounts
- systems & company network
- You will stop successful social engineering attacks
- by spotting red flags in phishing emails
- text messages and phone calls

What you'll learn

You will be trained
on all the ways hackers can socially engineer you
through email
text
calls
browsing
files
mobile phones
connected home devices etc
You will know the human emotions that hackers like to trigger
to trick you into giving them access to your money
personal accounts
systems & company network
You will stop successful social engineering attacks
by spotting red flags in phishing emails
text messages and phone calls
Learn how to securely configure your browser to block malicious scripts
cookies
trackers etc. as well as maintain good privacy/anonymity on the Internet
You will be well versed on how to securely use Windows
Apple Macs
iPhones
Androids etc
You will be visually guided on how to effectively and efficiently manage all your passwords
You will be shown proven and effective cyber security software to keep your systems private and secure
You will confidently manage your emails
business files
computers
mobile devices and Internet browsing
You will feel safe
secure
and private on the Internet

* Requirements

* Be ready to have a good time learning!
* You do not need ANY PRIOR KNOWLEDGE or experience of Cyber Security to take this course!
* A keen interest and excitement in protecting yourself
* your family and your business from the bad guys

Description

  • Are you worried about hackers social engineering you for your sensitive files, emails, or access to your computer or network?

  • Are you scared your company passwords will be stolen?

  • Are you anxious about being a victim of identity theft?


  • Do you want to learn cyber security awareness and online self defense to protect yourself?

  • Do you want to be taught in an engaging, memorable  and effective way, how to securely manage all your sensitive emails, files, passwords, mobile phones, and browsing?



  • Do you want to know how, where, and most importantly why you would be targeted?

  • Do you want to feel safe, secure, and private on the Internet?


Then this is the PERFECT course for you!

And you are going to love it.


I designed this '1:M Cyber Security' beginners course for company employees, and home users, looking for engaging, memorable  and effective cyber security awareness training!

This course is designed to teach you the BASICS of cyber security awareness, social engineering, network security and online self defense, even if you have no IT / Cyber Security experience or knowledge.

What makes my course different, is that I speak passionately from the heart, using visuals, humor and storytelling throughout the training, to make it engaging, memorable  and effective! The training is literally 98% real world images and examples!

You will love watching the modules, because the curriculum is comprehensive enough to give you all the information you need to stay safe, secure and private on the Internet, and presented to you in a simple and entertaining way.

And while the content is presented in VERY simple terms, everyone, (even people with IT/Cyber Security skills) could learn from this course, because to be frank, ANYONE can being socially engineered these days (even including experts in the IT industry sometimes).

Furthermore, the entire time I was recording in studio, I kept thinking to myself “how can I make this material really fun and interesting??” I really tried to put myself in the mind of my students, so that I could present the information in a way that you would find interesting and engaging.


What students are saying about this course:


-----------------------------------------------------------

★★★★★  Engaging & interesting!

"This is the greatest Security Awareness training I have ever attended. The presenter made me feel like I was in the room with him. He was extremely personable and knowledgeable."  - Terrie

-----------------------------------------------------------
★★★★★ Great instructing!

I think...one of the best instructors I have found on Udemy. Good tone, easy to follow along. The presentations are visually appealing, superb body language and don't complicate things. Reza knows what he is talking about! - Nicholas

-----------------------------------------------------------

★★★★★  Fantastic course!

"The information presented, is clear, concise. Well thought out. The presenter is very knowledgeable and engaging in his delivery style. First class course." - Shaun

-----------------------------------------------------------

★★★★★

Very good material for beyond just introductory. There are a lot of quizzes which really are well thought out and challenge the thinking and the understanding. A huge amount of additional resources also accompany the material. - Harold

-----------------------------------------------------------

★★★★★  Incredible!

"A cyber security course that is IMMEDIATELY useful, and fun to watch!" - Andrew

-----------------------------------------------------------

★★★★★  Amazing course!

I have learned a lot and specially how to protect myself online. Great speaker with really good and catchy explanations! Recommended 100% - Ana

-----------------------------------------------------------

★★★★★

"Very excellent course. I will keep it close and watch over and over again" - Olukayode

-----------------------------------------------------------

★★★★★  Very relevant!

"I liked that there were screen shots of actual attacks, with the red flags highlighted as its being discussed." - Heather

-----------------------------------------------------------

★★★★★

"Extremely valuable information security course. Everyone should attend!" - Michal

-----------------------------------------------------------

★★★★★

"You do an amazing job of communicating technical content in a non-technical way. A participant could be 8 or 80 and the course material would be understood with your approach" - Richard

-----------------------------------------------------------

★★★★★  Highly recommended!

"A fantastic speaker and compelling material!" - Pedro

-----------------------------------------------------------

★★★★★ "Very informative course"

"Reza's style is very engaging and we also benefit from his decades long experience in the field" - Kaushik

-----------------------------------------------------------

★★★★★

"Brilliant course. Brilliant presenter." - Kevin

-----------------------------------------------------------

★★★★★  Sensational!

Provides very important tips. I recommend that everyone take this course. - Denis

-----------------------------------------------------------

★★★★★ Far more interesting than I expected!

"The instructor's knowledge and engaging manner added a level of entertainment. The flow and consistency made this an excellent training." - Jennifer

-----------------------------------------------------------

★★★★★ This was a great course!

"I learned a lot, was a good pace, excellent presentation by Reza and quizzes helped with enforcing the learning" - Lorraine

-----------------------------------------------------------

★★★★★

"The simplicity with which it is told is amazing "- Radha

-----------------------------------------------------------

★★★★★

"Explanations are crystal clear and concise. Information is presented in such a way that it is easy to remember. Instructor has a lot enthusiasm!" - Chris

-----------------------------------------------------------

★★★★★ Great content!

"A thorough but easy explanation that even someone who isn't tech savvy would understand. Thank you!" - Joseph

-----------------------------------------------------------


SOME BENEFITS OF TAKING MY COURSE:

  • You will receive really engaging, memorable  and effective security awareness training!

  • You won’t spend hours looking at boring PowerPoint slides!

  • I intentionally cut out all the technical jargon, so that you are trained in simple plain English

  • Most of what you will learn can be applied both at home, and at work

  • This course is based on the real world, drawing on my 18 years of experience on the cyber front lines

  • I have successfully trained over 55,000 people in the past, with very positive feedback

  • You will receive a 50-page SUPPLEMENTAL TRAINING GUIDE PDF that has ALL the training material, and much more, written as notes for you to download

  • You will feel confident, and empowered to protect your personal, family and company data from the bad guys

  • And remember, if for any reason you're not happy with the course (which would make me sad!) you have a 30-day money back guarantee


CONTENTS AND OVERVIEW

This course has 40 brand new '1:M Cyber Security' training videos, covering over 29 cyber security subjects. It’s me in front of the camera, speaking passionately from the heart, and talking directly to you about the biggest cyber security threats facing you today.

It’s packed with the latest tricks hackers and scammers are using to social engineer you for your data, money and secrets.

You will start by seeing numerous VISUAL examples of targeted phishing emails, and be taught in detail how to recognize the major red flags, so that you can READILY detect these emails in the future.

Next we will cover some common ways that business and corporations are hacked and defrauded, via things such as malicious Macros, BEC Fraud scams, Ransomware attacks and more.

We will also cover social engineering attacks that use your mobile phone to trick you into paying money or giving your secrets away. You will also be presented with many different social engineering attacks on the Internet, so you can see how easily people can be preyed upon using their sneaky methods.

You will be shown how search engines such as Google are exploited for evil purposes. You will be taught what Banking Trojans are, a common type of cyber attack that effectively depletes your bank accounts of funds. Furthermore, you will learn about Fake Antivirus, a very effective and successful method of socially engineering people into handing over your credit card details.

You will understand why Apple devices can be secure most of the time, but can sometimes be JUST as insecure as other computers, as well as some general things you can do to protect yourself whilst using a Mac computer. You will become well versed in the general differences in security between iPhones and Androids, some of their main security features, how to avoid downloading malicious apps, and much more.

Then we will spend some time covering the major issues, as well as effective solutions, around password management and 2-Factor Authentication.

Next, you will be visually presented with the main privacy/security issues as well as solutions, when it comes to using browsers, and social media platforms such as Facebook. We will also be discussing how nation states have spread misinformation/false news using these platforms. Moreover, we will do a deep dive into the significance of Internet data privacy, the buying/selling of your private data, and the prevention of identity theft.

You will then be taught what encryption is, why it is so very important to enforce security and privacy, and common encryption solutions you can use both at home, and at work. You will learn all about the major security issues involving IoT 'Internet of Things' / home connected devices, and be visually guided on how you can secure your home devices and networks to keep the bad guys at bay.

Finally, we will review for you again all the great cyber security solutions presented in the training, plus even more cool tips 'n tricks on how to protect yourself when using computers, smartphones and the Internet.


                                                             ===========


I promise, that by the end of this course, you will  CONFIDENTLY, SAFELY and SECURELY manage emails, files, mobile phones, computers, and browse the Internet - both for yourself, your family and your company.


Enroll now! I can't wait to see you in the course...


-Reza


Who this course is for:

  • I created this beginners course for employees in a business or corporation, who wants to be trained on how to protect their sensitive customer data and network from hackers
  • This course is ideal for employees that need to be trained as part of annual Cyber Security Awareness Training requirements
  • I also wrote this course for any home computer users who are worried about being socially engineered by hackers for their emails, sensitive files, and passwords
  • Someone who wants to browse the Internet securely and privately, and not be tracked by marketing companies when on the Internet
  • It is PERFECT for complete beginners (with little experience or skills in IT/ Cyber Security), but who want to learn basic cyber security awareness in a non-technical way
  • Someone who doesn’t necessarily WORK as a cyber security professional, but wants to be SKILLED in cyber security awareness
  • However, ANYONE (even people skilled in IT) will benefit from, and enjoy this course!

Course content

29 sections • 84 lectures

Greetings from your instructor Reza Preview 01:24

Welcome to the training guys! Here is a brief video introducing 1:M Cyber Security, and why this course is the most effective, entertaining and memorable cyber security awareness training you will take! You will learn a little about me as your instructor, and what you should expect to feel, see and learn during this security awareness training course

IMPORTANT - Please Read Preview 00:56

Practical Training Guide & Resource Files Preview 00:11

Please feel free to download this Practical Training Guide. It includes all the material you are about to watch, numerous practical/actionable steps you can implement ASAP, plus much more! I wanted to make sure you don't stress about having to take a ton of notes, so you can sit back and enjoy the training :)

How Hard Is It To Get Hacked? Preview 02:35

You will learn how hard it has become to hack into systems and company networks these days

How Hard Is It To Get Hacked Quiz?

Targeted Email Phishing Part I Preview 04:44

In Part I of this engaging module, you will learn how targeted email phishing is executed against you, as well as recognize some of the major red flags to be able to readily detect these emails in the future

Targeted Email Phishing Part II Preview 01:32

In Part II of this engaging module, you will continue to see new examples of targeted phishing emails, and to recognize some of the major red flags in them

Targeted Email Phishing Part III Preview 04:09

In Part III of this module, you will continue to see a number of ways in which hackers and scammers are social engineering us, via emails and webpages.  Even more major red flags are exposed, so that these now become ingrained in our brains

Targeted Email Phishing Part IV Preview 12:44

In Part IV of this entertaining module, you will learn the common patterns in all common social engineering attacks, how these are all very similar, and how they can be caught easily

Phishing Resources Preview 02:33

Targeted Email Phishing & Social Engineering Quiz

Let's test your knowledge on targeted email phishing, & social engineering! And because this happens to be one of THE most important sections of this entire training, I added some extra questions to REALLY drive home some very crucial points for you!

Please Leave a Review and Feedback Preview 01:01

PLEASE LEAVE A REVIEW

When prompted, please take a quick moment to leave an honest rating and review about my course!

Your feedback is important, both for me as the instructor, as well as future students to select the right course on Udemy.

I want the best possible experience for you as my student, so please let me know if for any reason you are not happy.

I look forward to hearing about your experience...

Macro Malware Preview 04:01

You will learn all about Macro malware, why they are so popular, having become a go-to means of infiltrating a computer in devastating fashion. You will also learn how to easily spot malicious macros, as well as protect yourself against them

Macro Malware Resources Preview 00:37

Macro Malware Quiz

Let's test our knowledge on macro malware!

Business Email Compromise Preview 06:06

In this interesting module, you will learn about Business Email Compromise attacks, also known as 'CEO Fraud'. You will visually see how they trick us into initiating large wire transfers, what the red flags are, and then you will learn how to stop these dangerous attacks right in their tracks!

Business Email Compromise Quiz

Lets test your knowledge on Business Email Compromise!

Messaging Preview 01:34

In this revealing video, you will learn how similar and effective Messaging attacks are to other common social engineering methods. You will also learn how they use some of the very same tactics as used in phishing emails to hack you

Messaging Quiz

Let's test your knowledge on Messaging!

Smishing Preview 04:07

In this funny video module, you will learn about the sneaky art of social engineering using SMS text messaging on your mobile device. You will be shown examples of Smishing, and we will discuss the red flags that can be easily spotted in these attacks. You will also learn what to do when you receive such fraudulent SMS text messages

Smishing Resources Preview 00:15

Smishing Quiz

Let's test your knowledge on Smishing!

Vishing Preview 05:13

In this entertaining module, you will learn how scammers are social engineering us by spoofing Caller ID numbers, and calling us on our phones, asking for money, personal information or access to our computers. You will be played several audio tracks of actual Vishing attacks, so you can hear for yourself what they sound like (chances are, you may have received one lately yourself). Then we will explain some common red flags that can be easily spotted when you receive such calls, as well as how to  handle the caller

Vishing Resources Preview 00:20

Vishing Quiz

Let's test your knowledge on Vishing!

Ransomware Preview 04:25

You will be learning about all of the recent ransomware attacks you may have heard about in the news, and why they are so effective in forcing their victims to hand money over to the hackers. You will see various examples of what they look like, and most importantly, how to prevent being a ransomware victim

Ransomware Resources Preview 00:26

Ransomware Quiz

Let's test your knowledge of ransomware!

Cryptomining Preview 07:39

In this eye-opening lecture, you will learn, in simple terms, all about what cryptomining  (or 'cryptojacking' as we call it in the Security industry), and why hackers have gravitated to it to make money by socially engineering us. You will visually see some examples of various cryptomining attack, and learn how to prevent yourself from being a victim of such an attack. We will also discuss some common ways of detecting if it is running on your system.

Cryptomining Resources Preview 00:32

Cryptomining Quiz

Let's test your knowledge of Cryptomining!

Social Engineering Red Flags Preview 05:06

You will revisit, and discuss again, all the major social engineering red flags that you can spot in targeted phishing emails, texts and phone calls, as well as social engineering attacks in general. You will understand the main emotions that social engineers try to invoke in you, to make you do what they want. You will go over, in detail, how to detect, and respond accordingly, to a phishing attack against you

Social Engineering Red Flags Quiz

Let's test your knowledge about social engineering red flags!

Search Engine Optimization Preview 07:19

You will learn how your trust for popular search engines is being exploited, so that hackers can deliver malware to your system, phish you for your credentials, as well as social engineer you into handing over your private information. You will see some examples of these attacks in real life, as well as examples of Google's AdWords service being manipulated to serve you malicious webpages. You will also discover different ways to defeat 'black-hat search engine optimization' as it is commonly known.

Quiz about Search Engine Optimization

Let's test your knowledge of Black-Hat SEO!

Banking Trojan Preview 03:10

You will learn what Banking Trojans are, a common type of cyber attack that effectively depletes your bank accounts of funds. We will then discuss the various ways you can be infected with a Banking Trojan, as well as what you can do if you suspect you have been infected with a banking Trojan


Quiz about Banking Trojan

Let's test your knowledge about Banking Trojans!

Fake AntiVirus Preview 02:00

You will learn about Fake AntiVirus, a very effective and successful method of socially engineering people into handing over their credit card details, by presenting them with fake anti-virus alerts. You will be visually presented with several real-world examples, and then you will be taught some of the red flags to spot these fraudulent attempts at socially engineering you for your money

Quiz about Fake AntiVirus

Let's test your knowledge about Fake AntiVirus!

Apple Part I Preview 04:10

You will learn about the general security around Apple computers. You will also learn why Apple operating systems can be very secure most of the time, but can sometimes be JUST as insecure as other computers. In addition, you will be presented with some of the common cyber attacks that can affect the Apple platform

Apple Part II Preview 05:10

You will be presented with some of the main ways in which Apple protects you from evilness on the Internet, as well as some general things you can do to protect yourself whilst using a Mac computer

Apple Resources Preview 00:30

Quiz about Apple Macs

Let's test your knowledge on Apple computers!

Smartphones and Mobile Apps Part I Preview 04:15

In Part I of this module, you will learn the general differences in security between iPhones and Androids, and why Androids can have some serious security issues that need to be addressed

Smartphones and Mobile Apps Part II Preview 04:44

In Part II, you will learn how hackers are uploading malicious apps into the Google Play Store, and we will discuss the major red flags to take note of, when you are considering downloading an app onto your mobile device. You will also be visually presented with real-world examples of malicious apps that exploit app permissions, as well as malicious 3rd party app stores.

Smartphones and Mobile Apps Part III Preview 01:18

In Part III, you will learn some great solutions that Google has put in place, to protect you from the bad guys when you are using an Android device. We will also discuss Google Play Protect, and how it is designed to help you detect and remove malicious apps from your phone

Smartphones and Mobile Apps Part IV Preview 02:47

In Part IV, you will learn about security on Apple iPhones, and why they are generally more secure than Android phones. You will also be shown various settings on the phone that Apple has in place to protect you from malicious apps, and some things you can do to lock down your mobile device

Smartphone & Mobile App Resources Preview 00:47

Quiz about Smartphones and Mobile Apps

Let's test your knowledge about Smartphones and Mobile Apps!

Password Management Preview 07:41

In this funny video, you will understand the major (and sometimes annoying) issues around password management. This includes how to keep track of ALL of your passwords in a secure manner, and why sharing weak passwords across multiple websites is something you need to fix TODAY. You will then be introduced to some solutions on how to create GREAT passwords, using passphrases, and how to store them with you securely on all of your devices

Password Management Resources Preview 00:32

Quiz about Password Management

Let's test your knowledge on password management!

2-Factor Authentication Part I Preview 08:45

In this 2-part eye-opening video module, you will learn all about wonderful 2-Factor Authentication: an excellent solution for preventing hackers hijacking your account! The term 2FA will be explained in simple terms, and then you will be visually guided, using step-by-step instructions, on how to set up 2FA for popular websites such as Facebook.  You will also understand why 2FA also greatly helps mitigate the risks with using the same weak passwords across websites

2-Factor Authentication Part II Preview 02:27

In part 2 of this eye-opening video module, you will learn about the various types of 2FA, and in particular about the highly respected security keys, which all 85000 of Google's employees have been using lately, and which has stopped 100% account hijacking! You will also be taught how easy it is to set up, and valuable 2FA security keys are to your account security

2-Factor Authentication Resources Preview 00:32

Quiz about 2-Factor Authentication

Let's test your knowledge on 2FA!

Browser Security Part I Preview 08:40

In part 1 of this video series, you will be presented with the main security issues when it comes to using the major browsers on the market today. You will learn about invasive and dangerous things such as browser scripts, trackers, cookies and fake browser updates

Browser Security Part II Preview 06:25

In part 2 of this video series, you will be trained on the issues surrounding Java and Flash running in your browser, as well as malicious browser extensions that can take over your browser, and even your computer! Next, we will discuss the privacy and security strengths/weaknesses of the major browsers such as Safari, Edge, Chrome, Firefox and Brave.

Browser Security Part III Preview 05:51

In part 3 of this fact-filled video series, you will again be shown, using visual examples, all the different ways you can securely lock down your browser from the bad guys, as well as invasive marketing companies that want to track your browsing habits! You will be presented with some awesome solutions for blocking trackers, ads, scripts and malicious code that can secretly run inside your browser.

Browser Security Part IV Preview 04:16

In part 4 of this module, you will continue to learn some really good browser settings that can protect your privacy and security on the Internet. We discuss browser scripts in depth, how they work, why some are very bad for you, and how you can shut these malicious scripts in their tracks using a few very useful browser addons. You will also see how you can browse securely, and privately, on the web using your mobile device.

Browser Security Resources Preview 01:05

Quiz about Browser Security

Let's test your knowledge on browser security!

Internet Data Privacy Preview 06:57

In this video, you will be presented with the main issues around the industrial-level analysis, and trading of our private data, by certain browsers, marketing firms and tech companies. You will come to understand that nothing is really for free on the Internet, and when you are using popular free services on the Internet (such as email and social media), that much of your behavior/interests/habits are being analyzed and profiled for future advertising. You will also be presented with some great solutions to keep your Internet browsing somewhat private, and be able to see for yourself what data is being collected about you when your use these services.

Internet Data Privacy Resources Preview 00:52

Quiz about Internet Data Privacy

Let's test your knowledge on Internet Data Privacy!

Social Media Preview 02:53

In this hilarious video, you will learn how social media websites are the perfect platform for downloading malware, and being scammed into parting with our private and sensitive information. You will be shown real-world examples of funny (and sometimes worrisome scams being posted), you will also learn the red flags to spot in the future whenever you come across these types of fraudulent posts on social media.

Quiz about Social Media

Let's test your knowledge on Social Media!

Disinformation Preview 07:20

In this controversial module, you will see actual images on social media, of how nation states, and ideologues, have exploited the platform to spread misinformation/false news. You will understand how these campaigns have been so effective and successful in socially engineering our minds. You will also learn how social media companies are developing new solutions to tackle this serious issue, and how they are working to protect us. Just as important, we will discuss why all of this is significant from a cyber security perspective!

Quiz about Disinformation

Let's test your knowledge on Disinformation!

Identity Theft Preview 03:26

In this interesting module, you will learn how devastating the Equifax hack was for most of us, and how our personal data is most likely already on the Dark Web and in the hands of hackers and fraudsters. You will then be shown how you can protect your credit profile, with some really amazing and easy solutions you can implement in minutes, in light of all the large data breaches that have occurred in recent years

Identity Theft Resources Preview 00:26

Quiz about Identity Theft

Let's test your knowledge on Identity Theft!

GDPR Preview 02:02

In this presentation, you will learn about all of the great data privacy rights we now have with GDPR regulation in the EU. You will be taught the main rules around GDPR that are forcing Internet companies to handle your private data securely, and how it can help protect US citizen data as well from prying hands. You will also understand the serious implications if customer data is not strictly handled according to GDPR.

Quiz about GDPR

Let's test your knowledge on GDPR!

Encryption/Travel Preview 07:12

In this informative module, you will learn at a basic level, all about what encryption is, why it is so very important to enforce security and privacy, and then you will be presented with some common encryption solutions you can use both at home, and at work. You will also be taught how it can REALLY help you to protect sensitive business and private data, especially whilst traveling.

Encryption Resources Preview 00:56

Quiz about Encryption/Travel

Let's test your knowledge on encryption!

IoT / Internet of Things Preview 05:53

In this easy to follow module, you will learn what we mean when we say IoT, and then you will be presented with an in-depth discussion of the major security issues involving these connected devices. You will also visually be guided, step-by-step, through how you can secure your devices to prevent hackers from infiltrating your home network and connected devices.

IoT Resources Preview 00:17

Quiz about IoT Internet of Things

Let's test your knowledge on IoT!

What Else Can You Do To Protect Yourself Part I Preview 06:49

Nice! You've made it through the course!

I REALLY hope you've enjoyed the training...In this final 2-part module, I will review for you the good cyber security solutions presented in the training. After the recap, you will be taught even more cool tips 'n tricks on how to protect yourself when using computers, smartphones and the Internet.

What Else Can You Do To Protect Yourself Part II Preview 05:47

In part II of this recap module, you will continue to be shown even more cool tips 'n tricks on how to protect yourself when using computers, smartphones and the Internet. And we will wrap up the training with information on how you can receive more good cyber security awareness, and how you can contact me if you ever have questions etc...

Extra Resources Preview 00:44

Quiz about What Else Can You Do To Protect Yourself

Let's test you knowledge on the Recap!