Cybersecurity Training

A Course for Internet Users Who Value Both Security and Privacy

This course is designed for individuals who prioritize their online security and privacy, including on mobile devices. Beyond learning techniques to avoid fundamental cyber threats, you will gain insights into protecting your personal data and privacy. You will also receive practical advice on tools that can enhance your workplace security and learn how to respond to cyber threats. If you seek the highest level of security and privacy for yourself and your loved ones, this training program is for you.

This course is unique in that, in addition to covering social media security and secure online payments, it includes lessons on mobile phone and tablet security (including child safety) and threats posed by advanced hacking tools. You will also receive practical guidance on maximizing your security and privacy when using the Internet—not only at work but also at home and while traveling. We will teach you how to communicate securely and maintain the highest level of data confidentiality.

Learn more

COURSE CONTENT

Module 1 – Getting Started

  • Introduction
  • Course Structure
  • Additional Materials and Community
  • Cybercriminals – Who Threatens Us?
  • Who Can Become a Victim of an Attack?
  • Social Engineering – Why Is It Effective?
  • How to Check If Your Data Has Been Leaked
  • Homework

Module 2 – Password Security

  • Password Leak – What to Do
  • Everything You Need to Know About Passwords
  • Secure Password Storage
  • Two-Factor Authentication
  • Homework

Module 3 – Email Security and SCAM Protection

  • Traditional Mail Security
  • Email and SMS Spoofing – How Easy It Is
  • Sender Verification Rules
  • Examples of Spoofing Attacks
  • What to Watch Out For
  • How to Verify Attachments and Links
  • Homework

Module 4 – Phishing Defense

  • Understanding Phishing
  • Examples of Phishing Attacks
  • How to Read URLs and Domains
  • Traps in Domain Names
  • Typosquatting / Cybersquatting
  • The “Green Padlock” Problem
  • Homework

Module 5 – Browser Security

  • Keeping Your Browser Secure
  • Cookies and Password Storage
  • Clickjacking, Likejacking, Camjacking
  • Certificate Warnings
  • Homework

Module 6 – More Social Engineering Attacks and How to Avoid Them

  • Phone-Based Attacks
  • Unknown Data Carriers
  • Dangerous Gadgets
  • Malicious Ads
  • Practical Tips
  • Homework

Module 7 – More Threats

  • Watering Hole Attacks
  • Wi-Fi Security Risks
  • “Gifted” Smartphones (Including Auction Purchases)
  • Bank Account Attacks via SIM Card Duplication
  • Homework

Module 8 – Beware – This Is Also Possible

  • Artificial Intelligence in Cybercrime
  • Internet of Things (IoT) Threats
  • Cyber Propaganda, Disinformation, and Fake News
  • This Is Not the End – Stay with Us

Module 9 – Social Media Threats

  • Trust in Social Media
  • Profile Thefts
  • Payment and BLIK Code Scams
  • Privacy vs. Metadata (OSINT)
  • Securing Social Media Profiles
  • Homework

Module 10 – Secure Banking and Payments

  • Secure Payments and Cards
  • Payment Intermediaries
  • Mobile Banking
  • BLIK Transactions
  • Homework

Module 11 – Best Security Practices and Habits

  • Cybersecurity Best Practices
  • Insider Threats
  • Secure Data Deletion
  • Software Updates
  • Homework

Module 12 – Protection Against Malware

  • Malware – Know Your Enemy
  • What Is the Darknet and Is It Dangerous?
  • Antivirus Solutions
  • Secure Backups
  • Homework

Module 13 – Mobile Phone and Tablet Security

  • Your Phone Is Also a Computer
  • Permissions and Surveillance Risks
  • Security Measures and Best Practices
  • Child Safety Online
  • Homework

Module 14 – Beware of These Devices

  • Hacking Devices to Watch Out For
  • Malicious USBs
  • Network Implants
  • False Sense of Access Control
  • Homework

Module 15 – Responding to Security Incidents

  • Recognizing a Security Incident
  • How and Where to Report an Incident
  • What You Can Do Yourself
  • Homework

Module 16 – Work Securely and Defend Yourself Effectively

  • What Is Hardening?
  • A Browser That Won’t Betray You
  • Secure Email
  • Secure Messengers
  • Safe Internet Use While Traveling
  • Hardware-Based Two-Factor Authentication (2FA)
  • Blocking Premium Services
  • Homework

Learn more

Let us improve your business!