Learn more
COURSE CONTENT
Module 1 – Getting Started
- Introduction
- Course Structure
- Additional Materials and Community
- Cybercriminals – Who Threatens Us?
- Who Can Become a Victim of an Attack?
- Social Engineering – Why Is It Effective?
- How to Check If Your Data Has Been Leaked
- Homework
Module 2 – Password Security
- Password Leak – What to Do
- Everything You Need to Know About Passwords
- Secure Password Storage
- Two-Factor Authentication
- Homework
Module 3 – Email Security and SCAM Protection
- Traditional Mail Security
- Email and SMS Spoofing – How Easy It Is
- Sender Verification Rules
- Examples of Spoofing Attacks
- What to Watch Out For
- How to Verify Attachments and Links
- Homework
Module 4 – Phishing Defense
- Understanding Phishing
- Examples of Phishing Attacks
- How to Read URLs and Domains
- Traps in Domain Names
- Typosquatting / Cybersquatting
- The “Green Padlock” Problem
- Homework
Module 5 – Browser Security
- Keeping Your Browser Secure
- Cookies and Password Storage
- Clickjacking, Likejacking, Camjacking
- Certificate Warnings
- Homework
Module 6 – More Social Engineering Attacks and How to Avoid Them
- Phone-Based Attacks
- Unknown Data Carriers
- Dangerous Gadgets
- Malicious Ads
- Practical Tips
- Homework
Module 7 – More Threats
- Watering Hole Attacks
- Wi-Fi Security Risks
- “Gifted” Smartphones (Including Auction Purchases)
- Bank Account Attacks via SIM Card Duplication
- Homework
Module 8 – Beware – This Is Also Possible
- Artificial Intelligence in Cybercrime
- Internet of Things (IoT) Threats
- Cyber Propaganda, Disinformation, and Fake News
- This Is Not the End – Stay with Us
Module 9 – Social Media Threats
- Trust in Social Media
- Profile Thefts
- Payment and BLIK Code Scams
- Privacy vs. Metadata (OSINT)
- Securing Social Media Profiles
- Homework
Module 10 – Secure Banking and Payments
- Secure Payments and Cards
- Payment Intermediaries
- Mobile Banking
- BLIK Transactions
- Homework
Module 11 – Best Security Practices and Habits
- Cybersecurity Best Practices
- Insider Threats
- Secure Data Deletion
- Software Updates
- Homework
Module 12 – Protection Against Malware
- Malware – Know Your Enemy
- What Is the Darknet and Is It Dangerous?
- Antivirus Solutions
- Secure Backups
- Homework
Module 13 – Mobile Phone and Tablet Security
- Your Phone Is Also a Computer
- Permissions and Surveillance Risks
- Security Measures and Best Practices
- Child Safety Online
- Homework
Module 14 – Beware of These Devices
- Hacking Devices to Watch Out For
- Malicious USBs
- Network Implants
- False Sense of Access Control
- Homework
Module 15 – Responding to Security Incidents
- Recognizing a Security Incident
- How and Where to Report an Incident
- What You Can Do Yourself
- Homework
Module 16 – Work Securely and Defend Yourself Effectively
- What Is Hardening?
- A Browser That Won’t Betray You
- Secure Email
- Secure Messengers
- Safe Internet Use While Traveling
- Hardware-Based Two-Factor Authentication (2FA)
- Blocking Premium Services
- Homework
Learn more