Basic Cyber Defence Training
Learn how to protect yourself from online threats and secure your data
Objectives
FREE PREVIEWHow Do Passwords Get Hacked
FREE PREVIEWHow to Avoid Obvious Passwords
Avoid Common Passwords
Avoid Common Keyboard Patterns
Avoid Common Password Patterns
Avoid Easy PINs and Unlocking Pattens
Strong Passwords: Using Passphrases
Strong Passwords: Use Sentences
Unique Passwords for Sensitive Services
Using Password Managers
Summary
Quiz Time!
Assignment
Optional Readings
Objectives
FREE PREVIEWWhat is Multi-Factor Authentication?
Example: Hardware Tokens
What is the Difference Between 2FA, MFA and 2-Step Verification?
How to Use Authenticator Apps
Assignment
Summary
Quiz Time!
Optional Readings
Objectives
FREE PREVIEWWhat is Spam?
What is Phishing?
What is the difference between spam and phishing?
Phishing via Texts or Voicemails
Phishing via Social Media
Identify Fake Websites
Identify Suspicious Communications
Report Suspicious Communications
Summary
Quiz Time!
Optional Readings
Objectives
FREE PREVIEWWhat Are BEC Attacks?
Real-Life Examples of BEC Frauds
How to Detect BEC Emails
Example of BEC Frauds Attempts
Summary
Quiz Time: Identify All Suspicious Emails
Optional Readings
Objectives
FREE PREVIEWWhat is Malware?
How Do You Get Infected?
What is Ransomware?
How Can you Protect Yourself?
What Should You If You Get Infected?
Assignment
Quiz Time!
Additional Readings
Objectives
FREE PREVIEWHow Malicious Email Attachments Affects You
How to Spot Malicious Attachments
Optional Readings
This course was written by a team of cyber security professionals with upwards than 25 years of experience in both offensive and defensive operations. We are constantly gathering cyber intelligence on new tactics and techniques developed by cybercriminals and we know exactly what you and your team need to know to reduce the risk of being successfully compromised by the growing number of threat actors.
Learn to protect yourself and your team from cyber criminals today.