Topics

    1. Objectives

      FREE PREVIEW
    2. How Do Passwords Get Hacked

      FREE PREVIEW
    3. How to Avoid Obvious Passwords

    4. Avoid Common Passwords

    5. Avoid Common Keyboard Patterns

    6. Avoid Common Password Patterns

    7. Avoid Easy PINs and Unlocking Pattens

    8. Strong Passwords: Using Passphrases

    9. Strong Passwords: Use Sentences

    10. Unique Passwords for Sensitive Services

    11. Using Password Managers

    12. Summary

    13. Quiz Time!

    14. Assignment

    15. Optional Readings

    1. Objectives

      FREE PREVIEW
    2. What is Multi-Factor Authentication?

    3. Example: Hardware Tokens

    4. What is the Difference Between 2FA, MFA and 2-Step Verification?

    5. How to Use Authenticator Apps

    6. Assignment

    7. Summary

    8. Quiz Time!

    9. Optional Readings

    1. Objectives

      FREE PREVIEW
    2. What is Spam?

    3. What is Phishing?

    4. What is the difference between spam and phishing?

    5. Phishing via Texts or Voicemails

    6. Phishing via Social Media

    7. Identify Fake Websites

    8. Identify Suspicious Communications

    9. Report Suspicious Communications

    10. Summary

    11. Quiz Time!

    12. Optional Readings

    1. Objectives

      FREE PREVIEW
    2. What Are BEC Attacks?

    3. Real-Life Examples of BEC Frauds

    4. How to Detect BEC Emails

    5. Example of BEC Frauds Attempts

    6. Summary

    7. Quiz Time: Identify All Suspicious Emails

    8. Optional Readings

    1. Objectives

      FREE PREVIEW
    2. What is Malware?

    3. How Do You Get Infected?

    4. What is Ransomware?

    5. How Can you Protect Yourself?

    6. What Should You If You Get Infected?

    7. Assignment

    8. Quiz Time!

    9. Additional Readings

    1. Objectives

      FREE PREVIEW
    2. How Malicious Email Attachments Affects You

    3. How to Spot Malicious Attachments

    4. Optional Readings

About this course

  • $19.99
  • 76 lessons
  • Beginner
  • Everyone

Why Choose Our Training?

  • Practical Examples and Solutions

    The course focuses on real-life social engineering threats targeting users on a daily basis, not on lengthy technical explanations.

  • Focused on Canadian Small and Medium Businesses

    This course is specially tailored for small and medium companies, with Canadian examples but relevant to anyone in the world.

  • No monthly subscription, only pay a one-time fee!

    Access our user awareness training course for a one-time fee! No monthly subscription is needed!

Developed by an Experienced Team

This course was written by a team of cyber security professionals with upwards than 25 years of experience in both offensive and defensive operations. We are constantly gathering cyber intelligence on new tactics and techniques developed by cybercriminals and we know exactly what you and your team need to know to reduce the risk of being successfully compromised by the growing number of threat actors.

Don't be the weakest link!

Learn to protect yourself and your team from cyber criminals today.