Course curriculum

  • 1

    Module 1 - Cybercrime - A few statistics

    • Introduction

    • 1.01 - Cybercrime by-the-numbers

    • 1.02 - It's NOT only about large enterprise

    • 1.03 - In a nutshell

    • 1.04 - Congrats!

  • 2

    Module 2 - The origin of attacks

    • 2.01 - Where do the attacks come from

    • 2.02 - Mobile devices

    • 2.03 - The sources of attack

    • 2.04 - What about Wi-Fi

    • 2.05 - Are you using the right app

    • 2.06 - In a nutshell

    • 2.07 - Congrats!

  • 3

    Module 3 - Understanding the various types of attack

    • 3.01 - Types of attacks

    • 3.02 - Ransomware

    • 3.03 - Data leak

    • 3.04 - Executive imposter

    • 3.05 - Phishing

    • 3.06 - Spyware

    • 3.07 - Social engineering

    • 3.08 - In a nutshell

    • 3.09 - Congrats!

  • 4

    Module 4 - Better safe than sorry!

    • 4.01 - Tips and tricks

    • 4.02 - Social networks

    • 4.03 - Paper management

    • 4.04 - Password management

    • 4.05 - Identification

    • 4.06 - Useful tips

    • 4.07 - HTTP what?

    • 4.08 - Congrats