Linkedin - Cybersecurity Awareness - Phishing Attacks

seeders: 12
leechers: 10
updated:

Download Fast Safe Anonymous
movies, software, shows...
  • Downloads: 104
  • Language: English

Files

[ FreeCourseWeb.com ] Linkedin - Cybersecurity Awareness - Phishing Attacks
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1. Introduction
    • 001. About phishing attacks.en.srt (1.9 KB)
    • 001. About phishing attacks.mp4 (9.4 MB)
    2. An Overview of Phishing
    • 002. Phishing The dangers of email.en.srt (6.3 KB)
    • 002. Phishing The dangers of email.mp4 (30.8 MB)
    • 003. Money is the motive The reason behind phishing.en.srt (6.3 KB)
    • 003. Money is the motive The reason behind phishing.mp4 (32.5 MB)
    • 004. How does phishing affect us.en.srt (9.1 KB)
    • 004. How does phishing affect us.mp4 (44.7 MB)
    • 005. A review of the psychology behind social engineering attacks.en.srt (9.1 KB)
    • 005. A review of the psychology behind social engineering attacks.mp4 (42.9 MB)
    3. Different Types of Phishing Attacks
    • 006. Is it a harmless unknown caller or vishing.en.srt (6.8 KB)
    • 006. Is it a harmless unknown caller or vishing.mp4 (33.0 MB)
    • 007. Unfriended How to spot a social media phish.en.srt (8.0 KB)
    • 007. Unfriended How to spot a social media phish.mp4 (36.7 MB)
    • 008. Getting specific with targeted phishing attacks.en.srt (7.0 KB)
    • 008. Getting specific with targeted phishing attacks.mp4 (33.3 MB)
    • 009. SMS phishing A text-based attack.en.srt (6.8 KB)
    • 009. SMS phishing A text-based attack.mp4 (30.3 MB)
    • 010. Other notable methods of phishing.en.srt (9.1 KB)
    • 010. Other notable methods of phishing.mp4 (45.1 MB)
    4. How to Catch a Phish
    • 011. What makes phishing attacks successful.en.srt (7.3 KB)
    • 011. What makes phishing attacks successful.mp4 (35.2 MB)
    • 012. Catch a phish red-handed Common indicators of a phish.en.srt (8.9 KB)
    • 012. Catch a phish red-handed Common indicators of a phish.mp4 (46.6 MB)
    • 013. Is this a phish Real-world examples of phishing attacks.en.srt (7.5 KB)
    • 013. Is this a phish Real-world examples of phishing attacks.mp4 (36.8 MB)
    5. How to Defend against Phishing Attacks
    • 014. The most common ways to defend against a phish.mp4 (22.1 MB)
    • 015. How technology helps with the fight against phishing attacks.en.srt (8.5 KB)
    • 015. How technology helps with the fight against phishing attacks.mp4 (39.6 MB)
    • 016. Practice makes perfect An overview of phishing simulations.en.srt (6.1 KB)
    • 016. Practice makes perfect An overview of phishing simulations.mp4 (31.1 MB)
    6. What Happens If You Fall for a Phish
    • 017. Responding to a phishing attack at work.mp4 (22.3 MB)
    • 018. Falling for a phishing attack at home.en.srt (8.0 KB)
    • 018. Falling for a phishing attack at home.mp4 (32.9 MB)
    7. Conclusion
    • 019. Next steps and takeaways.en.srt (1.4 KB)
    • 019. Next steps and takeaways.mp4 (7.4 MB)
    • Bonus Resources.txt (0.4 KB)
    • Ex_Files_Cybersecurity_Awareness_Phishing_Attacks Exercise Files
      • Additional Resources.pdf (46.5 KB)

Description

Cybersecurity Awareness: Phishing Attacks



https://FreeCourseWeb.com

LinkedIn Learning
Duration: 1h 10m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 612 MB
Genre: eLearning | Language: English

Phishing is one of the easiest ways for digital attackers to claim multiple victims and reap potentially large payouts at the same time. With the rise of remote and hybrid work, phishing attacks have reached historic levels, as cybercriminals continue to take advantage of increased employee screen time. In this course, instructor Stephanie Ihezukwu covers everything you need to know about phishing and how to defend yourself against phishing attacks.

Learn about the reasons for phishing, how phishing works, and why social engineering attacks are on the rise in general. Explore different types of phishing attacks carried out by email, phone, social media, text message, and spam. Get tips on how to catch a phish by diving into real-world examples of phishing attacks with best practices on how to prevent them. After taking this course, you’ll have a better idea about how to spot a phish and respond effectively, even when an attack is successful.



Download torrent
612.9 MB
seeders:12
leechers:10
Linkedin - Cybersecurity Awareness - Phishing Attacks


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
612.9 MB
seeders:12
leechers:10
Linkedin - Cybersecurity Awareness - Phishing Attacks


Torrent hash: 2C6CAA10DFB17318F646704531CDCDC8117913CD