Course curriculum

  • 1

    Speaker Profile-Mr. Yong Chu Eu

    • Speaker Profile-Yong Chu Eu

  • 2

    Pre Test

    • Pre Test

  • 3

    Chapter 1: Frank Abagnale and His Security Advices

    • Frank Abagnale and His Security Advices

  • 4

    Chapter 2: What is Cyber Security?

    • What is Cyber Security?

  • 5

    Chapter 3: Deep and Dark Web

    • Deep and Dark Web

  • 6

    Chapter 4: How to Protect Yourself From Webcam Hackers

    • How to Protect Yourself From Webcam Hackers

  • 7

    Chapter 5: Cyber Security and How to protect ourselves?

    • Cyber Security and How to protect ourselves?

  • 8

    Chapter 6: Defend Against Phishing Attack

    • Defend Against Phishing Attack

  • 9

    Chapter 7: What is phishing Learn how this attack works

    • What is phishing Learn how this attack works

  • 10

    Chapter 8: How you are being phished

    • How you are being phished

  • 11

    Chapter 9: How to protect your personal data?

    • How to protect your personal data?

  • 12

    Chapter 10: How a cyber attack crippled the Colonial Pipeline

    • How a cyber attack crippled the Colonial Pipeline

  • 13

    Chapter 11: How to protect your password?

    • How to protect your password?

  • 14

    Chapter 12: Password Security Awareness

    • Password Security Awareness

  • 15

    Chapter 13: How to protect your Email and Mobile Device?

    • How to protect your Email and Mobile Device?

  • 16

    Chapter 14: Mobile Security Awareness

    • Mobile Security Awareness

  • 17

    Chapter 15: When your phone being hacked

    • When your phone being hacked

  • 18

    Chapter 16: Security in Social Media, Wifi and VPN

    • Security in Social Media, Wifi and VPN

  • 19

    Chapter 17: Social Networking & Security

    • Social Networking & Security

  • 20

    Chapter 18: How to protect ourselves from Fake News & Deadly Game

    • How to protect ourselves from Fake News & Deadly Game

  • 21

    Chapter 19: How false news can spread

    • How false news can spread?

  • 22

    Chapter 20: How to protect ourselves from SCAM

    • How to protect ourselves from SCAM

  • 23

    Chapter 21: Ponzi Scheme

    • Ponzi Scheme

  • 24

    Chapter 22: Ponzi vs. Pyramid Scheme- What’s The Difference

    • Ponzi vs. Pyramid Scheme- What’s The Difference

  • 25

    Chapter 23: Cyber Security Trends and Future

    • Cyber Security Trends and Future

  • 26

    Chapter 24: The Insane Cambridge Analytica Election Interference Revelations

    • The Insane Cambridge Analytica Election Interference Revelations

  • 27

    Chapter 25: Cryptocurrency and Follow the money

    • Cryptocurrency and Follow the money

  • 28

    Chapter 26: Drone Attack

    • Drone Attack

  • 29

    Chapter 27: Copyright & Reference

    • Copyright & Reference

  • 30

    Post Test

    • Post Test

  • 31

    Evaluation & Handout

    • Evaluation & Handout