Udemy - Easily Identify Spam and Phishing E-mails

seeders: 3
leechers: 12
updated:

Download Fast Safe Anonymous
movies, software, shows...

Files

[ CourseBoat.com ] Udemy - Easily Identify Spam and Phishing E-mails
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01 - Introduction
    • 001 Introduction.mp4 (56.5 MB)
    • 001 Introduction_en.vtt (3.1 KB)
    • 002 What Is Phishing_.mp4 (60.9 MB)
    • 002 What Is Phishing__en.vtt (3.6 KB)
    • 003 Course Overview.mp4 (69.5 MB)
    • 003 Course Overview_en.vtt (4.0 KB)
    • 004 Phishing Implications Example.mp4 (58.1 MB)
    • 004 Phishing Implications Example_en.vtt (8.0 KB)
    02 - Phishing E-mails Types
    • 001 Deceptive Phishing.mp4 (57.1 MB)
    • 001 Deceptive Phishing_en.vtt (6.1 KB)
    • 002 Reveal Money Making Secret.mp4 (11.0 MB)
    • 002 Reveal Money Making Secret_en.vtt (2.9 KB)
    • 003 Offer a Cure.mp4 (14.1 MB)
    • 003 Offer a Cure_en.vtt (3.5 KB)
    • 004 Money Offered.mp4 (9.9 MB)
    • 004 Money Offered_en.vtt (4.3 KB)
    • 005 Money Requested.mp4 (8.8 MB)
    • 005 Money Requested_en.vtt (4.0 KB)
    • 006 Other Examples.mp4 (30.2 MB)
    • 006 Other Examples_en.vtt (4.0 KB)
    03 - Phishing Identification Rules
    • 001 Rule #1.mp4 (27.9 MB)
    • 001 Rule #1_en.vtt (5.2 KB)
    • 002 Rule #2.mp4 (14.7 MB)
    • 002 Rule #2_en.vtt (3.0 KB)
    • 003 Rule #3.mp4 (43.2 MB)
    • 003 Rule #3_en.vtt (12.5 KB)
    • 004 Rule #4.mp4 (12.9 MB)
    • 004 Rule #4_en.vtt (3.3 KB)
    • 005 Rule #5.mp4 (10.1 MB)
    • 005 Rule #5_en.vtt (4.0 KB)
    • 006 Rule #6.mp4 (23.9 MB)
    • 006 Rule #6_en.vtt (4.8 KB)
    • 007 Rule #7.mp4 (7.7 MB)
    • 007 Rule #7_en.vtt (4.4 KB)
    • 008 Rule #8.mp4 (20.8 MB)
    • 008 Rule #8_en.vtt (5.6 KB)
    • 009 Rule #9 - Most Important Rule 1.mp4 (41.1 MB)
    • 009 Rule #9 - Most Important Rule 1_en.vtt (15.8 KB)
    • 010 Rule #10.mp4 (9.2 MB)
    • 010 Rule #10_en.vtt (4.2 KB)
    • 011 Rule #11.mp4 (5.0 MB)
    • 011 Rule #11_en.vtt (2.4 KB)
    • 012 Rule #12.mp4 (20.4 MB)
    • 012 Rule #12_en.vtt (4.9 KB)
    • 013 Rule #13 - Most Important Rule 2.mp4 (35.4 MB)
    • 013 Rule #13 - Most Important Rule 2_en.vtt (14.8 KB)
    • 014 Rule #14.mp4 (14.2 MB)
    • 014 Rule #14_en.vtt (6.0 KB)
    • 015 Rule #15.mp4 (9.3 MB)
    • 015 Rule #15_en.vtt (5.2 KB)
    • 016 Rule #16.mp4 (4.4 MB)
    • 016 Rule #16_en.vtt (2.0 KB)
    • 017 Rule #17.mp4 (24.8 MB)
    • 017 Rule #17_en.vtt (9.1 KB)
    • 018 Rule #18.mp4 (4.0 MB)
    • 018 Rule #18_en.vtt (3.1 KB)
    • 019 Rule #19.mp4 (8.9 MB)
    • 019 Rule #19_en.vtt (3.0 KB)
    04 - Tricks Used to Fool Spam Filters
    • 001 Rule #20.mp4 (53.0 MB)
    • 001 Rule #20_en.vtt (9.3 KB)
    • 002 Rule #21.mp4 (31.5 MB)
    • 002 Rule #21_en.vtt (7.0 KB)
    • 003 Rule #22.mp4 (11.1 MB)
    • 003 Rule #22_en.vtt (3.7 KB)
    • 004 Phishing Identification Rules Checklist.html (0.3 KB)
    05 - Putting It All Together - Real Life Examples
    • 001 Example 1.mp4 (121.3 MB)
    • 001 Example 1_en.vtt (15.7 KB)
    • 002 Example 2.mp4 (27.3 MB)
    • 002 Example 2_en.vtt (10.6 KB)
    06 - What To Do and NOT To Do
    • 001 Do's and Don't #1.mp4 (5.6 MB)
    • 001 Do's and Don't #1_en.vtt (2.2 KB)
    • 002 Do's and Don't #2.mp4 (9.0 MB)
    • 002 Do's and Don't #2_en.vtt (4.2 KB)
    • 003 Do's and Don't #3.mp4 (5.4 MB)
    • 003 Do's and Don't #3_en.vtt (1.6 KB)
    • 004 Do's and Don't #4.mp4 (89.0 MB)
    • 004 Do's and Don't #4_en.vtt (17.3 KB)
    • 005 Do's and Don't #5.mp4 (14.8 MB)
    • 005 Do's and Don't #5_en.vtt (7.3 KB)
    • 006 Do's and Don't #6.mp4 (12.9 MB)
    • 006 Do's and Don't #6_en.vtt (3.1 KB)
    • 007 Do's and Don't #7.mp4 (13.5 MB)
    • 007 Do's and Don't #7_en.vtt (3.0 KB)
    • 008 Do's and Don't #8.mp4 (4.6 MB)
    • 008 Do's and Don't #8_en.vtt (1.1 KB)
    • 009 Do's and Don't #9.mp4 (68.5 MB)
    • 009 Do's and Don't #9_en.vtt (5.2 KB)
    • 010 Do's and Don't #10.mp4 (21.3 MB)
    • 010 Do's and Don't #10_en.vtt (5.4 KB)
    • 011 Do's and Don't #11.mp4 (9.3 MB)
    • 011 Do's and Don't #11_en.vtt (2.3 KB)
    • 012 Do's and Don't #12.mp4 (12.8 MB)
    • 012 Do's and Don't #12_en.vtt (3.1 KB)
    • 013 Do's and Don't #13.mp4 (11.4 MB)
    • 013 Do's and Don't #13_en.vtt (2.9 KB)
    • 014 Do's and Don't #14.mp4 (29.0 MB)
    • 014 Do's and Don't #14_en.vtt (4.8 KB)
    07 - Conclusion
    • 001 Conclusion.mp4 (12.9 MB)
    • 001 Conclusion_en.vtt (1.4 KB)
    • 002 Bonus Lecture_ More Resources.html (0.1 KB)
    • 29661518-Bonus-Lecture-12-2020.pdf (323.9 KB)
    • Bonus Resources.txt (0.3 KB)

Description

Easily Identify Spam & Phishing E-mails



https://CourseBoat.com

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.24 GB | Duration: 3h 13m
Identify e-mail scams BEFORE your corporate or personal data is breached!
What you'll learn
How to avoid phishing attacks and therefore prevent data breaches in the office or at home
Well-defined rules to identify if an e-mail is legitimate or if it's spam / phishing attempt
Set specific e-mail settings to help identify spam and increase your security
What to do and what NOT to do when faced with fishy e-mails
Get a FREE checklist with my Phishing Identification Rules for your own use

Requirements
Use any e-mail program on any platform: Windows / Mac / Web / Android / iOS / etc.
Description
[Last update: 08 Oct. 2021]

We, humans, are the weakest link when facing online security breaches, both in the office and at home.
According to a Google study, phishing is the biggest threat to our online security.
We all get phishing e-mails; some of them always make it through our filters. Those e-mails are dangerous because we can easily mistake them for a legitimate e-mail coming from a well-known company and we'll want to click on some malicious link inside this e-mail, thinking that we're doing the right thing. Or we may be tempted to open some attached file because the e-mail made us curious to do so or because we don't understand what the e-mail is about and we want to check it out further.

However, by clicking on such links or opening such documents, we may provide hackers access to our personal or corporate data and maybe even give them access to our computer and from there to our whole network!
Some large corporate hacks started with such phishing e-mails. And all it takes is a single employee to fall prey for such an attack.



Download torrent
1.2 GB
seeders:3
leechers:12
Udemy - Easily Identify Spam and Phishing E-mails


Trackers

tracker name
udp://tracker.torrent.eu.org:451/announce
udp://tracker.tiny-vps.com:6969/announce
http://tracker.foreverpirates.co:80/announce
udp://tracker.cyberia.is:6969/announce
udp://exodus.desync.com:6969/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2780/announce
udp://tracker.internetwarriors.net:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://open.stealth.si:80/announce
udp://9.rarbg.to:2900/announce
udp://9.rarbg.me:2720/announce
udp://opentor.org:2710/announce
µTorrent compatible trackers list

Download torrent
1.2 GB
seeders:3
leechers:12
Udemy - Easily Identify Spam and Phishing E-mails


Torrent hash: 5849428EFF113A630CDA6D374C980B1919D3ADFE