Course categories
Skip available courses
Available courses

Cybercriminals use phishing attacks to deceive individuals into divulging sensitive information, such as login credentials and financial data. This introductory course will provide a comprehensive understanding of phishing, how attackers craft their messages, and how individuals and organizations can recognize and defend against these threats.
Learning Objectives
By the end of this course, participants will be able to:
- Define phishing and understand its role in cybercrime.
- Identify common phishing techniques, including email, SMS, and social engineering tactics.
- Recognize phishing red flags and deceptive elements in messages.
- Understand the impact of phishing attacks on individuals and organizations.
- Apply best practices to protect personal and professional data from phishing attempts.
- Teacher: CEC Intl.

Dive deeper into how attackers manipulate emotions and use specific tactics like urgency, curiosity, and trust to trick users into clicking malicious links or downloading attachments.
- Teacher: CEC Intl.

In this foundational course, you'll explore the basics of the Tor network and understand how it serves as a powerful tool for online privacy and anonymity. Geared toward beginners, this course covers the key concepts behind Tor, including its decentralized structure, how it encrypts and routes traffic, and the practical benefits of using Tor for browsing the web securely. You'll also gain hands-on experience with setting up and using the Tor Browser, while learning about the potential risks and challenges of its use. By the end of this course, you'll be equipped with the knowledge to navigate the dark web, avoid censorship, and protect your privacy online using Tor.

This course provides an essential introduction to the Dark Web, exploring its structure, functionality, and key components. Students will gain a foundational understanding of how the Dark Web differs from the surface web and the deep web, including the technologies and protocols that allow users to access it securely and anonymously. Topics covered include the Tor network, encryption, anonymity, and the types of content and services available on the Dark Web. Additionally, the course will address common risks and ethical considerations when engaging with this hidden part of the internet. By the end of this course, participants will have a solid grasp of the Dark Web’s complexities and its role in cybersecurity, privacy, and digital forensics.
Perfect for those interested in understanding internet security, privacy issues, and the potential risks and opportunities of the Dark Web.
- Teacher: CEC Intl.
Skip site announcements