File Academy Online Safety Center

Online Safety Courses for Children, Consumers, & Business

  • Home
  • Course Catalog
  • My Courses/Log In
  • About Us

About this Course

Back to: Cyber Security Training for Real Estate Professionals

Back to Course
Cyber Security Training for Real Estate Professionals
Next Lesson
Glossary of Cyber Terms

Lessons

  • Introduction
    • About this Course
    • Glossary of Cyber Terms
    • Anatomy of a Cyber Attack
    • Anatomy of a Data Breach
    • Anatomy of a Ransomware Attack
  • Risks to Your Company and Yourself – Projected Completion Time: 30 Minutes
    • Identity Theft
    • Reputation Attacks
    • Digital Identity Spoofs
    • Dangers of Using Social Media
    • Point of Sale Attacks
    • Denial-of-Service (DoS) Attack?
    • Types of Data Breaches
    • Mobile Phone Hacking
    • Risks Quiz
  • Understanding Malware – Projected Completion Time: 25 Minutes
    • Adware
    • Spyware
    • Remote Access Trojans
    • Viruses
    • Ransomware
    • Malware Quiz
  • How Hacking Attacks are Delivered – Projected Completion Time: 30 Minutes
    • Phishing
    • Web Spoofing
    • Social Engineering
    • Bluetooth Hacking
    • Evil Twin Networks
    • Quiz Over How Hacks Are Delivered
  • The Hack & Beyond – Projected Completion Time: 30 Minutes
    • Signs You Have Been Hacked
    • When Your Phone Has Been Hacked
    • How to Recover from Being Hacked
    • The Hack & Beyond Quiz
  • Protecting Yourself & Your Office – Projected Completion Time: 45 Minutes
    • Protecting Your Computer
    • Preventing Fraudulant Wire Transfers
    • Protecting Your Network
    • Protecting Your Social Media
    • Building Strong Passwords
    • Using Biometric Verification
    • Preventing Bluetooth Hacks
    • Securing Your Email
    • How to Stop SPAM
    • Using Private Browsing
    • Creating Hack-Proof Account Profiles
    • Two-Step Verification
    • Creating a Firewall
    • Using a Virtual Private Network
    • Importance of Software Updates
    • Securing Client Information
    • What to Do After a Breach
    • Protection Quiz
  • Final Exam
    • Real Estate Security Final Exam
  • Appendix: How-To Instructions
    • Tips for Avoiding Fraud
    • Creating & Using Non-Administer Accounts
    • Finding & Removing Malware
    • How to Enable Private Browsing
    • Configuring a VPN
    • Identifying Credit Card Skimmers
    • Tips for Businesses for Avoiding or Responding to Ransomware Attacks
    • Can a Company Be Sued for a Data Breach?
    • Steps Consumers Should Take To Avoid Data Breaches
    • Cyber Security Checklist
    • Company Digital Security Policy Guidelines
    • Online Mistakes that Can Cost You Your Reputation
    • Check to See if YOU Have Been Caught in a Data Breach.
    • Creating a Google Alert
    • Reporting Cyber Crime
  • Privacy Policy
  • Terms of Use

© 2017 File Academy Inc.

Powered by WordPress and LifterLMS - Theme LaunchPad by LifterLMS

Copy Protected by Chetan's WP-Copyprotect.