Udemy

Cyber Security Awareness Training in the AI Era

Enroll Now
  • 33,572 Students
  • Updated 3/2026
4.5
(4,776 Ratings)
CTgoodjobs selects quality courses to enhance professionals' competitiveness. By purchasing courses through links on our site, we may receive an affiliate commission.

Course Information

Registration period
Year-round Recruitment
Course Level
Study Mode
Duration
4 Hour(s) 15 Minute(s)
Language
English
Taught by
Logix Academy | 150,000+ Enrollments Worldwide
Rating
4.5
(4,776 Ratings)

Course Overview

Cyber Security Awareness Training in the AI Era

Learn to Spot Phishing, Social Engineering & Malware — Including GenAI Data Leakage and AI Security Risks

This course enables learners to understand the current risk landscape and transforms people to Security-savvy users through a comprehensive and use case based Cybersecurity awareness training. Another core feature of the course is to highlight the security risks and threats when using GenAI at work or home and strategies on how to mitigate those risks.


You will love the animations! which make the learning journey so much fun and engaging!


Designed by a Cyber Security expert with a PhD degree and premium Cybersecurity certifications (CISSP), this course has been designed to make it extremely simple to learn how to secure yourself as well as your organisation against Cyber Threats and Hackers and learn about cyber crime. In simple words, this is Cybersecurity awareness for beginners! A dedicated sections highlights the security and data risks of using GenAI and strategies to mitigate those risks.

Please check out our free samples videos to see how complex concepts have been explained in an easy way!


Salient features include:

  • Step by step and easy to follow videos that don't assume any prior knowledge

  • Hands on practice activities to develop a deeper understanding of core concepts

  • Quizzes at the end of each section to test knowledge about each area

  • PhD instructor with 10+ years of industry experience as well as teaching experience

  • CISSP certified instructor

  • 30 day money-back guarantee

Domains covered:

  • Social Engineering (Phishing, Spear Phishing, Vishing, Shoulder Surfing, Wi-Fi Phishing and Waterhole Attacks)

  • Passwords (Brute Force and Dictionary Attacks, Tips on Selecting Strong Passwords, Practice Activity)

  • VPNs (How They Work, Interesting Facts, How to Select a Reliable VPN)

  • Secure Data Disposal (Dumpster Diving, Shredding, Data Disposal and Media Sanitisation, Safety Tips)

  • Malware (Ransomware and Indicators of Compromise, Ransomware in Action, Safety Tips)

  • Safe Browsing (First Part Cookies, 3rd Party Cookies, Browser Fingerprinting, Safety Tips)

  • Generative AI Risks Dangers of Prompt Based Data Leakage, Prompt Injections with Generative AI, Risks of Shadow Generative AI

Practice activities:

  • How to prevent phishing and malware attacks by spotting phishing emails (identifying red flags)

  • Practice selecting strong passwords

  • Check whether your password or account credentials have been leaked and are available online

  • Practice and see how 3rd party cookies are created and how they track you across the Internet


Don't just take my word for the course though, check out what existing students have to say about the course::


  • 5-Star Review:
    "Everything was perfect!" - Elias Chamoun

  • 5-Star Review:
    "Probably the best training I ever received " - Kelly Steindler

  • 5-Star Review:
    "I thoroughly enjoyed this course. The course content and presentation was interesting and informative. The 3.5 hours went by quickly!." - Cathy Stout

  • 5-Star Review:
    "Great course! Lots of information provided in a clear and concise manner. Helpful without being overwhelming." - Nancy Ressler

  • 5-Star Review:
    "Amazing course with very important information for everyone on cyber security" - David Deepak

  • 5-Star Review:
    "There was a lot about cybersecurity that I knew but didn't understand as well. This course was excellent at explaining to us in the simplest way how to detect threats, protect our data, etc. Very well put together. thank you." - Rachel Niedzwiecki

  • 5-Star Review:
    "Very Informative and well designed training, well done!!!" - Muhammad Shahid

  • 5-Star Review:
    "Very well explained. All the concepts were CRYSTAL CLEAR. Thank you." - Mudassir Rehman

  • 5-Star Review:
    "Awesome presentation, very helpful, thank you." - Hocine

  • 5-Star Review:
    "Very interesting course. Keeps my attention from the first minutes and throughout the whole video." - Olha Trachuk

  • 5-Star Review:
    "This is one of the most interesting and understanding courses I’ve ever taken." - Michael Avornyo

This course contains promotional materials

Course Content

  • 10 section(s)
  • 31 lecture(s)
  • Section 1 Introduction
  • Section 2 Social Engineering
  • Section 3 Safe Browsing
  • Section 4 Virtual Private Networks (VPNs)
  • Section 5 Strong Passwords
  • Section 6 Secure Data Disposal
  • Section 7 Malware
  • Section 8 AI in the Workplace: Security Risks
  • Section 9 Conclusion
  • Section 10 Bonus Section

What You’ll Learn

  • Learn how hackers exploit you through common social engineering attacks, Learn how to spot and prevent social engineering attacks, including phishing emails, Learn how hackers commit cyber crime, Discover essential tips for selecting strong passwords and avoiding common mistakes to enhance your online security, Learn how to protect your accounts, emails, and laptops from cyber threats, Learn about cookies, third-party cookies, and how your online activity is tracked, Learn how browser fingerprinting uniquely identifies you online, Protect your privacy: Check if your online credentials have been leaked, Discover the best practices for online safety and information security, Get tips on how to keep your data safe and secure


Reviews

  • L
    Lydia Yuliatie
    5.0

    You give examples do and don'ts, pictures help very much, thank you.

  • A
    Arthur Spears
    4.0

    Topics are a little over cooked and this takes a long time to get through. Trim from 3.5hrs to 1hr and it'd be 5 stars.

  • M
    Michael Bruno
    5.0

    Very good high-level overview for technical and non-technical users alike! Only one callout: I would advise that passwords which are simply long phrases are generally better than increasing the character set with special chars. Studies have shown that as passwords become less human-understandable, they become more likely to end up on a post-in under the keyboard. Adding several more characters more than makes up for the reduced character set.

  • P
    Precious Etim
    5.0

    I left this rating because the course is very easy to understand. I like that he’s used simplified English throughout the course and I can relate to the examples. They’re very visual. I also like the visual aid the pictures of especially when he was explaining something around USB cables, and how they can be Malicious so yeah I’m enjoying the course so far and learning it’s really well and I’m happy that I’m taking this course.

Start FollowingSee all

We use cookies to enhance your experience on our website. Please read and confirm your agreement to our Privacy Policy and Terms and Conditions before continue to browse our website.

Read and Agreed