Today every major University, community college and trade school offer some type of cyber crime training as a degree or certificate.   What is not taught is what do you do with your newfound degree or certification?

Most people think of computer security or cyber security experts as computer geeks working in a basement of some government agency or corporation protecting their networks from being hacked. That could be further from the truth. There are numerous aspects of computer security and cyber security. The first steps in making money as a cyber security consultant is to able to have knowledge in almost every area of computer security, cyber security, website security, cyber blackmail, cyber extortions, website security, cellphone security, social media security, corporate and personal security.



What You Will Learn:

Hacking – Phones, Tablets & Computers

  • IT Manager, Computer Security Expert or Hacker
  • Does Your IT Department/Team Suck?
  • Hiring a Hacker to Hack Your Company
  • Why Cyber Crime Pays!
  • Only The Rich Can Attain Cyber Crime Justice
  • Top 5 Places Hackers Hack
  • How Do You Stay Safe?
  • Intrusion Detection & Prevention
  • Don’t Trust Your Neighbors’ Wi-Fi
  • Public Wi-Fi
  • Protecting Your Wi-Fi
  • Cell Phone Hacking
  • Cell Phone Hacking
  • Password Protect Your Phone
  • Don’t Trust a Stranger With Your Phone
  • Having Two Numbers Is Better Than One!
  • Apple OS vs. Google Android
  • Did You Download An App With Spyware On Your Android
  • Bump & Hack – NFC Hacking
  • How Do You Protect Yourself?
  • JailBreak
  • Using More Than One Email Account
  • Choosing The Right Password
  • Text Me My Password Two-Fact Authentication
  • Password Hacking Clock
  • Lie, Lie, and Lie – Never Tell The Truth When Answering Your Security Questions.
  • Resetting Your Password
  • Don’t Open That Email – Spear Phishing
  • Rogue IT Manager?
  • You Are Only As Strong As Your Weakest Link!
  • Employee Attitudes Towards The Computer Policies
  • Website – Cash Cow
  • Protecting WordPress
  • Protecting Joomla
  • Too Many Connections – Denial of Services
  • Hackers Go Into The Advertising Business!

Scams & Schemes

  • Watch What You’re Buying
  • What Can Go Wrong – Craigslist
  • Hi-Tech Hustling on eBay
  • Second Chance Offers
  • Phishing Email Scam
  • Hijacked Accounts
  • Paid Too Much for an Item
  • Partial Refund
  • Shill Bidding
  • Bid Shielding
  • Fakes
  • Hidden Shipping and Handling
  • Switch A Roo
  • Fake Money Orders and Bad Checks

Child Safety

  • Protecting Our Kids
  • Cyber Bullying
  • Be Strong
  • Bullies vs. Cyber Bullies
  • Facts & Myths About Bullies and Cyber Bullies
  • Fighting Cyber Bullying
  • Things a School Can Do to Fight Cyber Bullying
  • At Work
  • Document All Your Complaints In Writing
  • Work place bullying


Social Media

  • IM Messaging Hijacking
  • How Do You Stay Safe?
  • Online Dating Scams
  • Online Dating Tips To Avoid Scams
  • What Shakedown Artists Normally Look For
  • The Russian Wedding
  • Russian Wedding Scams
  • The Scammer Will Request Money

Identity Theft

  • 5 Types Of Credit Card Fraud
  • Tips For Avoiding Online Credit Card Fraud
  • How Can Criminals Steal My Identity
  • Credit Report Blocking

Cyber Stalking

  • Cyber Stalking Stats

Track The Bad Guys

  • How To Track An Email

Making Money – Marketing & Branding

  • How to brand yourself
  • Your not an expert until you write a book
  • You own domain name
  • How to build your website
  • Social media marketing
  • How to get on news as an expert in 1 week
  • How to become your own Publicist

Making Money – How To Get Customers

  • How to figure out who your clients are
  • The 1 line that works every time

Making Money – Making Money

  • How much to charge?
  • What services should you provide
  • How to bill your clients

Making Money – The Tools

  • What hardware should every consultant have
  • What software should every consultant have
  • What online tools should every consultant use