IQ Safe Web Browsing

The internet is full of malicious websites trying to lure you into doing something you probably shouldn’t do. In this course, you'll start by learn how to identify the most common warning signs of unsafe websites and ways to stay safe while browsing the internet.
28 minutes 2 videos

Course description

Public Wi-Fi is everywhere, and it can be very convenient. But just because something is readily available doesn’t necessarily mean that it is safe. You will learn how to safely browse the web while using public Wi-Fi.


ChatGPT Training

Video - 00:04:00

Artificial intelligence is making headlines all over the world. But AI is a new technology with new dangers, and you might not be familiar with them. Take a moment to learn about what AI is, what it can do and what you should know to stay safe.
Core Concepts: QR Code Safety

Video - 00:05:00

What is a QR code, and what does it mean for cybersecurity today? Explore the uses of QR codes, how hackers are using them and what you can do to be safe.
Work Bytes: Social Media Best Practices

Video - 00:04:00

How much information is too much? Sit in on a meeting with the Work Bytes team and learn about the best (and worst!) ways to use social media.
Work Bytes: Public Wi-Fi

Video - 00:05:00

Staying safe on a work trip is a challenge, no matter who you are! Volkov the vampire struggles with public Wi-Fi, and Hal provides some late-night tech support.
Just the Facts: Safe Web Browsing

Video - 00:05:00

Get the facts on safe web browsing! In this module, you'll explore the dangers, the challenges and the things you can do to keep yourself and your data safe.
Need to Know: Public Wi-Fi

Video - 00:03:00

Mateo is looking for a stable public Wi-Fi connection. But each one turns out to have its own dangers, and his friend Neena shows him how to stay safe.
Safe Web Browsing Assessment

Assessment - 5 questions

Meet the author

Keatron Evans is a cybersecurity and workforce development expert with over 17 years of experience in penetration testing, incident response and information security management for federal agencies and Fortune 500 organizations. He is VP of Portfolio and Product Strategy at Infosec, where he empowers the human side of cybersecurity with cyber knowledge and skills to outsmart cybercrime. Keatron is an established researcher, instructor and speaker — and lead author of the best-selling book, Chained Exploits: Advanced Hacking Attacks from Start to Finish. He regularly speaks at major industry events like RSA and serves as a cybersecurity subject matter expert for major media outlets like CNN, Fox News, Information Security Magazine and more.

Keatron holds a Bachelor of Science in Business Information Systems and dozens of cybersecurity certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Cloud Security Professional (CCSP) and Licensed Penetration Tester (LTP). When not teaching, speaking or managing his incident response business, KM Cyber Security LLC, Keatron enjoys practicing various martial arts styles, playing piano and bass guitar, and spending time with his family.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training you can trust