Cyber Security for everyone
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
3 students enrolled

Cyber Security for everyone

Learn all the basic principles and awareness to make your PC environment safe, and how to be safe online.
0.0 (0 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
3 students enrolled
Created by Zack Snyders
Last updated 3/2020
English
English
Current price: $62.99 Original price: $89.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 2 hours on-demand video
  • 2 articles
  • 13 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Computer and Online Security awareness and best practices for non-IT users
  • This course is specifically suitable for for beginners and older people that has little or no computer knowledge. They are guided to grasp the concepts and the detailed is explained with easy to follow examples.
Requirements
  • No
Description

If you use the internet in any way, whatsoever, with any device, you are at risk. You can lose your identity, your money, your business!  Let me show you how can avoid that. Learn how to be safe online, help your children to be safe online. The course is specifically designed to guide. Like "Show and tell"! We share actual examples, recommend software and show you how it works. You need no previous knowledge or experience. Only the most basic computer skills are required.


Who this course is for:
  • Employees of small business, startups and individuals with little or no knowledge about PC and online security for themselves and their children
  • Beginners and older people that did not yet have the opportunity to learn about PC and internet security.
Course content
Expand all 10 lectures 01:59:50
+ Introduction
2 lectures 01:28
About the instructor
00:55
What you will learn
00:33
+ Module 1 Environment
4 lectures 53:18

We will start right at the beginning! One of the most critical components for introducing security into your immediate environment is the presence of good password habits.

At the end of this lesson, you will have identified and learned how to implement best practices for password hygiene!

The purpose of this Lesson is to help you understand the importance of passwords and help you manage them. Passwords and specifically good habits of how we deal with passwords are essential. Not only for our own security but an absolute must to enable us to achieve compliance and the trust of our clients.

Every web application or system that you access on the internet has some sort of login method.

It would be strange to find a web site or system without authentication. Authentication is in fact so basic, it should be like going to the bathroom. We have perfected that a long time ago since we do it so many times.

Using usernames, passwords, password formatting and storing should also be automatic. We do that every day as well.

So why are there still so many mistakes made and weak passwords all the time?

Preview 02:08

We will start right at the beginning! One of the most critical components for introducing security into your immediate environment is the presence of good password habits.

At the end of this lesson, you will have identified and learned how to implement best practices for password hygiene!

The purpose of this Lesson is to help you understand the importance of passwords and help you manage them. Passwords and specifically good habits of how we deal with passwords are essential. Not only for our own security but an absolute must to enable us to achieve compliance and the trust of our clients.

Every web application or system that you access on the internet has some sort of login method.

It would be strange to find a web site or system without authentication. Authentication is in fact so basic, it should be like going to the bathroom. We have perfected that a long time ago since we do it so many times.

Using usernames, passwords, password formatting and storing should also be automatic.

We do that every day as well.

So why are there still so many mistakes made and weak passwords all the time?

There are many precautions that you can take to protect yourself from hackers and make sure you avoid some of the ugliness of the internet.

One of the easiest and most simple ways to start is to create strong, unique passwords for every one of your accounts.

Would you be surprised to learn that many people don't?

As we go along, think about your own, current, password habits.

Many people use a password with their child’s name and birthday. This is easier to remember.

But also easier for your friendly neighbourhood hacker!

While it is easier to use your same password, or a variation of it, for all of your accounts, it is a recipe for disaster! When forming your password, there are specific guidelines I will provide to ensure you are a lot safer out there!

Never give your password out to anyone and resist the urge to store them on your computer.

From time to time, change your password on your important accounts that contain personal information or financial information for added internet security.

But not too often! New research by the National Institute of Standards and Technology (NIST) has indicated that changing your password regularly is now discouraged. Providing you follow the guidelines that I provide and industry best practice.

If you don't have a Social Media account then you are among the few. Social sites are very common Internet today.

They can be a great way to keep in touch with family and friends. Maybe to promote your business.

However, do they threaten your internet security? All is revealed in the video lecture.

Also, see the downloadable Transcript. It contains some of the most important concepts from the video lecture.

Preview 21:49

.Are you prepared for a disaster?

This course and the lectures on backups will prepare you!

Don't wait until it happens to try and figure out what to do next!

This lecture is all about data. The documents. The pictures. Everything that is important to you is somewhere on your computer.

Your data is important to you. Maybe important to your business.

Certainly to the crawlers of the night!

Imagine you switch on your computer one morning and you have a blue or black screen.

Frightening!

There's only one way to really protect yourself and that is to have complete and appropriate backups.

You have to be ready and able to recover from a disaster.

Let me help you be ready.

Enjoy the lecture



Secure Backups - Part 1
12:49
Secure Backups - Part 2
16:32
+ Module 2 - Online
4 lectures 01:05:04

Millennial’s and Generation X would like to convince us that there is a new way of communicating.

They believe using tools like WhatsApp or Messenger make email obsolete.

They are right to some extent but the reality is very different.

Most communication between individuals and business and business-to-business is

still email.

And it's growing contrary to believe! Studies around 2017 determined that there

were more than 3 and 1/2 billion email users in the world.

We expect this to rise to more than 4.3 billion by 2022

This is one of the reasons that email remains a huge security threat.

Phishing delivers more than 90% of malware.

Financial institutions rate email phishing as one of the top security threats.

They are spending many millions to try and protect their business against phishing.

The scary part of this story is that all the fancy tools. security software,

filters and firewall are useless while us humans remain the weakest link.

We, the humans, are allowing the incidents to happen due to not being alert.

Many of us simply don't have the knowledge, awareness and know what to look for.

In this lecture, I will help you to be better prepared.

The rest is up to you!

Email Security and Safety
19:23

They are everywhere!

Free public Wi-Fi hotspots have sprung up like mushrooms after a good rain.

These free access points (WI-FI hotspots) are available everywhere.

In restaurants, hotels, airports and even in shops.

Wherever you go, you can find a Wi-Fi hotspot.

All these perks come at a price!

Very few people understand the risks associated with these connections.

In this lecture, we are going to show you how to do your business, surfing or research and remain safe!


The free internet access is so great!

Now you can have free access to the internet and you don't have to use your mobile data!

What a pleasure!

The hackers have found a new playing ground.

The free unprotected Wi-Fi is giving them an easy way into your computer!

Injecting spyware!

In this lecture, I will discuss the threats and show you how to protect yourself.

Enjoy the lecture

Safety Online
15:04
Online Safety for Parents and Children
20:26

We all like travelling. Thousands of people travel on a daily basis.

Travelling, in your own country or abroad has its security issues. Both personal and for your cyber-security.

Regular business travellers pleasure-seekers must be very alert at all times. Regular travellers are not always so alert as they should be. Even if you are used to travelling, be alert! That sensitive business information you have with you might be the target of criminals that are targeting them for that information.

In previous lectures, you have learnt how to protect yourself under normal circumstances.

Now learn what else you should be doing while travelling!

In this lecture, I will help you to be a little bit safer both in your capacity or your tech stuff!


Enjoy the lecture!


Safety when travelling
10:11