Online Privacy and Security
4.1 (7 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
26 students enrolled

Online Privacy and Security

Create Your Action Plan
4.1 (7 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
26 students enrolled
Created by Nicole Hennig
Last updated 9/2018
English
English [Auto]
Current price: $62.99 Original price: $89.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1.5 hours on-demand video
  • 20 articles
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Use best practices for protecting your privacy and security online.
  • Offer workshops for others about privacy and security.
  • Create a security action plan for your own data.
  • Continue your learning with the course bibliography.
Requirements
  • You’ll need your own computer and/or mobile devices (Android or iOS) and the ability to download and install apps on them.
  • There are free versions or free trials for every app that I recommend, but you may want to consider paying for pro versions of some of the tools that you find most valuable.
Description

It seems like every day you hear of a new data breach. Is security dead?
If you read today’s headlines about security breaches, you might be thinking of going back to fax machines and snail mail. Or you might be assuming that privacy is dead and we may as well get used to it (and you have nothing to hide, right?)

There is no such thing as perfect security, but you can learn to greatly decrease your chances of something bad happening.
While there is no such thing as foolproof security and privacy, there is a middle ground that you can find by understanding and using particular techniques.

------------------

Comments from students who took this course as a live workshop or as an online course from the American Library Association
"Nicole’s workshop is so pertinent to today’s concerns with privacy and the internet. She gave extraordinary information on how to be safer in the digital age. We can’t wait for Nicole to offer more workshops for our staff!" -Rachel Rooney, IT/Reference Librarian, West Tisbury Library, Massachusetts

"This truly is the best online course I have ever taken! " - Linda Azen Martin, Santiago Canyon College, Seal Beach, CA


Who this course is for:
  • Anyone who worries about online privacy and security and hasn't had time to figure out what tools and apps to use.
  • Intelligent people who don't feel up-to-date on the best practices for their own security and privacy.
  • This course was originally designed for librarians and teachers who want to offer workshops about privacy and security to others, but it's appropriate for any computer-literate person.
Course content
Expand all 40 lectures 01:53:47
+ Welcome!
2 lectures 04:02

Learn what the course will cover and how to participate.

Preview 03:51

Take this quiz before the course to see your current level of knowledge. Take it again after the course to see what you've learned.

Cybersecurity Knowledge Quiz
00:11
+ Protecting Your Data
8 lectures 21:49

Learn why it's important to have both local and remote backups of all your computers and mobile devices.

The Importance of Regular Backups
07:38

Learn to set up Find My iPhone (or the Android equivalent), and how to use it if your device is lost or stolen.

What to Do if Your Device is Lost or Stolen
02:15

Learn about ransomware and how to protect yourself from it.

Protecting Yourself from Ransomware
02:53

Learn how to protect your data when using public Wi-Fi networks, by using a VPN (Virtual Private Network).

Protecting Your Data on Public Wi-Fi
04:16

Learn about Apple Pay and Google Pay and why using them is safer than using your credit card.

Using Mobile Payment Systems
02:11

Try your hand at using these best practices. Follow the links to get help with each tool or service.

Hands-on Assignments
01:12

Enrich your learning by reading these informative articles.

Readings for this Unit
01:12

Use the Q & A section to comment and ask questions.

Add Your Questions or Comments
00:11
+ Authentication
6 lectures 33:55

Learn why security experts recommend using a password manager. See how one works, and learn why it's extremely unlikely that the password manager itself could be hacked.

Using a Password Manager
13:00

Learn about two-factor authentication and why it's a good idea to set it up for your most important online services.

Two-Factor Authentication
04:35

Learn about biometric identification, using Apple's Touch ID and Face ID as examples.

Preview 14:18

Try your hand at using these best practices. Follow the links to get help with each tool or service.

Hands-on Assignments
00:51

Enrich your learning by reading these informative articles.

Readings for this Unit
01:01

Use the Q & A section to comment and ask questions.

Add Your Questions or Comments
00:09
+ Breaches and Identity Theft
4 lectures 10:07

Learn how data breaches happen and how you can find out if your username & password (or other data) has been exposed in a breach. Learn what to do if it has.

Data breaches and identity theft
09:08

Try your hand at using these best practices. Follow the links to get help with each tool or service.

Hands-on Assignments
00:17

Enrich your learning by reading these informative articles.

Readings for this Unit
00:35

Use the Q & A section to comment and ask questions.

Add Your Questions or Comments
00:06
+ Privacy
9 lectures 30:01

Learn about targeted advertising (why do you see ads all over the Internet for things you've been browsing on other sites?) and how to use an ad-blocker.

Targeted Advertising
04:43

Learn how to keep your web browsing and searching private (from snoopy friends & family, and also from Google or your ISP).

Private Browsing and Searching
05:09

Learn how to control your location data -- see the history of what Google knows about where you've been, and learn to delete specific locations or all of your location history.

Preview 06:19

Learn about a service called TOR (The Onion Router) that lets you browse the web anonymously (mostly).

Anonymous Browsing with TOR
02:27

Learn to keep your text messages and phone calls private (with encryption), by using an app called Signal.

Encrypted Messaging with Signal
05:08

Learn to keep your email private by using encrypted email services like ProtonMail.

Encrypted Email: ProtonMail or Mailvelope
04:05

Try your hand at using these best practices. Follow the links to get help with each tool or service.

Hands-on Assignments
01:05

Enrich your learning by reading these informative articles.

Readings for this Unit
00:57

Use the Q & A section to comment and ask questions.

Add Your Questions or Comments
00:08
+ Multimedia Issues
5 lectures 07:29

Is your webcam spying on you? Learn how this can happen and what to do about it.

Webcam Hacking
02:32

Learn to control your privacy if you have an Amazon Echo device with Alexa or a Google Home. Learn to delete individual recordings or all of your history.

Voice Computing: Alexa, Google Home
03:57

Try your hand at using these best practices. Follow the links to get help with each tool or service.

Hands-on Assignments
00:22

Enrich your learning by reading these informative articles.

Readings for this Unit
00:32

Use the Q & A section to comment and ask questions.

Add Your Questions or Comments
00:06
+ Making Your Security Plan
6 lectures 06:21

Learn the best practices for creating a security and privacy plan for your own data. Learn what questions to ask yourself for each kind of data you deal with, and use a sample template for creating your plan.

Creating Your Security and Privacy Plan
02:32

Learn to offer workshops or other training for the general public about security and privacy.

Helping Others with Security & Privacy
02:22

Try your hand at using these best practices. Follow the links to get help with each tool or service.

Hands-on Assignments
00:10

Enrich your learning by reading these informative articles.

Readings for this Unit
00:37

Use this list of the best resources to further your learning.

Bibliography
00:33

Use the Q & A section to comment and ask questions.

Add Your Questions or Comments
00:06