Protect Your Digital Identity
4.1 (3 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
944 students enrolled

Protect Your Digital Identity

Defend against Identity Attacks
4.1 (3 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
944 students enrolled
Published 5/2018
English
English [Auto]
Current price: $16.99 Original price: $24.99 Discount: 32% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1 hour on-demand video
  • 3 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • The Students will understand the basic concepts of Identity Theft and Ransomware.
  • Understanding how to stay protected from Ransomware Attacks
  • Understanding how to Protect their Digital Identity
Requirements
  • A Computer or a Smart Phone connected to the internet.
  • Basic Understanding of the Computers and the Internet.
  • Interest to learn the fundamentals of Cyber Security.
Description

We bring out our new Course on Protecting your Digital Identity and Curbing off all the End User based Attacks targeted regularly. This course gives an in-depth perception on the Advanced Identity Theft and Ransomware based attacks and also to protect ones privacy. We train the students on different tools and applications that could be used to protect their individual privacy. And overall it would be a fun way to learn Security. 

Who this course is for:
  • Technical & Non - Technical Internet Users
  • Students
  • Beginners in Information Security
Course content
Expand all 17 lectures 01:13:23
+ Privacy
5 lectures 17:07
Using Proxies
02:15
Using a Password Manager - LastPass
05:00
Blocking Unwanted Annoying Ads
03:51
+ Passwords
5 lectures 09:34
Top Worst Passwords
00:58
Why Use a Password Manager
02:55
What is Multi Factor Authentication
03:28
Mobile 2FA - Types
02:13
Twitter 2 Factor Authentication
Processing..