Cyber Security For Normal People: Protect Yourself Online
4.3 (686 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
4,028 students enrolled

Cyber Security For Normal People: Protect Yourself Online

Lock hackers, identity thieves and cyber criminals out of your life for good with this step-by-step cyber security guide
4.3 (686 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
4,028 students enrolled
Created by Brad Merrill
Last updated 10/2017
English
English [Auto]
Current price: $59.99 Original price: $99.99 Discount: 40% off
2 days left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Become aware of the most common cyber security threats
  • Develop the right mindset and browsing habits for security
  • Secure your smartphone and all the information it knows about you
  • Easily create and manage strong, unique passwords for all of your accounts
  • Use two-factor authentication to add an extra layer of security to your accounts
  • Use encryption to make your private data unreadable to attackers
Requirements
  • You should be comfortable using your computer and smartphone
  • No prior security experience required—this is a beginner-level course
Description

This course is an actionable, step-by-step beginner's guide to locking hackers, identity thieves, and cyber criminals out of your life once and for all.

Today's reality is yesterday's science fiction.

You can have a real-time video conversation with someone on the other side of the planet, you can send and receive money without even taking out your wallet, and you can post content online that reaches millions of people in a matter minutes.

Unfortunately, the same technology that enables all this new freedom and convenience also exposes us to new security threats that we've never encountered.

Malware that infects your computer and watches everything you do, phishing scams that steal private information from millions of people—today's digital world is a criminal's playground. It makes the process of stealing money or even stealing someone's entire identity way more efficient.

The worst part? You are a target.

Many people neglect taking steps to protect themselves online because they think, "Why would anyone want to steal my information?"

Well, for starters, if you have any money to your name at all, there are plenty of tech-savvy criminals out there who are patiently waiting for the opportunity to take it from you.

Beyond that, they can also steal your identity to run up charges on your credit cards, open new utility accounts, get medical treatment using your health insurance, or take advantage of your friends and family by impersonating you on social media.

So what can you do?

You can protect yourself and your private data, and you don't have to be an IT expert to do it.

This course outlines a step-by-step roadmap that you can follow to build a tight wall of security around your digital life.

More specifically, here are some of the things we'll cover:

  • Why security matters, and how to best approach it
  • The most common security threats you should be aware of
  • How to develop the right mindset and browsing habits
  • How to secure your smartphone and all the private information it knows about you
  • The 25 most commonly used passwords (is yours on the list?)
  • What makes a good password (123456 is not a good password)
  • How to create and manage strong, unique passwords for all of your accounts (without needing to remember them)
  • How to lock attackers out of your accounts even if they manage to steal your passwords
  • A security hole that attackers can use to gain unfettered access to your accounts without knowing your passwords (and how you can defend yourself)
  • How to use the power of encryption to make your private data unreadable to attackers

Again, this is a beginner-level course. These are technical topics, but I hope to walk you through everything in a way that's actionable and easy to understand. (And if you have any questions along the way, all you have to do is ask.)

I'm confident that this course will change the way you look at security, and my confidence is backed by Udemy's 30-day money back guarantee. If you don't love it, you get a full refund—no questions asked. Not a bad deal, if you ask me.

If you haven't already, be sure to enroll in the course! I can't wait to see you inside.

Who this course is for:
  • Anyone who wants to protect themselves from the various security threats of the modern world
Course content
Expand all 35 lectures 01:39:02
+ Security Basics
3 lectures 10:05
The Importance Of Multi-Layer Security
01:56
The Most Common Security Threats
05:22
+ Mindset & Habits
5 lectures 17:16
Developing The Right Mindset And Habits For Security
00:39
Avoiding Malicious Sites And Applications
07:03
Why Software Updates Matter
02:02
Knowing (And Limiting) Yourself
02:38
+ Smartphone Security
4 lectures 06:04
Setting Up A Passcode Lock
01:58
Managing Third-Party App Permissions
01:20
Locating A Lost Or Stolen Smartphone
00:55
+ Passwords
4 lectures 21:11
The 25 Most Common Passwords (Is Yours On The List?)
03:48
Best Practices For Strong Password Security
05:24
Using A Password Manager
10:50
+ Multi-Factor Authentication
7 lectures 12:44
What Is Multi-Factor Authentication?
03:23
Types Of Mobile Two-Factor Authentication
02:06
LastPass Two-Factor Authentication
03:02
Google Two-Factor Authentication
01:34
Facebook Two-Factor Authentication
00:51
Twitter Two-Factor Authentication
00:35
Two-Factor Authentication For Other Services
01:13
+ Connected Apps
5 lectures 09:31
The Danger Of Rogue Connected Apps
02:37
Managing Connected Apps On Google
02:37
Managing Connected Apps On Facebook
01:14
Managing Browser Extensions/Addons
02:08
Staying Secure With Connected Apps And Extensions
00:55
+ Encryption
5 lectures 15:52
How SSL (HTTPS) Protects Your Passwords And Private Data
01:54
Encrypting Your Web Traffic With A Virtual Private Network (VPN)
04:37
How To Encrypt Your Computer's Hard Drive
04:26
How To Encrypt Your Smartphone
02:09