Creating Strong and Memorable Passwords
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
0 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Creating Strong and Memorable Passwords to your Wishlist.

Add to Wishlist

Creating Strong and Memorable Passwords

learn how to keep you and your family safe and secure with secure passwords!
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
0 students enrolled
Last updated 5/2016
Current price: $10 Original price: $25 Discount: 60% off
5 hours left at this price!
30-Day Money-Back Guarantee
  • 40 mins on-demand video
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand why passwords used today aren't as strong as they should be
  • Be able to create a strong password using two different methods
  • Be able to explain the two methods for creating strong passwords and how they differ
  • Be able to create strong password hints
  • Understand that passwords also need to be protected and have an idea of how to do this
View Curriculum
  • Students should already be familiar with what a password is, and where they are used.

Do you use passwords for places like your Facebook or Email accounts? Do you worry about your password being hacked? Then this is the course for you.

Since we all started creating passwords, they were designed to be difficult for a human to guess. Being short and using random numbers and letters worked wonders. Since computing power has increased exponentially, these passwords now are not only hard for humans to remember, they're super easy for a computer to guess.

We've all been ingrained with the notion of how to create a secure password, but times have changed; and now the way you select your passwords needs to change, too. This course dives into why most passwords used today are weak, and how to make the switch to start creating passwords using two simple methods. We'll also touch on how password hints can be dangerous, how to protect your password and why those password strength meters might be lying to you!

Who is the target audience?
  • This course is meant to help anyone, regardless of their experience or skill level with creating a strong password. Students should have an understanding of what a password is, and where they are used.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
2 Lectures 03:58

Welcome to the course! We talk about what to expect and the topics we'll cover.

Preview 02:12

Think you're not a target? Think again. Learn how anyone can be a target for an attacker and how your weak password could be putting your information, or your organization, at risk.

Preview 01:46
What's So Wrong With My Password?
3 Lectures 07:09

What exactly is wrong with the password you're using today? We explore this in this lecture.

Preview 02:18

Contrary to old wisdom, there are actually many things you should never use in a password. Chances are, you're using some of these six things right now.

Six Things You Should Never Use In a Password

Your password hint could be giving away your password without you even knowing it. Here we explore some of the pitfalls of a password hint and how to create a good password hint.

Preview 03:03

Knowledge Check
3 questions
Using Methods to Create Passwords
1 Lecture 03:38

In this lecture, we will explain why you should be using a method to create your passwords, rather than picking things at random. Then we'll introduce the methods we are going to cover in this course.

The Methods
The Complex Password Method
3 Lectures 04:58

We introduce the first method, the Complex Password Method

The Complex Password Method

Some examples of passwords created using the Complex Password method

The Complex Password Method: Examples

Some of the advantages and disadvantages to this method that you should be aware of.

Advantages & Disadvantages to the Complex Password Method

Knowledge Check
4 questions
The Passphrase Method
3 Lectures 04:44

We introduce the second method, the Passphrase Method.

The Passphrase Method

Some examples of passwords created using the Passphrase Method.

The Passphrase Method: Examples

Advantages and disadvantages of the passphrase method that you should be aware of.

Advantages & Disadvantages to the Passphrase Method

Knowledge Check
4 questions
Best Practices
2 Lectures 10:36

A secure password isn't secure all by itself. It can still be compromised by improper storage, or typing it into a fraudulent form. In this lecture, we'll explain the importance of always maintaining proper password separation, that is, never using the same password twice. Also, we'll go over when and why you should be changing your passwords.

Preview 04:50

In this lecture, we'll discuss how to keep your passwords secure when you're not using them by storing them somewhere. We'll go over writing them down and introduce password managers.

Remembering all those passwords

Knowlege Check
4 questions
Bonus Material
1 Lecture 04:40

Believe it or not, not all strength meters are accurate! Also, attached this lecture is the bonus cheat sheet and course notes.

Not all Password Strength Meters are Created Equal
About the Instructor
Think Cyber Secure
0.0 Average rating
0 Reviews
0 Students
1 Course
Teaching People How to Be Safe and Secure Online

Who We Are

At Think Cyber Secure, our mission is to help individuals stay safe and secure online. When we're at work, there are teams of people dedicated to watching out for us. Once at home and left to our own devices, the task can be overwhelming, especially with new technology being introduced at break neck speeds.

With the news headlines of ransomeware affecting thousands of people, passwords being stolen and other personal security risks becoming ever more frequent, the question "am I secure online?" is becoming a difficult question to answer. Let us help you!

Your Instructor

Our primary instructor, Derek, has over four years experience in both information and operational security. Not only as a consultant, but also as a researcher, he is at the forefront of many of the cyber security issues of today. He has created multiple cyber security awareness and education programs in his professional career ranging from using strong passwords, to phishing, to detecting scammers. He has also been successful in tailoring this training for many audiences, including office workers, critical infrastructure engineers and non-technical staff. All of which have been well received by many.