Cyber Security: Beginner's Training Guide to Online Safety!

Tips and tricks that teach you how to be safer online so you can prevent malware infections, scams, and identity theft.
4.5 (15 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
1,175 students enrolled
25% off
Take This Course
  • Lectures 52
  • Length 3.5 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 10/2015 English

Course Description

Does it seem like your computer is constantly getting bombarded with ads, popups, or scammy emails?

Maybe you suddenly can't use your PC because of some random screen that claims you have a bad infection and just pay them some money and they can have it removed.

Even worse, you start noticing odd charges on your credit card bill that you know wasn't made by you (unless you did actually buy that 25th anniversary edition pet rock - no judgement).

It doesn't have to be this way!

Most times, many of the bad things mentioned above happen to you because of actions you take on accident. You think that by clicking on a button that tells you to "Click here to scan your PC" or receiving a phone call from Microsoft warning you that you have a virus, that you are doing the right thing.

But, it's these exact things that are opening up your systems to the bad guys!

Cyber Security: Beginner's Training Guide to Online Safety is a course that comes from over 23 years of working with computers and seeing how making some simple changes can protect you and your PC from potential threats. Whether a single user, family, or business with hundreds of employees, these lectures and videos will walk you through step-by-step what to do and not to do.

Let's build a community of users that can learn from each other!

Cyber Security: Beginner's Training Guide to Online Safety will be updated over time with advice and examples from you, our users, so that we can all benefit from shared experiences and grow in the process. Remember, there's no shame or judgement if you accidentally ran across something that tricked you into getting infected or worse. Share your story and we can all benefit from your knowledge.

CompuTerrors wants your feedback!

Please tell us how we're doing and what you want to see in each training. We greatly value you as our students and believe in continually improving our courses.

What are the requirements?

  • Course examples shown using Windows but it isn't required for lecture concepts

What am I going to get from this course?

  • Prevent identity theft
  • Spot Email spam & scams
  • Make online purchases safe & secure
  • Avoid malware infections on your PC
  • Choose stronger passwords and manage them easily
  • Browse the Web safely
  • Post to social networks with privacy in mind
  • Keep your phones free of viruses

Who is the target audience?

  • This course is meant for beginners or anyone that wants a refresher in how to be safer online. The examples are shown in Windows 10 as well as Microsoft Office 2013 (365) but the lecture concepts can be applied to any environment.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Welcome to Cyber Security & Internet Safety

Welcome to the Cyber Security and Internet Safety course!

Throughout this course, we'll be covering the following topics:

  • Web Browsing
  • Email
  • Malware
  • Identity Theft
  • Social Networking
  • Phones
  • Passwords

Please don't hesitate to ask questions or request clarification on any of the subject matter.

Section 2: Web Browsing

Welcome to the Web Browsing section!

We'll be covering the following topics:

  • Click Bait
  • Search Engine Ads
  • Torrents
  • File Downloads
  • Privacy

Don't get lured into bad places online or accidentally follow a misleading ad by avoiding click bait.


Watch a screencast of how to avoid click bait using popular Windows web browsers.


Sometimes, if you're not paying close attention, you can click on a search engine ad instead of where you actually wanted to go. This can lead to frustration or possibly lead you to places that can get you into trouble.


Watch a screencast of what search engine ads look like and where they're located in Google, Bing, and Yahoo.


Only use torrents for legal means and be very careful not to stumble into files that contain hidden malware.


There are many types of files that can be downloaded on the Web and we'll cover what to be careful of when dealing with them in your browser.


Watch a screencast on what to look out for when downloading online and how easy it can be to quickly be offered dangerous files.


Find out how you can tell the difference between non-secure (http) and secure (https) web browser connections on the Internet.


Watch a screencast of what the differences are between http and https and how they look in Google Chrome, Mozilla Firefox, and Microsoft Edge.


There are numerous privacy settings in every web browser and you should familiarize yourself with them so you can know what personal information you're sharing online.


Watch a screencast of where the privacy settings can be found in Google Chrome, Mozilla Firefox, and Microsoft Edge.

Section 3: Email

Welcome to the Email section!

We'll be covering the following topics:

  • Link Hovering
  • Attachments
  • Scams
  • Spam
  • Rules

By hovering your mouse over links before clicking them, you can quickly see if you might end up visiting a bad location or web site.


Watch a screencast of how easy it is to see where a link is pointing to before actually clicking it.


There are many kinds of email attachments that you might be exposed to and we'll cover the most common and what to look out for.


Email scams are unfortunately all too common so we'll discuss how to recognize them and avoid potential danger.


Watch a screencast of actual scam emails saved over time and what to look for in identifying potentially harmful messages.


There are several settings you can utilize to reduce the amount of spam emails you receive in your inbox and we'll cover them in this lecture.


Watch a screencast of where to find and how to use common spam filter settings in Microsoft Outlook 2013 (365).


Email rules allow greater control and customization over incoming messages and we'll talk about what you can do with them.


Watch a screencast of how to set up some sample email rules using Microsoft Outlook 2013 (365).

Section 4: Malware

Welcome to the Malware section!

We'll be covering the following topics:

  • Categories
  • How They Get In
  • Signs of Infection
  • Cleaning Up

There are different categories of malware that do different things to your PC. We'll go over the most common and what makes each unique.


Malware can get into your computer in many ways so we will discuss the most common and how to avoid getting infected in the first place.


Even with diligence you still might get infected with malware but you may not realize the signs. In this lecture, we'll discuss how your computer may act that can tell you something might be wrong.


Even if you're infected by a virus or malware, there are several tools available to help you diagnose and remove them safely. We'll cover some free tools as well as some built into Windows that can get your system back in tip top condition.


Watch a screencast where I demo some built-in Windows tools and how to use them in removing malware.

Section 5: Identity Theft

Welcome to the Identity Theft section!

We'll be covering the following topics:

  • Social Engineering
  • Online Purchases
  • Fake Calls

Many times the bad guys don't even have to use high-tech ways to get your information. They can use your kindness or social means of engineering the sharing of your personal information.


There's nothing wrong with making online purchases, especially since there's such a diverse marketplace available only a click away, but we'll discuss what to do to make these purchases as safe as possible.


Nowadays scammers are getting even more brash by calling their victims directly to try and gain their personal or financial information. Learn what to look out for and how to avoid giving up your vital information to them.

Section 6: Social Networking

Welcome to the Social Networking section!

We'll be covering the following topics:

  • Facebook & Twitter
  • Dating & Meetup Sites

We love using social networks but there are several things to keep in mind when using these tools.


If you've taken the next step and are meeting someone offline that started online, there are specific concerns that you should think about before showing up.

Section 7: Phones

Welcome to the Phones section!

We'll be covering the following topics:

  • App Downloads
  • App Permissions
  • Picture Data (EXIF)
  • Sharing Information

There are safer places to download your apps and some sketchy ones, so we'll go over how to be careful so you can keep your phone nice and healthy.


Tons of app permissions are available and some developers abuse these which can give away your personal information. We'll discuss what to look for when deciding whether or not to download that next phone app.


You might be storing private GPS location information about yourself every time you take a picture with your phone! We'll talk about how to change these settings and remove this data in existing photos.


Watch a screencast that shows some ways you can remove GPS data from your photos.


It just takes a second to share something using your phone and this lecture will help guide you into safer ways of thinking before possibly making a mistake.

Section 8: Passwords

Welcome to the Passwords section!

We'll be covering the following topics:

  • Strength
  • Management Software
  • Login Awareness
  • Multi-Factor

Passwords are your first line of defense against people trying to break into your computers or accounts. It's very important to choose stronger ones and here are some simple tips that will help.


We'll go over how easy it can be to use stronger security and logins without the hassle of trying to remember them by using password management software.


Watch a screencast of how to use KeePass, a free password management software that's both easy and secure.


You can use social networking sites as a way of logging into other web sites but we'll discuss why you should be aware of what kinds of data you might be sharing when doing this.


For very secure purposes, such as online banking or employee logins, you may want to set up multi factor authentication. We'll discuss what this is and why it adds another layer of security to passwords alone.

Section 9: Conclusion

Congratulations on completing the Cyber Security and Internet Safety course!

By using the tools and techniques you've learned throughout these lectures you'll greatly enhance your security on the Internet and across all your devices.

Course Updates

Please use this resource list to get all the free tools and help that was referenced throughout the course.


We greatly value our students and would love to make a stronger connection with you at some of our social sites listed. Like us, follow us, and check out our YouTube channel for free content!

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Jeff Przybylski, Head of CompuTerrors

For over 23 years, Jeff has tirelessly battled the terrors that strive to take over our computers, servers, networks, and devices. Throughout this time, he's supported many home/business users and data centers of various shapes and sizes in Silicon Valley and across the country.

In between fighting computers bent on world domination, Jeff has obtained several industry certifications, including Microsoft Certified Professional, Microsoft Certified Desktop Support Technician, CompTIA A+ and Network+ certifications.

Ready to start learning?
Take This Course