Internet Safety - How to stay safe online

A beginners guide to Internet safety. Learn online safety and how to protect yourself from hacks, attacks and scams.
5.0 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
111 students enrolled
25% off
Take This Course
  • Lectures 24
  • Length 2 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works


Find online courses made by experts from around the world.


Take your courses with you and learn anywhere, anytime.


Learn and practice real-world skills and achieve your goals.

About This Course

Published 4/2016 English

Course Description

Have you ever wondered whether your home WiFi network is secure?
Do you worry about getting malware and computer viruses?
Have you ever received an email from your bank and you haven't been sure whether it was genuine?
Worrying isn’t it?

You probably connect to the Internet almost every day but you may have not thought much about Internet safety? This course will help you to answer some of these difficult question and help you to be safe online.

The course consists of video lectures with practical demonstrations on some of the key topics. There are also exercises for you to complete which hopefully will get you thinking about IT security in and out of the home. What sorts of things do we cover in the course?

  • Having a secure network at home is an essential foundation and in the section "Keeping your network secure" we look at topics such as securing your home Wi-Fi network and being secure when you are on the move.
  • We all have some many devices now that connect to the Internet. In the section "Securing computers, tablets and phones" we will look at how to secure all the different device types from Windows PCs to Smartphones.
  • You are probably the weakest link in staying safe online. In the section "People Security - Why you are the weakest link" we look at social engineering, email scams and privacy.

So why don’t you do something amazing, and sign up for this course. Surely your safety online is worth a couple of hours of your time?

What are the requirements?

  • This is a beginners course so no previous knowledge of IT security is required.
  • To complete the exercises you will need to have login credentials for home network devices.

What am I going to get from this course?

  • Describe the risks of accessing the Internet insecurely.
  • Describe how the Internet works.
  • Take the necessary steps to secure your home network from unwanted intrusions.
  • Configure desktops and laptops so that they are secure on the Internet.
  • Secure access to online applications, including email.
  • Identify scam and phishing emails.
  • Take the necessary steps to secure your data.
  • Maintain the privacy of key data on the Internet.

Who is the target audience?

  • Anyone who is concerned about online security and wants to make changes to their home network.
  • Those who want to be better informed about the dark-side of the Internet so that they can protect themselves from insecure actions.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.


Section 1: Why is Internet security so important?

This lecture introduces the course including my vision of why I wrote the course and what I hope to achieve from doing it.

What do you know about online security?
6 questions

There are a number of risks associated with going online and we will introduce these in this lecture. We will also look at how we can reduce risk by taking simple steps.


Ransomware is a special type of malware that encrypts your files and then demands a ransom to decrypt the files. This type of attack is on the increase and is a good illustration of the importance of defense in depth.


You may have heard the term "phishing email" but what is it and how can you spot one? In this lecture we will look at real examples of phishing emails, including a demonstration of how easy it is for hackers to send phishing emails.

Can you spot a phishing email?
5 questions

Identity theft is a real risk when you go online. It is easy to inadvertently publish private information online that allows hackers to steal your identity. How can we protect our private information whilst we are online?


Being secure online is all about defense in depth. In this lecture we will look at simple model to help us to understand what we need to do to stay safe online.

Section 2: Keeping your network secure

Have you ever wondered how the Internet works? Well in this lecture we will look at how the Internet enables us to talk to websites on the other side of the world.


Your home network probably consists of a wireless router connected to your Internet service provider. But how do you ensure that your home network is secure? In this lecture we will look at how to tighten up security on your home network.


What happens when we leave the home and still want to stay online by connecting to a public Wi-Fi network? In this lecture we look at how public Wi-Fi networks work and give advice about how you can stay safe.

Network security at home
5 questions
Section 3: Securing computers, tablets and phones

Keeping our devices secure is an essential part of staying safe online. In this lecture we will look at the general principles of device security that apply to all device types.


Windows PCs and laptops have reputation for being vulnerable to attack so in this lecture we will look at the simple things we can do to make sure we minimize the risk of our Windows computers being compromised.


Apple Macs have had a reputation of being much more secure than Windows computers; however, in this lecture you will find out that Macs can be targeted and we should taking some security precautions.


What steps should we take to secure our tablets and smartphones? These portable devices are easily forgotten but there are some steps we can take to secure them better.

Device security
4 questions
Section 4: Online application security

Online applications are the main way that we interact with the Internet so it is essential that we understand how to stay safe when we are using websites and apps.


How can you be sure that you can trust a website with your private information? In this lecture we will look at how certificate authorities provide a mechanism to be able to trust a website or app with confidential information like your payment details.


Passwords are the key to the online world and we are not very good at managing them. In this lecture we will look at how to set a secure password and how to manage them using a password manager.


Two-factor authentication uses something you know and something you have to log in to online applications. In this lecture we will look at how to configure it for secure websites such as payment sites and your email.

Online application security
4 questions
Section 5: Data security

It is easy to forget that data, such as documents and photos, is our "crown jewels" and we should take steps to protect it. In this lecture we will outline why data security is so important.


In this lecture we will look at practical ways that you can protect your data including physical security, encryption and securing data on cloud systems.


Backing up data protects us against data loss due to mistakes, hardware failure or a malware attack. In this lecture we will look at different ways that we can backup our data.

Section 6: People Security - Why you are the weakest link

Social engineering is the manipulation of people to commit fraud or reveal confidential information. In this lecture we will look at what social engineering is and how you can counter it.


It is very easy to reveal too much private information online. In this lecture we will look at the risks of revealing private information and how to stay safe on social media apps.


Email is the preferred delivery method for malware and scams. In this lecture we will look at how we can protect ourselves against email scams by having good awareness.

Section 7: Where next?

In this final lecture of the course we will look at how you can keep on learning about online security.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Dr Phil Walters, IT trainer, expert in IT security and email archiving.

I am a freelance trainer, course developer and consultant based in the UK. I absolutely love communicating IT through face-to-face and online courses. I have worked in IT for 27 years with 19 years experience as a technical trainer teaching email administration, email archiving, IT security and networking. I also have 10 years experience of developing online training courses at Symantec. I used to be a rocket scientist a long time ago!

Ready to start learning?
Take This Course