Internet Safety - How to stay safe online
5.0 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
118 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Internet Safety - How to stay safe online to your Wishlist.

Add to Wishlist

Internet Safety - How to stay safe online

A beginners guide to Internet safety. Learn online safety and how to protect yourself from hacks, attacks and scams.
5.0 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
118 students enrolled
Created by Phil Walters
Last updated 4/2016
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
  • 2 hours on-demand video
  • 2 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Describe the risks of accessing the Internet insecurely.
  • Describe how the Internet works.
  • Take the necessary steps to secure your home network from unwanted intrusions.
  • Configure desktops and laptops so that they are secure on the Internet.
  • Secure access to online applications, including email.
  • Identify scam and phishing emails.
  • Take the necessary steps to secure your data.
  • Maintain the privacy of key data on the Internet.
View Curriculum
  • This is a beginners course so no previous knowledge of IT security is required.
  • To complete the exercises you will need to have login credentials for home network devices.

Have you ever wondered whether your home WiFi network is secure?
Do you worry about getting malware and computer viruses?
Have you ever received an email from your bank and you haven't been sure whether it was genuine?
Worrying isn’t it?

You probably connect to the Internet almost every day but you may have not thought much about Internet safety? This course will help you to answer some of these difficult question and help you to be safe online.

The course consists of video lectures with practical demonstrations on some of the key topics. There are also exercises for you to complete which hopefully will get you thinking about IT security in and out of the home. What sorts of things do we cover in the course?

  • Having a secure network at home is an essential foundation and in the section "Keeping your network secure" we look at topics such as securing your home Wi-Fi network and being secure when you are on the move.
  • We all have some many devices now that connect to the Internet. In the section "Securing computers, tablets and phones" we will look at how to secure all the different device types from Windows PCs to Smartphones.
  • You are probably the weakest link in staying safe online. In the section "People Security - Why you are the weakest link" we look at social engineering, email scams and privacy.

So why don’t you do something amazing, and sign up for this course. Surely your safety online is worth a couple of hours of your time?

Who is the target audience?
  • Anyone who is concerned about online security and wants to make changes to their home network.
  • Those who want to be better informed about the dark-side of the Internet so that they can protect themselves from insecure actions.
Curriculum For This Course
24 Lectures
Why is Internet security so important?
6 Lectures 23:23

This lecture introduces the course including my vision of why I wrote the course and what I hope to achieve from doing it.

Preview 02:55

What do you know about online security?
6 questions

There are a number of risks associated with going online and we will introduce these in this lecture. We will also look at how we can reduce risk by taking simple steps.

Preview 04:21

Ransomware is a special type of malware that encrypts your files and then demands a ransom to decrypt the files. This type of attack is on the increase and is a good illustration of the importance of defense in depth.

Real world example - Ransomware

You may have heard the term "phishing email" but what is it and how can you spot one? In this lecture we will look at real examples of phishing emails, including a demonstration of how easy it is for hackers to send phishing emails.

Real world example - Phishing

Can you spot a phishing email?
5 questions

Identity theft is a real risk when you go online. It is easy to inadvertently publish private information online that allows hackers to steal your identity. How can we protect our private information whilst we are online?

Real world example - Identity theft

Being secure online is all about defense in depth. In this lecture we will look at simple model to help us to understand what we need to do to stay safe online.

Internet security model that works for all users
Keeping your network secure
3 Lectures 21:21

Have you ever wondered how the Internet works? Well in this lecture we will look at how the Internet enables us to talk to websites on the other side of the world.

How does the Internet work?

Your home network probably consists of a wireless router connected to your Internet service provider. But how do you ensure that your home network is secure? In this lecture we will look at how to tighten up security on your home network.

How to secure your wireless network at home

What happens when we leave the home and still want to stay online by connecting to a public Wi-Fi network? In this lecture we look at how public Wi-Fi networks work and give advice about how you can stay safe.

How to stay safe when on the move

Network security at home
5 questions
Securing computers, tablets and phones
4 Lectures 16:38

Keeping our devices secure is an essential part of staying safe online. In this lecture we will look at the general principles of device security that apply to all device types.

Preview 03:28

Windows PCs and laptops have reputation for being vulnerable to attack so in this lecture we will look at the simple things we can do to make sure we minimize the risk of our Windows computers being compromised.

How to secure Windows PC and laptops

Apple Macs have had a reputation of being much more secure than Windows computers; however, in this lecture you will find out that Macs can be targeted and we should taking some security precautions.

How to secure Apple MACs

What steps should we take to secure our tablets and smartphones? These portable devices are easily forgotten but there are some steps we can take to secure them better.

Securing tablets and smartphones

Device security
4 questions
Online application security
4 Lectures 18:45

Online applications are the main way that we interact with the Internet so it is essential that we understand how to stay safe when we are using websites and apps.

Why is online application security so important?

How can you be sure that you can trust a website with your private information? In this lecture we will look at how certificate authorities provide a mechanism to be able to trust a website or app with confidential information like your payment details.

How can I trust a website with my private information?

Passwords are the key to the online world and we are not very good at managing them. In this lecture we will look at how to set a secure password and how to manage them using a password manager.

Managing passwords securely

Two-factor authentication uses something you know and something you have to log in to online applications. In this lecture we will look at how to configure it for secure websites such as payment sites and your email.

Protecting online applications with two-factor authentication

Online application security
4 questions
Data security
3 Lectures 11:17

It is easy to forget that data, such as documents and photos, is our "crown jewels" and we should take steps to protect it. In this lecture we will outline why data security is so important.

Introduction to data security

In this lecture we will look at practical ways that you can protect your data including physical security, encryption and securing data on cloud systems.

Protecting your data

Backing up data protects us against data loss due to mistakes, hardware failure or a malware attack. In this lecture we will look at different ways that we can backup our data.

The importance of data backup
People Security - Why you are the weakest link
3 Lectures 15:24

Social engineering is the manipulation of people to commit fraud or reveal confidential information. In this lecture we will look at what social engineering is and how you can counter it.

What is social engineering?

It is very easy to reveal too much private information online. In this lecture we will look at the risks of revealing private information and how to stay safe on social media apps.

Protecting your privacy online

Email is the preferred delivery method for malware and scams. In this lecture we will look at how we can protect ourselves against email scams by having good awareness.

All things email
Where next?
1 Lecture 01:35

In this final lecture of the course we will look at how you can keep on learning about online security.

Keep learning about online security
About the Instructor
Phil Walters
4.4 Average rating
79 Reviews
4,020 Students
4 Courses
IT trainer, expert in IT security and email archiving.

I am a freelance trainer, course developer and consultant based in the UK. I absolutely love communicating IT through face-to-face and online courses. I have worked in IT for 27 years with 19 years experience as a technical trainer teaching email administration, email archiving, IT security and networking. I also have 10 years experience of developing online training courses at Symantec. I used to be a rocket scientist a long time ago!