Insider secrets from an Ethical Hacker on Internet Safety
4.9 (7 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
69 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Insider secrets from an Ethical Hacker on Internet Safety to your Wishlist.

Add to Wishlist

Insider secrets from an Ethical Hacker on Internet Safety

A complete and effective on-line learning program to keep up with the rapidly changing digital landscape
4.9 (7 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
69 students enrolled
Created by Terry Cutler
Last updated 6/2017
Current price: $10 Original price: $35 Discount: 71% off
5 hours left at this price!
30-Day Money-Back Guarantee
  • 7 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Identify threats to your computer or mobile device
  • Know if too much online personal information is being shared
  • Create a secure and unbreakable password and enabled advanced Security features
  • Optimize and monitor your public image and profile all the while being able to identify fake profiles
  • Filter internet content while keeping your files and data off of the web and guidelines for Cloud Safety
  • Know if your children have been compromised
  • Keeping seniors safe by spotting scam artists and stalkers
  • Understand what is cyber bullying and the psychological explanation behind the phenomenon. How to identify, collect evidence and report cyber bullying
  • Understand what viruses and trojans are and the most telltale signs that you may have been infected
View Curriculum
  • None

As an Internet Safety expert and professional hacker, I’ve been a witness to the good and dark side of the Internet. What is a gateway to connect socially and to learn has also become a haven for cyberbullies and predators intend on harming our children and taking advantage of our senior citizens. Protecting families has become my passion. Now, I’m offering an ongoing video series with up to date simple tips and tricks and “insider secrets” for protecting families who are increasingly online.

My videos will show you the Internet’s dark side many of our children are experiencing while online and connecting through social media sites. I’ll show you how to Google yourself, search out fake profiles, recognize changes in the behaviours of family members, how to block objectionable material, create unbreakable passwords - encouraging us all to assume a safety mindset toward the Internet.

Here's what you'll learn...

Tightening Your Computer Security: I often inspect computers which have already been infected. This is because these computers have too much “access enabled” that easily facilitates a virus infection. I’ll walk you through how to correct this on a Mac and PC. We’ll perform a checkup to make sure your browser is configured for safe and convenient browsing. I’ll guide you using simple tools that allows you to find out if you’ve already been hacked or being spied on by hackers, or by someone you already know. I’ll also walk you through step-by-step how to create an unbreakable password.

Staying Safe Online: In this module, I’ll explain why and how hackers and scammers are targeting and tricking you into clicking when you shouldn’t. I’ll teach you how Internet predators groom children and who are profiled as the perfect victims. I’ll even show you how to search for unknown information about yourself.

Social Networking safety: Here I’ll walk you through how to lock down your personal accounts on the most popular social media sites. I’ll even walk you through step by step how to perform a Facebook privacy checkup, and how to spot a fake profile. This is very handy to use on dating sites. I’m sure you’d rather learn to do a few clicks rather than risking going on that date.

Addressing Cyber Bullying, Revenge Porn and Sextortion: In this “Cyber Bullying, Revenge Porn and Sextortion” module, we’ll cover what it is, its seriousness and how to properly and safely respond to cyber harassment.

Mobile Security: Your entire world is on your mobile device. In this “Mobile Security” module, I’m will guide you on how to secure your device and set it up for “self-destruct mode” if it was lost or if someone is trying to crack your code. I’ll teach you how to enable automated backups, and finally how not to get bill shock whenever you lend your child your phone.

Internet Scams: I’ll show you how to avoid getting hacked or scammed by dissecting a few sample emails I’ve received over the years. We’ll discuss a very serious type of malware called Ransomware that generates billions of dollars for cyber criminals.

Solutions and Strategies: In this “solutions and strategies” modules, we’ll talk about how parents and children can work together and share online experiences to facilitate online safety. I’ll discuss monitoring tools to install on your PC or router so that you can trust and verify what your children are doing online.

Conclusion: I’ll offer you my two cents on what threats are on the horizon, for example, when your fridge, toaster and car are connected into the Internet.

Who is the target audience?
  • This course is designed for anyone who wants to be safe online
  • Parents
  • Teachers & Educators
  • Children
  • Law Enforcement
  • Corporations looking to train their employees end users against hackers
Compare to Other Ethical Hacking Courses
Curriculum For This Course
91 Lectures
Tightening your computer security
19 Lectures 01:10:02

Updating Windows 7 to prevent hacking Part 2 of 4

Updating Windows 8 to prevent hacking Part 3 of 4

Updating Windows 10 to prevent hacking Part 4 of 4

How to update and maintain your Mac to prevent hacking Part 5 of 5

Enabling real-time threat detection for Windows and Mac Part 1

Enabling real-time threat detection for windows 7 Part 2

Enabling real-time threat detection for Windows 8 Part 3

Enabling real-time threat detection for Windows 10 Part 4

Enabling real-time threat detection for Mac Part 5

Securing Windows 7,8,10 Operating Systems

Making sure your Windows Firewall is enabled

Scanning your computer for misconfigurations

How to create an unbreakble password

Physically protecting your computer from threats

Updating and Securing Google Chrome browse

Updating and Securing Mozilla Firefox browser

Updating and Securing your Safari browser

Updating and Securring Microsoft Internet Explorer browser
Staying Safe Online
8 Lectures 36:39
Why and how hackers and scammers are picking you

Give me 4 minutes, and I'll tell you if your windows PC has been hacked

Experiment: How hard is it to target you or your children online?

Performing advanced Google searching to reveal personal information

Acronyms and abbreviations

Getting to know Google's Chrome Password manager

Getting to know Microsoft Edge's Password Manager

How to clean up your email account after it was hacked
Social Networking safety
11 Lectures 29:39
Introduction to enabling advanced security for your logins

Enabling advanced security for Google

Enabling advanced security for iCloud

Enabling advanced security for Facebook

Enabling advanced security for Hotmail

Enabling advanced security for Instagram

Enabling advanced security for Twitter

Enabling advanced security for LinkedIN

Dangers of quizzes and status updates

Fake profiles and dating sites
Internet Safety for kids presentation for adults
4 Lectures 25:55
Internet Safety for kids. A presentation for adults part 1 of 4

Internet Safety for kids. A presentation for adults part 2 of 4

Internet Safety for kids. A presentation for adults part 3 of 4

Internet Safety for kids. A presentation for adults part 4 of 4
Mobile Security
3 Lectures 13:43
Introduction to Securing your home router

Securing a home router

Public WiFi Safety tips and tricks
Dissecting Internet Scams
7 Lectures 30:10

Dissecting the top Internet Scams part 3

Dissecting the top Internet Scams part 4

Dissecting the top Internet Scams part 5

Dissecting the top Internet Scams part 6

Dissecting the top Internet Scams part 7
Conclusion and final thoughts
1 Lecture 04:16
Additional Information: Terry Cutler's TV interviews on cybercrime prevention
32 Lectures 02:46:21

Terry Cutler returns as a guest on Robert Scully's World Show
About the Instructor
Terry Cutler
3.9 Average rating
119 Reviews
5,531 Students
2 Courses
Certified Ethical Hacker, Cyologist™, Cyber Security Expert

Terry Cutler is a government-cleared cybersecurity expert (a certified ethical hacker), the Director of Cybersecurity at SIRCO Investigation and Protection, and the founder and Chief Executive Officer of the IT security and data defense firm Cyology Labs™ in Montréal, Canada. He specializes in the anticipation, assessment, and prevention of security breaches for governments, corporations, businesses, and consumers, as well as Internet Safety for Children.

As an award-winning information security strategist for almost 20 years, Mr. Cutler has advised some of Canada’s largest companies on how to prevent and remedy internal and external security penetration. For the general public, he developed an effective on-line learning program arranged in modules and updated regularly to keep up with the rapidly changing digital landscape in which “wild-west” internet bandits constantly seek and find ways to break into our lives.

Terry Cutler is a frequent contributor to national media reportage about cyber-crime, spying, security failures, internet scams, and the real social network dangers that families and individuals face every day.

Terry Cutler has coined the term Cyologist™ to describe what he does. His mission is to “help individuals and corporations protect themselves from data breaches and other online cyber threats through his videos, media appearances, coaching products and consulting services.”