How To Keep Your Computer Safe From The Bad Guys
4.1 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
94 students enrolled
Wishlisted Wishlist

Please confirm that you want to add How To Keep Your Computer Safe From The Bad Guys to your Wishlist.

Add to Wishlist

How To Keep Your Computer Safe From The Bad Guys

This course is based off the same presentation I give to the FBI, DEA, colleges and high schools students.
4.1 (10 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
94 students enrolled
Created by Scott Ford
Last updated 5/2015
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Define common terms in the world of computer security.
  • Keep your computer safe at home, on the road, in the hotel, library and coffee shop.
  • Protect precious data, pictures and memories stored on the computer.
  • Protect yourself from malware like viruses, Trojans, worms and spyware.
  • Defend yourself from typical social engineering attacks like phishing, spam and shoulder surfing.
View Curriculum
  • The only thing you need to know before taking this course are some computer basics.
  • During the course I will show you some powerful and FREE programs that you can download.
  • The information you will learn here applies to both Windows and Macs.

Scott Ford, former FBI Cyber and DEA trainer, teaches you the basics of how to keep your computer and personal information secret. We delve into the basics of computer security that every computer user should know.

In this course we examine physical security, network security, Internet security, as well as social engineering. At the completion of this course you will know how to keep your computer safe.

This course is designed around a series of video lectures as well as links and recommendations to resources Scott has used to teach FBI Cyber, FBI CART, DEA, Intelligence Community agents as well as college and high school students.

Who is the target audience?
  • This computer security class is perfect for the neophyte, the new user or the person who just doesn't want to be a geek,
  • If you have formal computer training or have computer certifications this is not a class for you.
Compare to Other Cyber Security Courses
Curriculum For This Course
28 Lectures
Introduction To Computer Security
4 Lectures 06:10

Welcome to Introduction to Computer Security. When you have completed this video you will have a better understanding about what we will cover in this course. I want to thank you for joining me on this journey.

Preview 02:01

This Introduction To Computer Security course is based on a lecture I have given to FBI Cyber, FBI CART, DEA, US Intelligence Agents, college and high school students. At the end of this video you will know how I have organized this course.

Preview 01:44

At the end of this video you will know how to best take this Introduction To Computer Security class.

Preview 01:10

A quick knowledge check of materials presented in Section 1: Introduction To Computer Security.

Introduction To Computer Security
3 questions
Physically Protecting The Computer
3 Lectures 21:17

When you are done with this video you will be able to identify and describe the different types of electrical events that can damage your computer and other digital devices.

Preview 08:34

In the previous video you learned all about the different types of electrical events. At the end of this video you will be able to protect your computer and digital devices against the many types of electrical events.

Protect The Device From Electrical Damage

You will know how to keep your computer safe at home and on the go. We look at some basic steps you can take to reduce the risks of bad guys stealing your computer and digital devices.

Protecting Against Theft

A quick knowledge check for section 2.

Phyiscally Protecting The Computer
4 questions
Authentication- Who Are You?
4 Lectures 16:28

You will learn all about how to make the most effective password as well as what not to do. We have also provided several great resources on passwords, including additional advice and a collection of free password managers.

Usernames & Passwords

We look at smart cards and how they help with authentication.

Smart Cards

We look at security tokens/key fobs. This is can be an important component for two step authentication.

Security Tokens

Biometrics could be the next evolution in authentication. In this video we take a quick look at what biometrics is and what we measure.


3 questions
Data Is King
4 Lectures 23:45

Your data is the most important thing on your computer! Family pictures, financial information and more can not be replaced if lost. When you are done with this lesson you will know how to backup your data as well as learn about companies that offer cloud backup and storage.

Backup That Data

If the bad guys get their hands on your devices it wont take long for them to see your private information. Encryption is a way to keep your data safe even if it falls into the wrong hands. At the end of this lesson you will know how to encrypt your data on PC and Mac.


With all this talk about protecting your data sometimes you want to destroy your information. This video shows you how to effectively destroy your data so you can throw out your old computer with confidence.

Destroy The Data

With more and more of our personal information on our smartphones we take a look at how to protect that data in the event it is lost. You will learn how to remotely locate, lock and erase your smartphone.

Protecting Data On Smartphones

Data is King
5 questions
6 Lectures 26:48

Before we talk about keeping your computer clean, we need to get a basic understanding of what nasty stuff is out there. After this lesson you will know more about viruses then you want.


Trojan horses are installed by unsuspecting users. Because it is the user that installes Trojans, you will learn how to identify bad software.

Trojan Horse

Worms can infect hundreds of thousands of systems in a week. In this lesson you will learn what they are and one of the best ways to keep them from hurting your computer.


A relatively new comer to the world of malware these nasty things can steal your most personal information. When you are done with this lesson you will know what the most dangerous types of spyware are and how to keep an eye out for them.


Now that we have a good understanding of malware, it is time to determine if your computer is infected. At the conclusion of this lesson you will be able spot classic signs of infections.

Am I Infected?

In many cases once a computer has become infected the only solution is to reinstall the operating system. This lesson will help you keep malware from getting on your system. You will learn about different types of antivirus software, firewalls programs and of course best practices you can take to avoid the risk of infection.

Protecting Yourself Against Malware

5 questions
Social Engineering: Hacking Humans
7 Lectures 27:41

Social engineering is the act of manipulating people into performing actions or divulging confidential information. In this video, we look at at the basics of social engineering. In the other videos, we examine the more common types of social engineering in more details. I also recommend an outstanding book: No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. 

Introduction To Social Engineering

Dumpster diving is a common social engineering technique. It relies on people and companies not destroying important documents before throwing them into the garbage. 

Dumpster Diving

Snooping over someone's shoulder and looking at what they are doing is shoulder surfing. This is common in coffee shops, libraries and airports. 

Shoulder Surfing

Tailgating is actually a type of infiltration. It is entering a building in the guise of legitimacy. Bad guys rely on looking and acting the part.


Email is a major way that bad guys will attack users. We talk about spam, phishing, Bacn (not a typo), Spear Phishing and Whale Phishing. We also look at general email tips. 

The Problem With Emails

“Criminals have begun harvesting data from social networks to target specific users instead of spamming everyone” What you post on social media can and will be used against you. In this video, we talk about some good practices when using social media.

Social Media and Social Engineering

Social Engineering
5 questions

Thank you so much for taking this course. I hope you learned a ton and are now more conident when it comes to keeping your computer and personal information safe. Please be sure to leave me some feedback so I can improve this for future students.

Thank You and Good Bye
About the Instructor
Scott Ford
4.1 Average rating
10 Reviews
96 Students
2 Courses
Instructional Designer for FBI, DEA, IC, college and K-12

Scott Ford,M.Ed., currently a candidate for Texas State Representative District 127, has been an educator for over 16 years. He has had the honor of teaching and developing courses for high schools, colleges, the FBI, DEA and CIA. 

He has spoken to groups around the United States about technology, educational technology and public policy. In addition to his speaking engagements, Scott hosts a popular talk show heard across the state of Texas.

While working for the FBI, Scott developed a web based trainings that was sent and reviewed by President Obama and Congress. His work for the CIA re-imaged on-line trainings and became a template for future WBTs. 

Scott received his master's degree in educational technology from Texas A&M University. He has been a senior level instructional designer on multi-million dollar projects for the FBI, CIA and DEA.

Mr. Ford's Class has become one of the top YouTube channels for life science and technology videos. With an average 140,000 - 150,000 views per month. His videos are used by high schools, home-schools, colleges and technical programs around the world.

A partial lists of the institutions using our videos: IVY Tech Community College, Kentucky Community & Technical College System, University of West Florida, Virginia Community College System, PEARSON eCollege, Florida State College, St. Petersburg College, Anatomy Arcade, TAFE SA Government of South Australia, Wayne Community College, Guilford Technical Community College,  and University of Texas at Tyler.