Scott Ford, former FBI Cyber and DEA trainer, teaches you the basics of how to keep your computer and personal information secret. We delve into the basics of computer security that every computer user should know.
In this course we examine physical security, network security, Internet security, as well as social engineering. At the completion of this course you will know how to keep your computer safe.
This course is designed around a series of video lectures as well as links and recommendations to resources Scott has used to teach FBI Cyber, FBI CART, DEA, Intelligence Community agents as well as college and high school students.
Welcome to Introduction to Computer Security. When you have completed this video you will have a better understanding about what we will cover in this course. I want to thank you for joining me on this journey.
This Introduction To Computer Security course is based on a lecture I have given to FBI Cyber, FBI CART, DEA, US Intelligence Agents, college and high school students. At the end of this video you will know how I have organized this course.
At the end of this video you will know how to best take this Introduction To Computer Security class.
A quick knowledge check of materials presented in Section 1: Introduction To Computer Security.
When you are done with this video you will be able to identify and describe the different types of electrical events that can damage your computer and other digital devices.
In the previous video you learned all about the different types of electrical events. At the end of this video you will be able to protect your computer and digital devices against the many types of electrical events.
You will know how to keep your computer safe at home and on the go. We look at some basic steps you can take to reduce the risks of bad guys stealing your computer and digital devices.
A quick knowledge check for section 2.
You will learn all about how to make the most effective password as well as what not to do. We have also provided several great resources on passwords, including additional advice and a collection of free password managers.
We look at smart cards and how they help with authentication.
We look at security tokens/key fobs. This is can be an important component for two step authentication.
Biometrics could be the next evolution in authentication. In this video we take a quick look at what biometrics is and what we measure.
Your data is the most important thing on your computer! Family pictures, financial information and more can not be replaced if lost. When you are done with this lesson you will know how to backup your data as well as learn about companies that offer cloud backup and storage.
If the bad guys get their hands on your devices it wont take long for them to see your private information. Encryption is a way to keep your data safe even if it falls into the wrong hands. At the end of this lesson you will know how to encrypt your data on PC and Mac.
With all this talk about protecting your data sometimes you want to destroy your information. This video shows you how to effectively destroy your data so you can throw out your old computer with confidence.
With more and more of our personal information on our smartphones we take a look at how to protect that data in the event it is lost. You will learn how to remotely locate, lock and erase your smartphone.
Before we talk about keeping your computer clean, we need to get a basic understanding of what nasty stuff is out there. After this lesson you will know more about viruses then you want.
Trojan horses are installed by unsuspecting users. Because it is the user that installes Trojans, you will learn how to identify bad software.
Worms can infect hundreds of thousands of systems in a week. In this lesson you will learn what they are and one of the best ways to keep them from hurting your computer.
A relatively new comer to the world of malware these nasty things can steal your most personal information. When you are done with this lesson you will know what the most dangerous types of spyware are and how to keep an eye out for them.
Now that we have a good understanding of malware, it is time to determine if your computer is infected. At the conclusion of this lesson you will be able spot classic signs of infections.
In many cases once a computer has become infected the only solution is to reinstall the operating system. This lesson will help you keep malware from getting on your system. You will learn about different types of antivirus software, firewalls programs and of course best practices you can take to avoid the risk of infection.
Social engineering is the act of manipulating people into performing actions or divulging confidential information. In this video, we look at at the basics of social engineering. In the other videos, we examine the more common types of social engineering in more details. I also recommend an outstanding book: No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing.
Dumpster diving is a common social engineering technique. It relies on people and companies not destroying important documents before throwing them into the garbage.
Snooping over someone's shoulder and looking at what they are doing is shoulder surfing. This is common in coffee shops, libraries and airports.
Tailgating is actually a type of infiltration. It is entering a building in the guise of legitimacy. Bad guys rely on looking and acting the part.
Email is a major way that bad guys will attack users. We talk about spam, phishing, Bacn (not a typo), Spear Phishing and Whale Phishing. We also look at general email tips.
“Criminals have begun harvesting data from social networks to target specific users instead of spamming everyone” What you post on social media can and will be used against you. In this video, we talk about some good practices when using social media.
Thank you so much for taking this course. I hope you learned a ton and are now more conident when it comes to keeping your computer and personal information safe. Please be sure to leave me some feedback so I can improve this for future students.
Scott Ford,M.Ed., currently a candidate for Texas State Representative District 127, has been an educator for over 16 years. He has had the honor of teaching and developing courses for high schools, colleges, the FBI, DEA and CIA.
He has spoken to groups around the United States about technology, educational technology and public policy. In addition to his speaking engagements, Scott hosts a popular talk show heard across the state of Texas.
While working for the FBI, Scott developed a web based trainings that was sent and reviewed by President Obama and Congress. His work for the CIA re-imaged on-line trainings and became a template for future WBTs.
Scott received his master's degree in educational technology from Texas A&M University. He has been a senior level instructional designer on multi-million dollar projects for the FBI, CIA and DEA.
Mr. Ford's Class has become one of the top YouTube channels for life science and technology videos. With an average 140,000 - 150,000 views per month. His videos are used by high schools, home-schools, colleges and technical programs around the world.
A partial lists of the institutions using our videos: IVY Tech Community College, Kentucky Community & Technical College System, University of West Florida, Virginia Community College System, PEARSON eCollege, Florida State College, St. Petersburg College, Anatomy Arcade, TAFE SA Government of South Australia, Wayne Community College, Guilford Technical Community College, and University of Texas at Tyler.