How To Keep Your Computer Safe From The Bad Guys

This course is based off the same presentation I give to the FBI, DEA, colleges and high schools students.
4.8 (6 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
66 students enrolled
$20
Take This Course
  • Lectures 28
  • Contents Video: 2 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 5/2015 English

Course Description

Scott Ford, former FBI Cyber and DEA trainer, teaches you the basics of how to keep your computer and personal information secret. We delve into the basics of computer security that every computer user should know.

In this course we examine physical security, network security, Internet security, as well as social engineering. At the completion of this course you will know how to keep your computer safe.

This course is designed around a series of video lectures as well as links and recommendations to resources Scott has used to teach FBI Cyber, FBI CART, DEA, Intelligence Community agents as well as college and high school students.

What are the requirements?

  • The only thing you need to know before taking this course are some computer basics.
  • During the course I will show you some powerful and FREE programs that you can download.
  • The information you will learn here applies to both Windows and Macs.

What am I going to get from this course?

  • Define common terms in the world of computer security.
  • Keep your computer safe at home, on the road, in the hotel, library and coffee shop.
  • Protect precious data, pictures and memories stored on the computer.
  • Protect yourself from malware like viruses, Trojans, worms and spyware.
  • Defend yourself from typical social engineering attacks like phishing, spam and shoulder surfing.

What is the target audience?

  • This computer security class is perfect for the neophyte, the new user or the person who just doesn't want to be a geek,
  • If you have formal computer training or have computer certifications this is not a class for you.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction To Computer Security
02:01

Welcome to Introduction to Computer Security. When you have completed this video you will have a better understanding about what we will cover in this course. I want to thank you for joining me on this journey.

01:44

This Introduction To Computer Security course is based on a lecture I have given to FBI Cyber, FBI CART, DEA, US Intelligence Agents, college and high school students. At the end of this video you will know how I have organized this course.

01:10

At the end of this video you will know how to best take this Introduction To Computer Security class.

The Journey Begins
Preview
01:15
3 questions

A quick knowledge check of materials presented in Section 1: Introduction To Computer Security.

Section 2: Physically Protecting The Computer
08:34

When you are done with this video you will be able to identify and describe the different types of electrical events that can damage your computer and other digital devices.

04:56

In the previous video you learned all about the different types of electrical events. At the end of this video you will be able to protect your computer and digital devices against the many types of electrical events.

07:47

You will know how to keep your computer safe at home and on the go. We look at some basic steps you can take to reduce the risks of bad guys stealing your computer and digital devices.

4 questions

A quick knowledge check for section 2.

Section 3: Authentication- Who Are You?
07:09

You will learn all about how to make the most effective password as well as what not to do. We have also provided several great resources on passwords, including additional advice and a collection of free password managers.

02:57

We look at smart cards and how they help with authentication.

03:02

We look at security tokens/key fobs. This is can be an important component for two step authentication.

03:20

Biometrics could be the next evolution in authentication. In this video we take a quick look at what biometrics is and what we measure.

Authentication
3 questions
Section 4: Data Is King
08:14

Your data is the most important thing on your computer! Family pictures, financial information and more can not be replaced if lost. When you are done with this lesson you will know how to backup your data as well as learn about companies that offer cloud backup and storage.

04:20

If the bad guys get their hands on your devices it wont take long for them to see your private information. Encryption is a way to keep your data safe even if it falls into the wrong hands. At the end of this lesson you will know how to encrypt your data on PC and Mac.

06:01

With all this talk about protecting your data sometimes you want to destroy your information. This video shows you how to effectively destroy your data so you can throw out your old computer with confidence.

05:10

With more and more of our personal information on our smartphones we take a look at how to protect that data in the event it is lost. You will learn how to remotely locate, lock and erase your smartphone.

Data is King
5 questions
Section 5: Malware
04:30

Before we talk about keeping your computer clean, we need to get a basic understanding of what nasty stuff is out there. After this lesson you will know more about viruses then you want.

01:40

Trojan horses are installed by unsuspecting users. Because it is the user that installes Trojans, you will learn how to identify bad software.

03:34

Worms can infect hundreds of thousands of systems in a week. In this lesson you will learn what they are and one of the best ways to keep them from hurting your computer.

02:41

A relatively new comer to the world of malware these nasty things can steal your most personal information. When you are done with this lesson you will know what the most dangerous types of spyware are and how to keep an eye out for them.

04:51

Now that we have a good understanding of malware, it is time to determine if your computer is infected. At the conclusion of this lesson you will be able spot classic signs of infections.

09:32

In many cases once a computer has become infected the only solution is to reinstall the operating system. This lesson will help you keep malware from getting on your system. You will learn about different types of antivirus software, firewalls programs and of course best practices you can take to avoid the risk of infection.

Maleware
5 questions
Section 6: Social Engineering: Hacking Humans
04:06

Social engineering is the act of manipulating people into performing actions or divulging confidential information. In this video, we look at at the basics of social engineering. In the other videos, we examine the more common types of social engineering in more details. I also recommend an outstanding book: No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. 

02:31

Dumpster diving is a common social engineering technique. It relies on people and companies not destroying important documents before throwing them into the garbage. 

02:22

Snooping over someone's shoulder and looking at what they are doing is shoulder surfing. This is common in coffee shops, libraries and airports. 

06:39

Tailgating is actually a type of infiltration. It is entering a building in the guise of legitimacy. Bad guys rely on looking and acting the part.

06:41

Email is a major way that bad guys will attack users. We talk about spam, phishing, Bacn (not a typo), Spear Phishing and Whale Phishing. We also look at general email tips. 

04:12

“Criminals have begun harvesting data from social networks to target specific users instead of spamming everyone” What you post on social media can and will be used against you. In this video, we talk about some good practices when using social media.

Social Engineering
5 questions
01:10

Thank you so much for taking this course. I hope you learned a ton and are now more conident when it comes to keeping your computer and personal information safe. Please be sure to leave me some feedback so I can improve this for future students.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Scott Ford, Instructional Designer for FBI, DEA, IC, college and K-12

Scott Ford,M.Ed., currently a candidate for Texas State Representative District 127, has been an educator for over 16 years. He has had the honor of teaching and developing courses for high schools, colleges, the FBI, DEA and CIA. 

He has spoken to groups around the United States about technology, educational technology and public policy. In addition to his speaking engagements, Scott hosts a popular talk show heard across the state of Texas.

While working for the FBI, Scott developed a web based trainings that was sent and reviewed by President Obama and Congress. His work for the CIA re-imaged on-line trainings and became a template for future WBTs. 

Scott received his master's degree in educational technology from Texas A&M University. He has been a senior level instructional designer on multi-million dollar projects for the FBI, CIA and DEA.

Mr. Ford's Class has become one of the top YouTube channels for life science and technology videos. With an average 140,000 - 150,000 views per month. His videos are used by high schools, home-schools, colleges and technical programs around the world.

A partial lists of the institutions using our videos: IVY Tech Community College, Kentucky Community & Technical College System, University of West Florida, Virginia Community College System, PEARSON eCollege, Florida State College, St. Petersburg College, Anatomy Arcade, TAFE SA Government of South Australia, Wayne Community College, Guilford Technical Community College,  and University of Texas at Tyler.

Ready to start learning?
Take This Course