Online Security Training Course 101
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1 student enrolled
Wishlisted Wishlist

Please confirm that you want to add Online Security Training Course 101 to your Wishlist.

Add to Wishlist

Online Security Training Course 101

Finally...Watch as a Former Web Security Expert Reveals How You Can Protect Your Identity While Surfing Online
0.0 (0 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
1 student enrolled
Created by William Hadala
Last updated 6/2017
English
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
Includes:
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Completing this course you will educated about the many different types of Online Security issues the majority of online users are unaware. As a result of the education your receive you will be knowledge and have the tools to protect yourself, family, friends, and/or co-workers / employees. One major goals is the gain the knowledge of being able to help people because Online Security aware and knowledgable as so many people around the world need people such as you to create awareness.
View Curriculum
Requirements
  • You should be able to use a computer at a beginner level (MAC or PC), have access to the Interet and fluent on how to use the Internet and have some knowledge on how the Internet works.
Description

You’re information isn’t 100 percent safe online. I’m not trying to scare you but it’s true, and my goal today is to help you as best I can.

Millions of people have their identities stolen each year. 

The reality of it all is that your information is not going to be 100% safe.  But what you do online and depending on how you do it can cause you to easily open yourself up to security breaches.

Now, I want you to realize that none of this should prevent you from going about your business online.

Yet it should be a wakeup call to ensure you are being proactive.

So what do you need to do and what can you do right now to protect your online identity?

Video #1. Introduction to Online Security

Before we jump right in and show you how to secure your online identity, I want to make sure that I give you a brief overview of the video course itself and of course I'll show you how it all works. Also, most importantly I’ll get you ready so that you can easily implement everything that I teach.

Video #2. Online Protection 101

Before we jump right in and I show you exactly what software to use, there are specific things you need to understand in terms of online protection 101.While some of these might seem quite obvious, these are particular reasons why a lot of viruses and spyware come into your computer and we need to ensure we do as much as possible to prevent this. We’ll talk about online surfing security including how to protect your credit cards and more.

Video #3. Anti-Virus / Firewall

There is a huge amount of different antivirus software out there on the internet, and there is a lot of firewall software out there as well. Unfortunately, many are disguised as software that intends to help you but instead actually has the opposite effect.  Now, there are two pieces of software that I have used all the way from the beginning of 2000 that were the first leaders in their industry, so I will reveal these to you.  A lot of people confuse antivirus software and firewall software. They are not the same.  While they can work well together and sometimes have firewalls built into the antivirus software, you'll see exactly why you need these two different types of software because they protect against two different types of security breaches.

Video #4. Spyware / Malware protection

Beyond antivirus software and firewalls, there is a specific type of security breach called spyware. The way spyware works is it gets on your computer and spies on everything that you do. It records everything from all keyboard strokes that you type in, the mouse clicks, as well as all the websites you visit, and then of course it sends all that information back to the creator of the spyware. Now the reality of this all is that lots of software will claim to be spyware protection, but what you truly want is a specific software that focuses on spyware specifically. So in the particular video I'm going to show you a specific software tool that is the absolute leader in spyware protection.

Video #5. Passwords

Are you using the same exact password to log into all of your accounts and all of your websites? If you are, if somebody finds one of your passwords then it is going to be super easy to get into your other accounts such as your banking accounts, your financial accounts, your email accounts, and other secured sites. Now while it makes sense to create a strong password, most people forget to do so. Yet that's not what this video is all about. This video is going to show you how to organize your passwords so that if anything happens in the future you can always refer back to the spreadsheet we show you how to create.

Video #6.  Browser Password Breach

Did you know that if you’re surfing with certain Internet browsers, when you enter your username and password, a lot of these browsers will actually save that password?  Now what’s even scarier is that if you have somebody else that comes in and uses that same computer, there is actually a way to grab all of your passwords easily. Knowing this, you probably shouldn't be storing your passwords inside of the Internet browser itself, especially if somebody other than yourself is able to access it. However, there is a way to protect yourself and I will show you how by using free software.

Video #7. Centralize and encrypt your passwords with this software

In this specific video I'm going to show you how to use the centralized password encryption system that I talk about in video number six.  While there is a pro version, it is not really necessary for most of your basic needs.

Video #8. Surfing Security

This video will cover some basic things that you need to look for when you are surfing online. I want to make sure that I cover all this information so that we keep you completely secure.

Video #9. How to spot Phishing scams

Even if you don’t know what phishing is, you’ve encountered it before. Phishing is the act of somebody emailing or contacting you and pretending that they are a legitimate company you are familiar with. So for example, you get an email that looks like it's from your bank. And in that email they say something like you have over drafted money - so you need to go ahead and log in and pay your fee. But the reality of it all is that a lot of these sites are phishing sites and what they're trying to do is get your username and password. Now most of you may or may not do this, but some of you will fill out your username and password and ultimately give the hacker your information. And guess what? You have ultimately given them the keys to your bank account. And this is dangerous because they can go in and steal your money and… you get the idea. So here I want to show you real-life examples where you can pinpoint and decide whether somebody is actually phishing or legit, because sometimes it’s hard to figure this out.

Video #10. What to do if your identity has been taken

Now the big question is what if you’re too late? What do you do if your online identity has already been taken, or someone has stolen your credit card or credit information?  What can you do today to take action? 

Go ahead and watch this video course. Grab it and start learning how to take charge and protect your online identity from prying eyes. 

Who is the target audience?
  • Anyone who wants to learn about Cyber Security and how to gain the knowledge to learn how to put into place the various tools to protect their digital systems that use the Internet.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
+
Introduction
9 Lectures 52:52

Before we jump right in and show you how to secure your online identity, I want to make sure that I give you a brief overview of the video course itself and of course I'll show you how it all works. Also, most importantly I’ll get you ready so that you can easily implement everything that I teach.

Preview 08:06

Before we jump right in and I show you exactly what software to use, there are specific things you need to understand in terms of online protection 101.While some of these might seem quite obvious, these are particular reasons why a lot of viruses and spyware come into your computer and we need to ensure we do as much as possible to prevent this. We’ll talk about online surfing security including how to protect your credit cards and more.

Preview 08:33

There is a huge amount of different antivirus software out there on the internet, and there is a lot of firewall software out there as well. Unfortunately, many are disguised as software that intends to help you but instead actually has the opposite effect.  Now, there are two pieces of software that I have used all the way from the beginning of 2000 that were the first leaders in their industry, so I will reveal these to you.  A lot of people confuse antivirus software and firewall software. They are not the same.  While they can work well together and sometimes have firewalls built into the antivirus software, you'll see exactly why you need these two different types of software because they protect against two different types of security breaches.

Anti-Virus / Firewall
08:31

Beyond antivirus software and firewalls, there is a specific type of security breach called spyware. The way spyware works is it gets on your computer and spies on everything that you do. It records everything from all keyboard strokes that you type in, the mouse clicks, as well as all the websites you visit, and then of course it sends all that information back to the creator of the spyware. Now the reality of this all is that lots of software will claim to be spyware protection, but what you truly want is a specific software that focuses on spyware specifically. So in the particular video I'm going to show you a specific software tool that is the absolute leader in spyware protection.

Spyware / Malware protection
03:48

Are you using the same exact password to log into all of your accounts and all of your websites? If you are, if somebody finds one of your passwords then it is going to be super easy to get into your other accounts such as your banking accounts, your financial accounts, your email accounts, and other secured sites. Now while it makes sense to create a strong password, most people forget to do so. Yet that's not what this video is all about. This video is going to show you how to organize your passwords so that if anything happens in the future you can always refer back to the spreadsheet we show you how to create.

Passwords
06:36

Did you know that if you’re surfing with certain Internet browsers, when you enter your username and password, a lot of these browsers will actually save that password?  Now what’s even scarier is that if you have somebody else that comes in and uses that same computer, there is actually a way to grab all of your passwords easily. Knowing this, you probably shouldn't be storing your passwords inside of the Internet browser itself, especially if somebody other than yourself is able to access it. However, there is a way to protect yourself and I will show you how by using free software

Browser Password Breach
01:32

This video will cover some basic things that you need to look for when you are surfing online. I want to make sure that I cover all this information so that we keep you completely secure.

Centralize and encrypt your passwords
07:40

Even if you don’t know what phishing is, you’ve encountered it before. Phishing is the act of somebody emailing or contacting you and pretending that they are a legitimate company you are familiar with. So for example, you get an email that looks like it's from your bank. And in that email they say something like you have over drafted money - so you need to go ahead and log in and pay your fee. But the reality of it all is that a lot of these sites are phishing sites and what they're trying to do is get your username and password. 

How to spot Phishing scams
05:18

Now the big question is what if you’re too late? What do you do if your online identity has already been taken, or someone has stolen your credit card or credit information?  What can you do today to take action?

What to do if your identity has been taken
02:48
About the Instructor
William Hadala
0.0 Average rating
0 Reviews
1 Student
1 Course
​An accomplished Senior Technology Executive

William Michael is the Founder, President & CEO of Cyber Investigator 365 who possesses a proven track record of building and operating world-class broadband infrastructure. With over 25+ years of experience, William is an expert in operating and maintaining fiber optic and wireless networks, data centers and managed services. 

Known within the technology and telecommunications industries for driving business results, being a visionary technologist with tactical focus and maximizing profitability through the delivery of exceptional product quality and service, and prudent management of people, technology and processes.