Using the Internet Securely

How to protect your identity and personal information while using the Internet.
5.0 (4 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
22 students enrolled
Instructed by Michael Goedeker Business / Other
$19
$20
5% off
Take This Course
  • Lectures 10
  • Length 1.5 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 2/2015 English

Course Description

Using the Internet securely is simply put an awesome and fast way to understand threats and how to protect yourself against cyber crime.

Students who take this course will learn:

  1. Understand what threats we face when surfing and using the Internet
  2. Understanding Web Reputation and how it is created
  3. What a proxy is, and how to use it
  4. What a VPN's are and how to use them
  5. What TOR is and how to use it
  6. How to browse and surf the net more securely by being careful of where and what we do
  7. How to use a Sandbox VM to protect you, your family and your privacy against peeping toms.

This course includes everything you need to make the right decisions on safely surfing the internet while avoiding malware, viruses and other unwanted software from installing easily into your main system.

It also uses recommended mechanisms to protect your information and private data from spying eyes. Lastly using Sandbox VMs help to protect your host or main computer against spyware and hidden spying technology from being installed. If you want to be more secure, this course is for you. The course is meant for beginners as well as seasoned security people who want to make sure they have the correct measures in place.

What are the requirements?

  • Nothing, its an introduction to common concepts

What am I going to get from this course?

  • Understand what the Internet is (in case your new to this)
  • Choose the appropriate security mechanisms when browsing
  • Decide on using a Sandbox (or not)
  • Understand what a Proxy Server is
  • Choose a secure searching engine
  • Have heard of Tor, know what it is and which options are available to use it

What is the target audience?

  • Anyone and everyone interested in using the internet securely
  • People starting to use the Internet and want to understand Tor and Browsing security.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Security and Using the Internet
11:53

We all use the Internet for so many things, what many are only now starting to find out is that many threats re waiting for us. This course talks about some of the things you can do to make your web browsing and internet usage more secure.

09:14

Drive-by-downloads, maybe you have heard this term? This refers to malware embedded in a legitimate website that is waiting for someone like you to stop buy. Once you download or click on the link, wham! You get infected with a program that installs itself and adds features that a Botnet or criminal can use.

11:47

Websites have reputations, many security companies share information on where and what type of attacks or bad behavior are coming from websites or IPs. Web reputation refers to the registering of those websites so that you know if the site is a suspicious one.

06:37

We all search the internet for something, what many don't know is that those searches are logged by the websites you use like google, yahoo, etc. There are resources out there that let you search more securely and give you a choice what to log and what to forget.

13:14

Many people have talked about TOR, this is one of many ways in which you can make it harder for someone to look at your browsing activity.

06:33

If you live in a country where websites are blocked or the bandwidth is "illegally" managed, then proxy servers are a way for you to "fake" the area or hide your true country of origin so that you can view freely what you want to.

06:35

Sandbox refers to using a virtual machine for "surfing" or "browsing" the internet. When using a virtual machine, if a website tries to install malware, it will likely not infect your "host" system. This is one of the ways you can use sensitive programs like banking systems and increase your overall security.

08:42

So, your at your favorite Cafe in Paris, New York, Milan or London,. You need to get those last tweets, emails or snapchats and open up your phone or tablet, and start to read your latest information fix. Well, if you are not using a VPN with encryption, then everything you do in that Cafe is in clear text, meaning anyone that monitors that WiFi *Wireless Lan) connection can read your information and login as well as password info.

06:35

Many people do not know that they pay for free software and downloads. The next time you download Angry Birds or some free game or tool, just remember that there is ALWAYS a costs associated with it.

06:49

By being aware of what threats and risks are out there, we can increase our security dramatically. Don't get caught by criminals or nosey folks that are spying on your web activity. By using some of these suggestions you can dramatically increase your security and guard your private information.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Michael Goedeker, Cyber Security Researcher, Speaker & Trainer, M.Sc. CISSP

Michael has worked on multiple projects globally from architecture to cyber security, working with some of the biggest fortune 50 companies and within the top 5 consulting industry. Some companies he has worked with and for include Accenture, Avanade, Dell, FSC, HP, IBM, Microsoft, Sophos and Symantec.

Michael's company (HakDefNet) currently does research and projects focused on Global Cyber Threats, International Business and Security Leadership and are aimed at making security products, processes, solutions and defense against cyber threats as easy to understand and implement as possible. Michael is also the author of the chapter "Cyber Security: Future IT-Security Challenges for Tomorrow's Leaders and Businesses", and recently participated in an interview with IGI Global Promotions Coordinator Ann Lupold, elaborating on elevating issues in cyber security and cyber espionage, as well as the challenges that leaders and businesses face in confronting such issues. He also has written for various IT, Channel and Business publications and newspapers internationally.

Michael is also certified as an ISO/IEC27001:2013 Lead Auditor and is the first cyber security trainer to ever be keynote speaker at Davos.

Ready to start learning?
Take This Course