Using the Internet Securely
5.0 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
26 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Using the Internet Securely to your Wishlist.

Add to Wishlist

Using the Internet Securely

How to protect your identity and personal information while using the Internet.
5.0 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
26 students enrolled
Created by Michael Goedeker
Last updated 2/2015
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
  • 1.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Understand what the Internet is (in case your new to this)
  • Choose the appropriate security mechanisms when browsing
  • Decide on using a Sandbox (or not)
  • Understand what a Proxy Server is
  • Choose a secure searching engine
  • Have heard of Tor, know what it is and which options are available to use it
View Curriculum
  • Nothing, its an introduction to common concepts

Using the Internet securely is simply put an awesome and fast way to understand threats and how to protect yourself against cyber crime.

Students who take this course will learn:

  1. Understand what threats we face when surfing and using the Internet
  2. Understanding Web Reputation and how it is created
  3. What a proxy is, and how to use it
  4. What a VPN's are and how to use them
  5. What TOR is and how to use it
  6. How to browse and surf the net more securely by being careful of where and what we do
  7. How to use a Sandbox VM to protect you, your family and your privacy against peeping toms.

This course includes everything you need to make the right decisions on safely surfing the internet while avoiding malware, viruses and other unwanted software from installing easily into your main system.

It also uses recommended mechanisms to protect your information and private data from spying eyes. Lastly using Sandbox VMs help to protect your host or main computer against spyware and hidden spying technology from being installed. If you want to be more secure, this course is for you. The course is meant for beginners as well as seasoned security people who want to make sure they have the correct measures in place.

Who is the target audience?
  • Anyone and everyone interested in using the internet securely
  • People starting to use the Internet and want to understand Tor and Browsing security.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
10 Lectures
Security and Using the Internet
10 Lectures 01:27:59

We all use the Internet for so many things, what many are only now starting to find out is that many threats re waiting for us. This course talks about some of the things you can do to make your web browsing and internet usage more secure.

Preview 11:53

Drive-by-downloads, maybe you have heard this term? This refers to malware embedded in a legitimate website that is waiting for someone like you to stop buy. Once you download or click on the link, wham! You get infected with a program that installs itself and adds features that a Botnet or criminal can use.

Common Attacks When Browsing

Websites have reputations, many security companies share information on where and what type of attacks or bad behavior are coming from websites or IPs. Web reputation refers to the registering of those websites so that you know if the site is a suspicious one.

Web Reputation

We all search the internet for something, what many don't know is that those searches are logged by the websites you use like google, yahoo, etc. There are resources out there that let you search more securely and give you a choice what to log and what to forget.

Preview 06:37

Many people have talked about TOR, this is one of many ways in which you can make it harder for someone to look at your browsing activity.


If you live in a country where websites are blocked or the bandwidth is "illegally" managed, then proxy servers are a way for you to "fake" the area or hide your true country of origin so that you can view freely what you want to.

Proxy Server

Sandbox refers to using a virtual machine for "surfing" or "browsing" the internet. When using a virtual machine, if a website tries to install malware, it will likely not infect your "host" system. This is one of the ways you can use sensitive programs like banking systems and increase your overall security.


So, your at your favorite Cafe in Paris, New York, Milan or London,. You need to get those last tweets, emails or snapchats and open up your phone or tablet, and start to read your latest information fix. Well, if you are not using a VPN with encryption, then everything you do in that Cafe is in clear text, meaning anyone that monitors that WiFi *Wireless Lan) connection can read your information and login as well as password info.


Many people do not know that they pay for free software and downloads. The next time you download Angry Birds or some free game or tool, just remember that there is ALWAYS a costs associated with it.

Free isn't free...

By being aware of what threats and risks are out there, we can increase our security dramatically. Don't get caught by criminals or nosey folks that are spying on your web activity. By using some of these suggestions you can dramatically increase your security and guard your private information.

About the Instructor
Michael Goedeker
4.2 Average rating
388 Reviews
6,987 Students
5 Courses
Cyber Security Researcher, Speaker & Trainer, M.Sc. CISSP

Michael has worked on multiple projects globally from architecture to cyber security, working with some of the biggest fortune 50 companies and within the top 5 consulting industry. Some companies he has worked with and for include Accenture, Avanade, Dell, FSC, HP, IBM, Microsoft, Sophos and Symantec.

Michael's company (HakDefNet) currently does research and projects focused on Global Cyber Threats, International Business and Security Leadership and are aimed at making security products, processes, solutions and defense against cyber threats as easy to understand and implement as possible. Michael is also the author of the chapter "Cyber Security: Future IT-Security Challenges for Tomorrow's Leaders and Businesses", and recently participated in an interview with IGI Global Promotions Coordinator Ann Lupold, elaborating on elevating issues in cyber security and cyber espionage, as well as the challenges that leaders and businesses face in confronting such issues. He also has written for various IT, Channel and Business publications and newspapers internationally.

Michael is also certified as an ISO/IEC27001:2013 Lead Auditor and is the first cyber security trainer to ever be keynote speaker at Davos.