[Udemy]Cyber Security and Internet Safety [2015, ENG]

Видео уроки, книги, учебники по компьютерным сетям и коммуникациям
Торрент Сидеров Личеров Размер
5 2 467.73 МБ
Аватара пользователя
Сообщения: 22944
Зарегистрирован: 13 янв 2016, 22:10

[Udemy]Cyber Security and Internet Safety [2015, ENG]

Сообщение Солнышко » 26 фев 2017, 15:54

Cyber Security and Internet Safety

Год выпуска: 2015
Производитель: Udemy
Сайт производителя: www.udemy.com/cyber-security-and-internet-safety/
Продолжительность: 03:30:18
Тип раздаваемого материала: Видеоурок
Язык: Английский
Описание: Советы и рекомендации для обучения вам, как для более безопасного онлайн-вы можете предотвратить инфекции от вредоносных программ, атак и кражи личных данных.
Does it seem like your computer is constantly getting bombarded with ads, popups, or scammy emails?

Maybe you suddenly can't use your PC because of some random screen that claims you have a bad infection and just pay them some money and they can have it removed.

Even worse, you start noticing odd charges on your credit card bill that you know wasn't made by you (unless you did actually buy that 25th anniversary edition pet rock - no judgement).

It doesn't have to be this way!

Most times, many of the bad things mentioned above happen to you because of actions you take on accident. You think that by clicking on a button that tells you to "Click here to scan your PC" or receiving a phone call from Microsoft warning you that you have a virus, that you are doing the right thing.

But, it's these exact things that are opening up your systems to the bad guys!

Cyber Security & Internet Safety is a course that comes from over 23 years of working with computers and seeing how making some simple changes can protect you and your PC from potential threats. Whether a single user, family, or business with hundreds of employees, these lectures and videos will walk you through step-by-step what to do and not to do.

Let's build a community of users that can learn from each other!

Cyber Security & Internet Safety Tips will be updated over time with advice and examples from you, our users, so that we can all benefit from shared experiences and grow in the process. Remember, there's no shame or judgement if you accidentally ran across something that tricked you into getting infected or worse. Share your story and we can all benefit from your knowledge.
Section 1: Welcome to Cyber Security & Internet Safety
Lecture 1
Introduction Video
Welcome to the Cyber Security and Internet Safety course!

Throughout this course, we'll be covering the following topics:

Web Browsing
Identity Theft
Social Networking
Please don't hesitate to ask questions or request clarification on any of the subject matter.
Section 2: Web Browsing
Lecture 2
Introduction Video
Welcome to the Web Browsing section!

We'll be covering the following topics:

Click Bait
Search Engine Ads
File Downloads
Lecture 3
Click Bait
Don't get lured into bad places online or accidentally follow a misleading ad by avoiding click bait.
Lecture 4
Click Bait Demo
Watch a screencast of how to avoid click bait using popular Windows web browsers.
Lecture 5
Search Engine Ads
Sometimes, if you're not paying close attention, you can click on a search engine ad instead of where you actually wanted to go. This can lead to frustration or possibly lead you to places that can get you into trouble.
Lecture 6
Search Engine Ads Demo
Watch a screencast of what search engine ads look like and where they're located in Google, Bing, and Yahoo.
Lecture 7
Only use torrents for legal means and be very careful not to stumble into files that contain hidden malware.
Lecture 8
File Downloads
There are many types of files that can be downloaded on the Web and we'll cover what to be careful of when dealing with them in your browser.
Lecture 9
File Downloads Demo
Watch a screencast on what to look out for when downloading online and how easy it can be to quickly be offered dangerous files.
Lecture 10
Find out how you can tell the difference between non-secure (http) and secure (https) web browser connections on the Internet.
Lecture 11
Watch a screencast of what the differences are between http and https and how they look in Google Chrome, Mozilla Firefox, and Microsoft Edge.
Lecture 12
There are numerous privacy settings in every web browser and you should familiarize yourself with them so you can know what personal information you're sharing online.
Lecture 13
Privacy Demo
Watch a screencast of where the privacy settings can be found in Google Chrome, Mozilla Firefox, and Microsoft Edge.
Section 3: Email
Lecture 14
Introduction Video
Welcome to the Email section!

We'll be covering the following topics:

Link Hovering
Lecture 15
Link Hovering
By hovering your mouse over links before clicking them, you can quickly see if you might end up visiting a bad location or web site.
Lecture 16
Link Hovering Demo
Watch a screencast of how easy it is to see where a link is pointing to before actually clicking it.
Lecture 17
There are many kinds of email attachments that you might be exposed to and we'll cover the most common and what to look out for.
Lecture 18
Email scams are unfortunately all too common so we'll discuss how to recognize them and avoid potential danger.
Lecture 19
Scams Demo
Watch a screencast of actual scam emails saved over time and what to look for in identifying potentially harmful messages.
Lecture 20
There are several settings you can utilize to reduce the amount of spam emails you receive in your inbox and we'll cover them in this lecture.
Lecture 21
Spam Demo
Watch a screencast of where to find and how to use common spam filter settings in Microsoft Outlook 2013 (365).
Lecture 22
Email rules allow greater control and customization over incoming messages and we'll talk about what you can do with them.

Lecture 23
Rules Demo
Watch a screencast of how to set up some sample email rules using Microsoft Outlook 2013 (365).
Section 4: Malware
Lecture 24
Introduction Video
Welcome to the Malware section!

We'll be covering the following topics:

How They Get In
Signs of Infection
Cleaning Up
Lecture 25
There are different categories of malware that do different things to your PC. We'll go over the most common and what makes each unique.
Lecture 26
How They Get In
Malware can get into your computer in many ways so we will discuss the most common and how to avoid getting infected in the first place.
Lecture 27
Signs of Infection
Even with diligence you still might get infected with malware but you may not realize the signs. In this lecture, we'll discuss how your computer may act that can tell you something might be wrong.
Lecture 28
Cleaning Up
Even if you're infected by a virus or malware, there are several tools available to help you diagnose and remove them safely. We'll cover some free tools as well as some built into Windows that can get your system back in tip top condition.
Lecture 29
Cleaning Up Demo
Watch a screencast where I demo some built-in Windows tools and how to use them in removing malware.
Section 5: Identity Theft
Lecture 30
Introduction Video
Welcome to the Identity Theft section!

We'll be covering the following topics:

Social Engineering
Online Purchases
Fake Calls
Lecture 31
Social Engineering
Many times the bad guys don't even have to use high-tech ways to get your information. They can use your kindness or social means of engineering the sharing of your personal information.
Lecture 32
Online Purchases
There's nothing wrong with making online purchases, especially since there's such a diverse marketplace available only a click away, but we'll discuss what to do to make these purchases as safe as possible.

Lecture 33
Fake Calls
Nowadays scammers are getting even more brash by calling their victims directly to try and gain their personal or financial information. Learn what to look out for and how to avoid giving up your vital information to them.
Section 6: Social Networking
Lecture 34
Introduction Video
Welcome to the Social Networking section!

We'll be covering the following topics:

Facebook & Twitter
Dating & Meetup Sites
Lecture 35
Facebook & Twitter
We love using social networks but there are several things to keep in mind when using these tools.
Lecture 36
Dating & Meetup Sites
If you've taken the next step and are meeting someone offline that started online, there are specific concerns that you should think about before showing up.
Section 7: Phones
Lecture 37
Introduction Video
Welcome to the Phones section!

We'll be covering the following topics:

App Downloads
App Permissions
Picture Data (EXIF)
Sharing Information
Lecture 38
App Downloads
There are safer places to download your apps and some sketchy ones, so we'll go over how to be careful so you can keep your phone nice and healthy.
Lecture 39
App Permissions
Tons of app permissions are available and some developers abuse these which can give away your personal information. We'll discuss what to look for when deciding whether or not to download that next phone app.
Lecture 40
Picture Data (EXIF)
You might be storing private GPS location information about yourself every time you take a picture with your phone! We'll talk about how to change these settings and remove this data in existing photos.
Lecture 41
Picture Data (EXIF) Demo
Watch a screencast that shows some ways you can remove GPS data from your photos.
Lecture 42
Sharing Information
It just takes a second to share something using your phone and this lecture will help guide you into safer ways of thinking before possibly making a mistake.
Section 8: Passwords
Lecture 43
Introduction Video
Welcome to the Passwords section!

We'll be covering the following topics:

Management Software
Login Awareness
Lecture 44
Passwords are your first line of defense against people trying to break into your computers or accounts. It's very important to choose stronger ones and here are some simple tips that will help.
Lecture 45
Management Software
We'll go over how easy it can be to use stronger security and logins without the hassle of trying to remember them by using password management software.
Lecture 46
Management Software Demo
Watch a screencast of how to use KeePass, a free password management software that's both easy and secure.

Lecture 47
Login Awareness
You can use social networking sites as a way of logging into other web sites but we'll discuss why you should be aware of what kinds of data you might be sharing when doing this.
Lecture 48
For very secure purposes, such as online banking or employee logins, you may want to set up multi factor authentication. We'll discuss what this is and why it adds another layer of security to passwords alone.
Section 9: Conclusion
Lecture 49
Congratulations on completing the Cyber Security and Internet Safety course!

By using the tools and techniques you've learned throughout these lectures you'll greatly enhance your security on the Internet and across all your devices.
Lecture 50
Course Updates
Lecture 51
Please use this resource list to get all the free tools and help that was referenced throughout the course.
Lecture 52
Let's Connect
We greatly value our students and would love to make a stronger connection with you at some of our social sites listed. Like us, follow us, and check out our YouTube channel for free content!
Файлы примеров: отсутствуют
Формат видео: MP4
Видео : 1280x720 (16:9), 30.000 fps, Zencoder Video Encoding System ~1 341 Kbps avg, 0.049 bit/pixel
Аудио: 48.0 KHz, AAC LC, 2 ch, ~60.9 Kbps

У вас нет необходимых прав для просмотра вложений в этом сообщении.