Security Course

Lock hackers, identity thieves and cyber criminals out of your life for good with this step-by-step cyber security guide

Last updated 2022-01-10 | 4.6

- Become aware of the most common cyber security threats
- Develop the right mindset and browsing habits for security
- Secure your smartphone and all the information it knows about you

What you'll learn

Become aware of the most common cyber security threats
Develop the right mindset and browsing habits for security
Secure your smartphone and all the information it knows about you
Easily create and manage strong
unique passwords for all of your accounts
Use two-factor authentication to add an extra layer of security to your accounts
Use encryption to make your private data unreadable to attackers

* Requirements

* You should be comfortable using your computer and smartphone
* No prior security experience required—this is a beginner-level course

Description

This course is an actionable, step-by-step beginner's guide to locking hackers, identity thieves, and cyber criminals out of your life once and for all.

Today's reality is yesterday's science fiction.

You can have a real-time video conversation with someone on the other side of the planet, you can send and receive money without even taking out your wallet, and you can post content online that reaches millions of people in a matter minutes.

Unfortunately, the same technology that enables all this new freedom and convenience also exposes us to new security threats that we've never encountered.

Malware that infects your computer and watches everything you do, phishing scams that steal private information from millions of people—today's digital world is a criminal's playground. It makes the process of stealing money or even stealing someone's entire identity way more efficient.

The worst part? You are a target.

Many people neglect taking steps to protect themselves online because they think, "Why would anyone want to steal my information?"

Well, for starters, if you have any money to your name at all, there are plenty of tech-savvy criminals out there who are patiently waiting for the opportunity to take it from you.

Beyond that, they can also steal your identity to run up charges on your credit cards, open new utility accounts, get medical treatment using your health insurance, or take advantage of your friends and family by impersonating you on social media.

So what can you do?

You can protect yourself and your private data, and you don't have to be an IT expert to do it.

This course outlines a step-by-step roadmap that you can follow to build a tight wall of security around your digital life.

More specifically, here are some of the things we'll cover:

  • Why security matters, and how to best approach it
  • The most common security threats you should be aware of
  • How to develop the right mindset and browsing habits
  • How to secure your smartphone and all the private information it knows about you
  • The 25 most commonly used passwords (is yours on the list?)
  • What makes a good password (123456 is not a good password)
  • How to create and manage strong, unique passwords for all of your accounts (without needing to remember them)
  • How to lock attackers out of your accounts even if they manage to steal your passwords
  • A security hole that attackers can use to gain unfettered access to your accounts without knowing your passwords (and how you can defend yourself)
  • How to use the power of encryption to make your private data unreadable to attackers

Again, this is a beginner-level course. These are technical topics, but I hope to walk you through everything in a way that's actionable and easy to understand. (And if you have any questions along the way, all you have to do is ask.)

I'm confident that this course will change the way you look at security, and my confidence is backed by Udemy's 30-day money back guarantee. If you don't love it, you get a full refund—no questions asked. Not a bad deal, if you ask me.

If you haven't already, be sure to enroll in the course! I can't wait to see you inside.

Who this course is for:

  • Anyone who wants to protect themselves from the various security threats of the modern world

Course content

9 sections • 35 lectures

Why Security Matters Preview 02:47

The Importance Of Multi-Layer Security Preview 01:56

The Most Common Security Threats Preview 05:22

Developing The Right Mindset And Habits For Security Preview 00:39

The Importance Of Skepticism Preview 04:54

Avoiding Malicious Sites And Applications Preview 07:03

Why Software Updates Matter Preview 02:02

Knowing (And Limiting) Yourself Preview 02:38

Why Mobile Security Matters Preview 01:51

Setting Up A Passcode Lock Preview 01:58

Managing Third-Party App Permissions Preview 01:20

Locating A Lost Or Stolen Smartphone Preview 00:55

The Importance Of Password Security Preview 01:09

The 25 Most Common Passwords (Is Yours On The List?) Preview 03:48

Best Practices For Strong Password Security Preview 05:24

Using A Password Manager Preview 10:50

What Is Multi-Factor Authentication? Preview 03:23

Types Of Mobile Two-Factor Authentication Preview 02:06

LastPass Two-Factor Authentication Preview 03:02

Google Two-Factor Authentication Preview 01:34

Facebook Two-Factor Authentication Preview 00:51

Twitter Two-Factor Authentication Preview 00:35

Two-Factor Authentication For Other Services Preview 01:13

The Danger Of Rogue Connected Apps Preview 02:37

Managing Connected Apps On Google Preview 02:37

Managing Connected Apps On Facebook Preview 01:14

Managing Browser Extensions/Addons Preview 02:08

Staying Secure With Connected Apps And Extensions Preview 00:55

What Is Encryption? Preview 02:46

How SSL (HTTPS) Protects Your Passwords And Private Data Preview 01:54

Encrypting Your Web Traffic With A Virtual Private Network (VPN) Preview 04:37

How To Encrypt Your Computer's Hard Drive Preview 04:26

How To Encrypt Your Smartphone Preview 02:09