- Already Paid For The Course
- Buy Now
Lock hackers, identity thieves and cyber criminals out of your life for good with this step-by-step cyber security guide
Password length should be at least 6 to 20 characters and it should contain at least one number and one special character
Curriculum For This Course
Expand All35 Lectures 1:39:29
Welcome To The Course!
Why Security Matters
The Importance Of Multi-Layer Security
The Most Common Security Threats
Mindset & Habits
Developing The Right Mindset And Habits For Security
The Importance Of Skepticism
Avoiding Malicious Sites And Applications
Why Software Updates Matter
Knowing (And Limiting) Yourself
Why Mobile Security Matters
Setting Up A Passcode Lock
Managing Third-Party App Permissions
Locating A Lost Or Stolen Smartphone
The Importance Of Password Security
The 25 Most Common Passwords (Is Yours On The List?)
Best Practices For Strong Password Security
Using A Password Manager
What Is Multi-Factor Authentication?
Types Of Mobile Two-Factor Authentication
LastPass Two-Factor Authentication
Google Two-Factor Authentication
Facebook Two-Factor Authentication
Twitter Two-Factor Authentication
Two-Factor Authentication For Other Services
The Danger Of Rogue Connected Apps
Managing Connected Apps On Google
Managing Connected Apps On Facebook
Managing Browser Extensions/Addons
Staying Secure With Connected Apps And Extensions
What Is Encryption?
How SSL (HTTPS) Protects Your Passwords And Private Data
Encrypting Your Web Traffic With A Virtual Private Network (VPN)
How To Encrypt Your Computer's Hard Drive
How To Encrypt Your Smartphone
The Next Steps
You can have a real-time video conversation with someone on the other side of the planet, you can send and receive money without even taking out your wallet, and you can post content online that reaches millions of people in a matter minutes.
Unfortunately, the same technology that enables all this new freedom and convenience also exposes us to new security threats that we’ve never encountered.
Malware that infects your computer and watches everything you do, phishing scams that steal private information from millions of people—today’s digital world is a criminal’s playground. It makes the process of stealing money or even stealing someone’s entire identity way more efficient.
Many people neglect taking steps to protect themselves online because they think, “Why would anyone want to steal my information?”
Well, for starters, if you have any money to your name at all, there are plenty of tech-savvy criminals out there who are patiently waiting for the opportunity to take it from you.
Beyond that, they can also steal your identity to run up charges on your credit cards, open new utility accounts, get medical treatment using your health insurance, or take advantage of your friends and family by impersonating you on social media.
You can protect yourself and your private data, and you don’t have to be an IT expert to do it.
This course outlines a step-by-step roadmap that you can follow to build a tight wall of security around your digital life.
Again, this is a beginner-level course. These are technical topics, but we hope to walk you through everything in a way that’s actionable and easy to understand.
Email sent successfully..!!!