Register
- Already Paid For The Course
- Buy Now
Lock hackers, identity thieves and cyber criminals out of your life for good with this step-by-step cyber security guide
Password length should be at least 6 to 20 characters and it should contain at least one number and one special character
REGISTER NOW
Curriculum For This Course
Expand All
35 Lectures 1:39:29Introduction
1 Lecture
05:06
Welcome To The Course!
5:06
Security Basics
3 Lectures
10:06
Why Security Matters
2:47
The Importance Of Multi-Layer Security
1:56
The Most Common Security Threats
5:23
Mindset & Habits
5 Lectures
17:16
Developing The Right Mindset And Habits For Security
0:39
The Importance Of Skepticism
4:54
Avoiding Malicious Sites And Applications
7:03
Why Software Updates Matter
2:02
Knowing (And Limiting) Yourself
2:38
Smartphone Security
4 Lectures
06:07
Why Mobile Security Matters
1:52
Setting Up A Passcode Lock
1:59
Managing Third-Party App Permissions
1:20
Locating A Lost Or Stolen Smartphone
0:56
Passwords
4 Lectures
21:11
The Importance Of Password Security
1:09
The 25 Most Common Passwords (Is Yours On The List?)
3:48
Best Practices For Strong Password Security
5:24
Using A Password Manager
10:50
Multi-Factor Authentication
7 Lectures
12:47
What Is Multi-Factor Authentication?
3:23
Types Of Mobile Two-Factor Authentication
2:07
LastPass Two-Factor Authentication
3:02
Google Two-Factor Authentication
1:34
Facebook Two-Factor Authentication
0:52
Twitter Two-Factor Authentication
0:36
Two-Factor Authentication For Other Services
1:13
Connected Apps
5 Lectures
09:32
The Danger Of Rogue Connected Apps
2:37
Managing Connected Apps On Google
2:38
Managing Connected Apps On Facebook
1:14
Managing Browser Extensions/Addons
2:08
Staying Secure With Connected Apps And Extensions
0:55
Encryption
5 Lectures
15:56
What Is Encryption?
2:47
How SSL (HTTPS) Protects Your Passwords And Private Data
1:55
Encrypting Your Web Traffic With A Virtual Private Network (VPN)
4:38
How To Encrypt Your Computer's Hard Drive
4:26
How To Encrypt Your Smartphone
2:10
Wrapping Up
1 Lecture
01:28
The Next Steps
1:28
You can have a real-time video conversation with someone on the other side of the planet, you can send and receive money without even taking out your wallet, and you can post content online that reaches millions of people in a matter minutes.
Unfortunately, the same technology that enables all this new freedom and convenience also exposes us to new security threats that we’ve never encountered.
Malware that infects your computer and watches everything you do, phishing scams that steal private information from millions of people—today’s digital world is a criminal’s playground. It makes the process of stealing money or even stealing someone’s entire identity way more efficient.
Many people neglect taking steps to protect themselves online because they think, “Why would anyone want to steal my information?”
Well, for starters, if you have any money to your name at all, there are plenty of tech-savvy criminals out there who are patiently waiting for the opportunity to take it from you.
Beyond that, they can also steal your identity to run up charges on your credit cards, open new utility accounts, get medical treatment using your health insurance, or take advantage of your friends and family by impersonating you on social media.
You can protect yourself and your private data, and you don’t have to be an IT expert to do it.
This course outlines a step-by-step roadmap that you can follow to build a tight wall of security around your digital life.
Again, this is a beginner-level course. These are technical topics, but we hope to walk you through everything in a way that’s actionable and easy to understand.
Send
Email sent successfully..!!!