Год выпуска: 2015 Производитель: Udemy Сайт производителя: www.udemy.com/cyber-security-and-internet-safety/ Продолжительность: 03:30:18 Тип раздаваемого материала: Видеоурок Язык: Английский Описание: Советы и рекомендации для обучения вам, как для более безопасного онлайн-вы можете предотвратить инфекции от вредоносных программ, атак и кражи личных данных.-Does it seem like your computer is constantly getting bombarded with ads, popups, or scammy emails? Maybe you suddenly can't use your PC because of some random screen that claims you have a bad infection and just pay them some money and they can have it removed. Even worse, you start noticing odd charges on your credit card bill that you know wasn't made by you (unless you did actually buy that 25th anniversary edition pet rock - no judgement). It doesn't have to be this way! Most times, many of the bad things mentioned above happen to you because of actions you take on accident. You think that by clicking on a button that tells you to "Click here to scan your PC" or receiving a phone call from Microsoft warning you that you have a virus, that you are doing the right thing. But, it's these exact things that are opening up your systems to the bad guys! Cyber Security & Internet Safety is a course that comes from over 23 years of working with computers and seeing how making some simple changes can protect you and your PC from potential threats. Whether a single user, family, or business with hundreds of employees, these lectures and videos will walk you through step-by-step what to do and not to do. Let's build a community of users that can learn from each other! Cyber Security & Internet Safety Tips will be updated over time with advice and examples from you, our users, so that we can all benefit from shared experiences and grow in the process. Remember, there's no shame or judgement if you accidentally ran across something that tricked you into getting infected or worse. Share your story and we can all benefit from your knowledge.
Section 1: Welcome to Cyber Security & Internet Safety Lecture 1 Introduction Video 01:36 Welcome to the Cyber Security and Internet Safety course! Throughout this course, we'll be covering the following topics: Web Browsing Email Malware Identity Theft Social Networking Phones Passwords Please don't hesitate to ask questions or request clarification on any of the subject matter. Section 2: Web Browsing Lecture 2 Introduction Video 01:02 Welcome to the Web Browsing section! We'll be covering the following topics: Click Bait Search Engine Ads Torrents File Downloads HTTP vs HTTPS Privacy Lecture 3 Click Bait 03:48 Don't get lured into bad places online or accidentally follow a misleading ad by avoiding click bait. Lecture 4 Click Bait Demo 03:21 Watch a screencast of how to avoid click bait using popular Windows web browsers. Lecture 5 Search Engine Ads 04:08 Sometimes, if you're not paying close attention, you can click on a search engine ad instead of where you actually wanted to go. This can lead to frustration or possibly lead you to places that can get you into trouble. Lecture 6 Search Engine Ads Demo 03:54 Watch a screencast of what search engine ads look like and where they're located in Google, Bing, and Yahoo. Lecture 7 Torrents 07:01 Only use torrents for legal means and be very careful not to stumble into files that contain hidden malware. Lecture 8 File Downloads 06:04 There are many types of files that can be downloaded on the Web and we'll cover what to be careful of when dealing with them in your browser. Lecture 9 File Downloads Demo 04:54 Watch a screencast on what to look out for when downloading online and how easy it can be to quickly be offered dangerous files. Lecture 10 HTTP vs HTTPS 04:02 Find out how you can tell the difference between non-secure (http) and secure (https) web browser connections on the Internet. Lecture 11 HTTP vs HTTPS Demo Preview 03:40 Watch a screencast of what the differences are between http and https and how they look in Google Chrome, Mozilla Firefox, and Microsoft Edge. Lecture 12 Privacy 05:21 There are numerous privacy settings in every web browser and you should familiarize yourself with them so you can know what personal information you're sharing online. Lecture 13 Privacy Demo 05:17 Watch a screencast of where the privacy settings can be found in Google Chrome, Mozilla Firefox, and Microsoft Edge. Section 3: Email Lecture 14 Introduction Video 01:03 Welcome to the Email section! We'll be covering the following topics: Link Hovering Attachments Scams Spam Rules Lecture 15 Link Hovering Preview 02:10 By hovering your mouse over links before clicking them, you can quickly see if you might end up visiting a bad location or web site. Lecture 16 Link Hovering Demo 02:22 Watch a screencast of how easy it is to see where a link is pointing to before actually clicking it. Lecture 17 Attachments 05:41 There are many kinds of email attachments that you might be exposed to and we'll cover the most common and what to look out for. Lecture 18 Scams 06:55 Email scams are unfortunately all too common so we'll discuss how to recognize them and avoid potential danger. Lecture 19 Scams Demo 08:55 Watch a screencast of actual scam emails saved over time and what to look for in identifying potentially harmful messages. Lecture 20 Spam 04:21 There are several settings you can utilize to reduce the amount of spam emails you receive in your inbox and we'll cover them in this lecture. Lecture 21 Spam Demo 07:08 Watch a screencast of where to find and how to use common spam filter settings in Microsoft Outlook 2013 (365). Lecture 22 Rules 02:16 Email rules allow greater control and customization over incoming messages and we'll talk about what you can do with them. Lecture 23 Rules Demo 06:35 Watch a screencast of how to set up some sample email rules using Microsoft Outlook 2013 (365). Section 4: Malware Lecture 24 Introduction Video 00:49 Welcome to the Malware section! We'll be covering the following topics: Categories How They Get In Signs of Infection Cleaning Up Lecture 25 Categories 05:50 There are different categories of malware that do different things to your PC. We'll go over the most common and what makes each unique. Lecture 26 How They Get In 01:33 Malware can get into your computer in many ways so we will discuss the most common and how to avoid getting infected in the first place. Lecture 27 Signs of Infection 03:28 Even with diligence you still might get infected with malware but you may not realize the signs. In this lecture, we'll discuss how your computer may act that can tell you something might be wrong. Lecture 28 Cleaning Up 07:55 Even if you're infected by a virus or malware, there are several tools available to help you diagnose and remove them safely. We'll cover some free tools as well as some built into Windows that can get your system back in tip top condition. Lecture 29 Cleaning Up Demo 13:03 Watch a screencast where I demo some built-in Windows tools and how to use them in removing malware. Section 5: Identity Theft Lecture 30 Introduction Video 01:05 Welcome to the Identity Theft section! We'll be covering the following topics: Social Engineering Online Purchases Fake Calls Lecture 31 Social Engineering 02:55 Many times the bad guys don't even have to use high-tech ways to get your information. They can use your kindness or social means of engineering the sharing of your personal information. Lecture 32 Online Purchases 04:40 There's nothing wrong with making online purchases, especially since there's such a diverse marketplace available only a click away, but we'll discuss what to do to make these purchases as safe as possible. Lecture 33 Fake Calls 05:16 Nowadays scammers are getting even more brash by calling their victims directly to try and gain their personal or financial information. Learn what to look out for and how to avoid giving up your vital information to them. Section 6: Social Networking Lecture 34 Introduction Video 00:50 Welcome to the Social Networking section! We'll be covering the following topics: Facebook & Twitter Dating & Meetup Sites Lecture 35 Facebook & Twitter 04:00 We love using social networks but there are several things to keep in mind when using these tools. Lecture 36 Dating & Meetup Sites 03:21 If you've taken the next step and are meeting someone offline that started online, there are specific concerns that you should think about before showing up. Section 7: Phones Lecture 37 Introduction Video 00:58 Welcome to the Phones section! We'll be covering the following topics: App Downloads App Permissions Picture Data (EXIF) Sharing Information Lecture 38 App Downloads 03:06 There are safer places to download your apps and some sketchy ones, so we'll go over how to be careful so you can keep your phone nice and healthy. Lecture 39 App Permissions 04:09 Tons of app permissions are available and some developers abuse these which can give away your personal information. We'll discuss what to look for when deciding whether or not to download that next phone app. Lecture 40 Picture Data (EXIF) 02:32 You might be storing private GPS location information about yourself every time you take a picture with your phone! We'll talk about how to change these settings and remove this data in existing photos. Lecture 41 Picture Data (EXIF) Demo 05:53 Watch a screencast that shows some ways you can remove GPS data from your photos. Lecture 42 Sharing Information 05:09 It just takes a second to share something using your phone and this lecture will help guide you into safer ways of thinking before possibly making a mistake. Section 8: Passwords Lecture 43 Introduction Video 01:19 Welcome to the Passwords section! We'll be covering the following topics: Strength Management Software Login Awareness Multi-Factor Lecture 44 Strength 05:26 Passwords are your first line of defense against people trying to break into your computers or accounts. It's very important to choose stronger ones and here are some simple tips that will help. Lecture 45 Management Software 04:00 We'll go over how easy it can be to use stronger security and logins without the hassle of trying to remember them by using password management software. Lecture 46 Management Software Demo 15:07 Watch a screencast of how to use KeePass, a free password management software that's both easy and secure. Lecture 47 Login Awareness 03:02 You can use social networking sites as a way of logging into other web sites but we'll discuss why you should be aware of what kinds of data you might be sharing when doing this. Lecture 48 Multi-Factor 02:11 For very secure purposes, such as online banking or employee logins, you may want to set up multi factor authentication. We'll discuss what this is and why it adds another layer of security to passwords alone. Section 9: Conclusion Lecture 49 Congratulations! 00:47 Congratulations on completing the Cyber Security and Internet Safety course! By using the tools and techniques you've learned throughout these lectures you'll greatly enhance your security on the Internet and across all your devices. Lecture 50 Course Updates Text Lecture 51 Resources Text Please use this resource list to get all the free tools and help that was referenced throughout the course. Lecture 52 Let's Connect Text We greatly value our students and would love to make a stronger connection with you at some of our social sites listed. Like us, follow us, and check out our YouTube channel for free content!
Вы не можете начинать темы Вы не можете отвечать на сообщения Вы не можете редактировать свои сообщения Вы не можете удалять свои сообщения Вы не можете голосовать в опросах Вы не можете прикреплять файлы к сообщениям Вы не можете скачивать файлы
Сайт не предоставляет электронные версии произведений, а занимается лишь коллекционированием и каталогизацией ссылок, присылаемых и публикуемых на форуме нашими читателями. Если вы являетесь правообладателем какого-либо представленного материала и не желаете, чтобы ссылка на него находилась в нашем каталоге, свяжитесь с нами, и мы незамедлительно удалим её. Файлы для обмена на трекере предоставлены пользователями сайта, и администрация не несёт ответственности за их содержание. Просьба не заливать файлы, защищенные авторскими правами, а также файлы нелегального содержания!