Computer Security & Internet Privacy - Class 1
LEARN HOW TO PROTECT YOURSELF FROM HACKERS & CYBERATTACKSSECURE YOUR COMPUTER, PHONE & PRIVATE DATAThis course is composed of two separate classes and is for both Windows and Mac users who are interested in improving their security and privacy.The course material is written for both "power users" who are quite adept at using computers, as well as novice users. Step-by-step instructions and screenshots are provided along for each topic.Course Info:This is the course that should have come as a User Guide to every computer and smartphone purchase.It is very useful for yourself or for a loved one to give yourselves the knowledge & skills to help protect from cyber attacks, cyber spying and identity theft. Cyber criminals use people's personal information or sensitive corporate data to commit cyber crimes. Cyber criminals can use your browsing history to commit blackmail. Ransomware attacks cost individual consumers thousands of dollars and companies tens of thousands of dollars. Corporate espionage costs companies billions of dollars every year. The cost of identity theft can even be more expensive, sometimes it can cripple your life. So even if you say you have "nothing to hide", you still need to protect your private and personal info so other people cannot use it to impersonate you and access your bank accounts or open bank accounts, credit cards or credit lines in your name with your info. Imagine if your smartphone gets lost or stolen - what can someone do with that information contained in it, from usernames, contacts, browsing history, location history or locations frequented, etc.Computer manufacturers, retailers and resellers do not require or recommend customers to have computer security & privacy knowledge. They do not even mention it; they just take your money. This is similar to buying a boat; no license or certification requirement.Personal consumers are vulnerable as well as small businesses, as they usually don't have the budget for network security like the bigger companies. ** This class will be 3 to 3.5 hours in duration In Class 1, you will learn to:- Harden Your Computer To Better Prevent Cyber Attacks- Encrypt Your Computer & Smartphone Hard Drive To Protect Your Data In Case It Is Lost Or Stolen- Tactically Use Your Computer's Recovery System To Get Rid Of Viruses & Other Malware- Tactically Use Free Third Party Tools To Get Rid Of Viruses & Other Malware- Reduce Your Computer's Attack Surface, Lessening The Area Cyber-attackers Can Enter Or Exploit- Identify Suspicious Running Processes & Determine If They Are Malware Or Not- Prevent Malware and Other Programs From Automatically Being Launched At Startup- Make Yourself Invisible When Using Public Networks- See Which Files or Folders You May Be Unwittingly Sharing On The Network and Unshare Private Ones- Create A Private Folder For Your Files That Only You Can Access - Use a Network/Port Scanner To Check If Your Computer Is Vulnerable On The Network- Tactically Use User Accounts/Logins- Properly Use Your Computer's File & Folder Permissions Framework To Keep Your Data Private- Know Which Firewall & Antivirus Anti-Spyware Are Top-Rated (and Free)- Tactically Use Windows Folder Permissions To Limit Access To Personal Files- Close Ports That Are Commonly Used By Cyber Attackers To Inject Malicious Code Into Your PC- Reduce Your Vulnerability To Zero Day Attacks- Identify & Disable or Uninstall Unneeded Programs To Make Your Computer Run Faster- Be Alerted Of Any Attacks On Your Computer- Defend Your Computer From Brute Force Attacks- Prevent Your Computer From Becoming A Bot Zombie- Recognize If Your Computer Has Become A Bot Zombie- Recognize If Your Computer Has Been Infected With Malware- Know How To Deal With Suspicious Email Attachments- Use a Port Scanner To Check Your Computer's Hardness Or Vulnerability- Make Your Computer More Stable and Avoid Breaking Changes- Prevent Out-Of-Control Usage Of Hard Drive Space- Properly Clean Your Computer of Old or Temporary Files- Free Up Hard Drive Space- Securely Backup Personal Files Using Encrypted File Containers on USB Drives or Cloud Storage- Properly Delete Confidential or Sensitive Files Using A Wipe Utility- Securely Store Data On USB Thumb Drives Class 2 is available here https://secureprivateclass2.eventbrite.com Organizer Info:The instructor has 19+ years of experience in information technology, computer systems & software development (17+ years of experience architecting & building IP network-based applications and distributed systems) and for the past 12 years has focused on learning & applying computer security & privacy best practices for internet-connected computers & machines. As a software architect and developer, he has many years of experience designing and building security architectures for the applications & systems he built as well as implementing specific security measures to further protect these applications & systems. This has resulted in having a track record of having been hit by only one virus infection, ZERO ransomware attacks, ZERO adware infections, ZERO phishing attacks, and ZERO identity thefts.As part of his job as a software developer and engineer, he has successfully decompiled the compiled binaries of commercial software products to view the source code to figure out how to communicate & manipulate them to achieve desired functionality in the software applications & systems he built. This 'reverse engineering' approach is similar to the approach cyber attackers and malware authors use to discover vulnerabilities in software that they can exploit.To prevent hackers from breaking into and implementing this approach to software applications & systems he has built, the instructor has implemented defensive techniques such as server hardening, network monitoring & response, application monitoring & response, anti-XSS, anti-SQL injection, code obfuscation, variable obfuscation, string encryption, resource encryption and many others to thwart cyber attackers & malware authors. Most software binaries are not obfuscated nor encrypted. As such, it is fairly easy to decompile these binaries, view the code, and figure out ways to exploit itThe course materials for these classes spring from the knowledge & experience from the many years of doing this in the field. Where:This is an online/virtual event at the convenience of your own location. Prior to the start (10-15 hours), you will receive a registration link and info to join the webinar. Requirements:Good knowledge of how to use your computer and some technical knowledge on how to configure settings. Step-by-step instructions and screenshots will be provided and a pdf copy will be provided after the webinar.