Welcome, Guest ( Register | Login )

Computer Security & Internet Privacy Classes Listing ID: 632224

Number of Times Viewed: 179

Classified Ad Info

Place Free Ads


Learn How To Protect Yourself From Hackers & Cyberattacks And Secure Your Computer, Phone & Private Data

This course is composed of two separate classes and is for both Windows and Mac users who are interested in improving their security and privacy.

Class 1

Wednesdays and Saturdays starting April 28

Wednesdays from 11:30am - 3pm and Saturdays 10:30am - 2pm Pacific


Class 2

Fridays and Saturdays starting June 2

Fridays from 11:30am - 3pm and Saturdays 3pm - 6:30pm Pacific


The course material is written for both "power users" who are quite adept at using computers, as well as novice users. Step-by-step instructions and screenshots are provided along for each topic.

In Class 1, you will learn to:
- Harden Your Computer To Better Prevent Cyber Attacks
- Encrypt Your Computer & Smartphone Hard Drive To Protect Your Data In Case It Is Lost Or Stolen
- Tactically Use Your Computer's Recovery System To Get Rid Of Viruses & Other Malware
- Tactically Use Free Third Party Tools To Get Rid Of Viruses & Other Malware
- Reduce Your Computer's Attack Surface, Lessening The Area Cyber-attackers Can Enter Or Exploit
- Identify Suspicious Running Processes & Determine If They Are Malware Or Not
- Prevent Malware and Other Programs From Automatically Being Launched At Startup
- Make Yourself Invisible When Using Public Networks
- See Which Files or Folders You May Be Unwittingly Sharing On The Network and Unshare Private Ones
- Create A Private Folder For Your Files That Only You Can Access
- Use a Network/Port Scanner To Check If Your Computer Is Vulnerable On The Network
- Tactically Use User Accounts/Logins
- Properly Use Your Computer's File & Folder Permissions Framework To Keep Your Data Private
- Know Which Firewall & Antivirus Anti-Spyware Are Top-Rated (and Free)
- Tactically Use Windows Folder Permissions To Limit Access To Personal Files
- Close Ports That Are Commonly Used By Cyber Attackers To Inject Malicious Code Into Your PC
- Reduce Your Vulnerability To Zero Day Attacks
- Identify & Disable or Uninstall Unneeded Programs To Make Your Computer Run Faster
- Be Alerted Of Any Attacks On Your Computer
- Defend Your Computer From Brute Force Attacks
- Prevent Your Computer From Becoming A Bot Zombie
- Recognize If Your Computer Has Become A Bot Zombie
- Recognize If Your Computer Has Been Infected With Malware
- Know How To Deal With Suspicious Email Attachments
- Use a Port Scanner To Check Your Computer's Hardness Or Vulnerability
- Make Your Computer More Stable and Avoid Breaking Changes
- Prevent Out-Of-Control Usage Of Hard Drive Space
- Properly Clean Your Computer of Old or Temporary Files
- Free Up Hard Drive Space
- Securely Backup Personal Files Using Encrypted File Containers on USB Drives or Cloud Storage
- Properly Delete Confidential or Sensitive Files Using A Wipe Utility
- Securely Store Data On USB Thumb Drives

In Class 2, you will learn to:
- Anonymously And Privately Browse The Web
- Browse The Web More Securely and Safely
- Understand How Malware Uses Your Browser To Attack You
- Configure Your Browser Settings To Close Security Loopholes
- Install Useful Browser Security Add-ons, Plug-ins and Extensions
- Know How To Determine If Your Browser Has A Secure Connection To A Website
- Know How To Clear Your Browser of Personal Data Such As Browsing History & Caches
- Prevent Websites From Tracking You
- Prevent Websites From Spying On You And Gathering Personal Information About You
- Prevent Websites From Running Rogue Javascript On You
- Protect Your Computer From Viruses and Other Malware
- Protect Yourself From Phishing/SpearPhishing Attacks
- Understand The Anatomy of a URL And Determine If It Is Real Or Fake
- Identify Fake Links Sent via Email or Text So You Know Which Ones Not To Click On
- Install Useful Browser Security Add-ons, Plug-ins and Extensions
- Send Email Securely And Privately From Prying Eyes
- Learn How To Use Passwords More Securely
- Securely Use Your Passwords And Use Password Managers
- Choose An Email Client That Can Send Securely And Privately For Your Desktop and Smartphone
- Configure Your Email Client To Use A VPN or Proxy
- Configure Your Skype To Use A VPN or Proxy
- Avoid Fake Public Wifi Hotspots Set Up By Hackers
- Identify Router-based Man-In-The-Middle Attacks
- Monitor Network Activity In Your Computer And See If Malware Or Botnet Is Using It
- Monitor Activity In Your Home Network And See If Malware Or Botnet Is Using It
- Harden Your Home or Office Router
- Secure Your Phone Calls
- Use Secure Messaging Apps Instead of Standard Text/SMS messages
- Use Private Or Unlisted Phone Numbers When Transacting With Strangers Online
- Configure Your Smartphone's (Android & iPhone) Privacy Settings
- Encrypt Your Smartphone's Hard Drive or Storage To Protect It In Case It Is Lost or Stolen
- Identify & Uninstall 'Junk' Apps That Came Pre-installed in Your Phone
- Use A VPN or Proxy In Your Smartphone
- Use A Private & Anonymous System That Is Free & Portable (perfect for use at cyber cafes)

Course Info:
This is the course that should have come as a User Guide to every computer and smartphone purchase.