This course is an actionable, step-by-step beginner’s guide to locking hackers, identity thieves, and cyber criminals out of your life once and for all.
Today’s reality is yesterday’s science fiction.
You can have a real-time video conversation with someone on the other side of the planet, you can send and receive money without even taking out your wallet, and you can post content online that reaches millions of people in a matter minutes.
Unfortunately, the same technology that enables all this new freedom and convenience also exposes us to new security threats that we’ve never encountered.
Malware that infects your computer and watches everything you do, phishing scams that steal private information from millions of people—today’s digital world is a criminal’s playground. It makes the process of stealing money or even stealing someone’s entire identity way more efficient.
The worst part? You are a target.
Many people neglect taking steps to protect themselves online because they think, “Why would anyone want to steal my information?”
Well, for starters, if you have any money to your name at all, there are plenty of tech-savvy criminals out there who are patiently waiting for the opportunity to take it from you.
Beyond that, they can also steal your identity to run up charges on your credit cards, open new utility accounts, get medical treatment using your health insurance, or take advantage of your friends and family by impersonating you on social media.
So what can you do?
You can protect yourself and your private data, and you don’t have to be an IT expert to do it.
This course outlines a step-by-step roadmap that you can follow to build a tight wall of security around your digital life.
More specifically, here are some of the things we’ll cover:
- Why security matters, and how to best approach it
- The most common security threats you should be aware of
- How to develop the right mindset and browsing habits
- How to secure your smartphone and all the private information it knows about you
- The 25 most commonly used passwords (is yours on the list?)
- What makes a good password (123456 is not a good password)
- How to create and manage strong, unique passwords for all of your accounts (without needing to remember them)
- How to lock attackers out of your accounts even if they manage to steal your passwords
- A security hole that attackers can use to gain unfettered access to your accounts without knowing your passwords (and how you can defend yourself)
- How to use the power of encryption to make your private data unreadable to attackers
Again, this is a beginner-level course. These are technical topics, but I hope to walk you through everything in a way that’s actionable and easy to understand. (And if you have any questions along the way, all you have to do is ask.)
If you haven’t already, be sure to enroll in the course! I can’t wait to see you inside.
- 1. Welcome To The Course!
- 2. [Basics] Why Security Matters
- 3. [Basics] The Importance Of Multi-Layer Security
- 4. [Basics] The Most Common Security Threats
- 5. [Habits] Developing The Right Mindset And Habits For Good Security
- 6. [Habits] The Importance Of Skepticism
- 7. [Habits] Avoiding Malicious Sites And Applications
- 8. [Habits] Why Software Updates Matter
- 9. [Habits] Knowing (And Limiting) Yourself
- 10. [Smartphones] Why Mobile Security Matters
- 11. [Smartphones] Setting Up A Passcode Lock
- 12. [Smartphones] Managing Third-Party App Permissions
- 13. [Smartphones] Locating A Lost Or Stolen Smartphone
- 14. [Passwords] The Importance Of Password Security
- 15. [Passwords] The 25 Most Common Passwords
- 16. [Passwords] Best Practices For Strong Password Security
- 17. [Passwords] Using A Password Manager
- 18. [2FA] What Is Two-Factor Authentication?
- 19. [2FA] Types Of Mobile Two-Factor Authentication
- 20. [2FA] LastPass Two-Factor Authentication
- 21. [2FA] Google Two-Factor Authentication
- 22. [2FA] Facebook Two-Factor Authentication
- 23. [2FA] Twitter Two-Factor Authentication
- 24. [2FA] Two-Factor Authentication For Other Services
- 25. [Connected Apps] The Danger Of Rogue Connected Apps
- 26. [Connected Apps] Managing Connected Apps On Google
- 27. [Connected Apps] Managing Connected Apps On Facebook
- 28. [Connected Apps] Managing Browser Extensions/Addons
- 29. [Connected Apps] Staying Secure With Third-Party Apps And Extensions
- 30. [Encryption] What Is Encryption?
- 31. [Encryption] How SSL (HTTPS) Protects Your Passwords And Private Data
- 32. [Encryption] Encrypting Your Web Traffic With A Virtual Private Network (VPN)
- 33. [Encryption] How To Encrypt Your Computer’s Hard Drive
- 34. [Encryption] How To Encrypt Your Smartphone
- 35. The Next Steps