Have you ever wondered whether your home WiFi network is secure?
Do you worry about getting malware and computer viruses?
Have you ever received an email from your bank and you haven’t been sure whether it was genuine?
Worrying isn’t it?
You probably connect to the Internet almost every day but you may have not thought much about Internet safety? This course will help you to answer some of these difficult question and help you to be safe online.
The course consists of video lectures with practical demonstrations on some of the key topics. There are also exercises for you to complete which hopefully will get you thinking about IT security in and out of the home. What sorts of things do we cover in the course?
- Having a secure network at home is an essential foundation and in the section “Keeping your network secure” we look at topics such as securing your home Wi-Fi network and being secure when you are on the move.
- We all have some many devices now that connect to the Internet. In the section “Securing computers, tablets and phones” we will look at how to secure all the different device types from Windows PCs to Smartphones.
- You are probably the weakest link in staying safe online. In the section “People Security – Why you are the weakest link” we look at social engineering, email scams and privacy.
So why don’t you do something amazing, and sign up for this course. Surely your safety online is worth a couple of hours of your time?
What Will You Learn?
- Describe the risks of accessing the Internet insecurely.
- Describe how the Internet works.
- Take the necessary steps to secure your home network from unwanted intrusions.
- Configure desktops and laptops so that they are secure on the Internet.
- Secure access to online applications, including email.
- Identify scam and phishing emails.
- Take the necessary steps to secure your data.
- Maintain the privacy of key data on the Internet.
Why is Internent Security so important
What do you about online security
Real world example – Ransomware
Real world example – Phishing
Can you spot a phishing email?
Real world example – Identity theft
Internet security model that works for all users