Course Description
Course Details
Learn why you're at risk and what you can do to protect your precious personal and business data
from the outside world. This course will quickly bring you up to speed on the fundamentals of PC and
network security. You will understand and explore the vulnerability of operating systems, software, and
networks. Then, you will get into the minds of hackers and crackers, developing an understanding of
the exploits they use to access your computer without your knowledge. You will find out why, where
and how viruses, worms, and blended threats are created. You will learn a safe way to handle files and
data across the Internet through a virtual private network. By the end of this course you will be able to
install and configure a firewall to build an impenetrable moat around your computer or network.
What you will learn
- Learn to assess your own risk on your computer or network
- Learn the weak links of
security in software and operating systems
- Learn to protect your network from
hackers
- Learn priceless information on protecting your computer and keep personal data
private
- Learn to build a firewall
- Learn to set up your own Virtual Private
Network
How you will benefit
- Understand when your computer is being attacked
- Understand the many vulnerabilities
of operating systems, software, and networks
- Know how to protect your network from
hackers
- Keep your personal data private
Requirements
Hardware Requirements
- This course can be taken on either a PC or Mac.
Software Requirements
- PC: Windows 8 or later.
- Mac: macOS 10.6 or later.
- Browser: The latest version
of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also
compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational
before the course begins.
Other
- Email capabilities and access to a personal email account.
Syllabus
Lesson 1 - Introduction to PC Security. In this lesson, you will learn the facts and myths
about PC security. By the end of the lesson, you will be able to assess your own risk, whether you're an
individual or manage a network of any size. You will also perform a self-assessment to evaluate just
how vulnerable you are to security flaws.
Lesson 2 - Your PC and Network. If you ever wondered what technical gurus are speaking
about when they talk about LANs, WANs, VPNs, and P2P, you will find detailed answers in this lesson.
Discover the basics of networks and how your PC connects to them.
Lesson 3 - PCs, Networks, and Software Demystified. Most people don't stop to think about
how a Mac can talk to a PC and vice versa. Yet, different types of machines talk to each other on a
daily basis across networks. They also talk to printers, fax machines, and a host of other devices. The
OSI model for network connections lets you accomplish this, and you will learn all about it in this
lesson.
Lesson 4 - Viruses, Worms, Blended Threats, and More. Get ready to investigate the world
of viruses, worms, and blended threats. You'll learn what they are and the differences between all
three. Of course, all this knowledge will also teach you how to protect yourself and your network from
the hackers and crackers of the world.
Lesson 5 - The Family of Malware. This lesson introduces you to the ware family. What is
the ware family? They are the products that download themselves onto your computer without your
consent or knowledge—spyware, scumware, malware, and adware. You will meet them and learn all
about where they live, places they frequent, and how to remove these unwelcome guests.
Lesson 6 - Exploits and Vulnerabilities. You may have heard of them: vulnerabilities,
exploits, and exposure. But what are they? Have you ever wondered if someone really can control your
computer without your knowledge? If you've been pondering these questions lately, then you will find
your answers here, along with priceless information on protecting your computer and your network to
keep your business and personal data private.
Lesson 7 - Network Attacks. Have you ever tried to access the web but received an error
saying the page can't be displayed, you aren't connected, or you don't have access? Denial of Service
attacks and SYN flooding are two types of network attacks that seem to go unnoticed on personal PCs
and small networks. After this lesson, you will no longer be left wondering what happened to your
Internet connection.
Lesson 8 - Everything You Wanted to Know About Firewalls (Part One). This lesson will
introduce you to firewalls. Join me in this lesson, and you will soon start building an impenetrable moat
around your network.
Lesson 9 - Everything You Wanted to Know About Firewalls (Part Two). Now that you have
your moat built, it's time to arm up and defend yourself. In this lesson, you will learn how to configure
your firewall and maximize your network security.
Lesson 10 - Laptops, Notebooks, Netbooks, and Wireless Networking. Laptops and wireless
connectivity aren't as secure as they appear. You will understand why in this lesson.
Lesson 11 - Virtual Private Networking (VPN). This lesson explores the Virtual Private
Network and how it's different from standard networks, how it works, how to secure it, and how to set
up your own. You can share files with family across the miles by allowing them to connect remotely to
your designated shared folders. You can share music files, family pictures, and anything else you
choose to give them access to.
Lesson 12 - Changing Face of Security. Now that you know what's out there, how can you
possibly keep on top of security issues? There's so much information out there, how will you know what
applies to you? You will learn about emerging security technology that will help make managing and
securing your network easier. Finally, you can test yourself against the first security assessment to see
how well you've secured your own PC or network.