Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Insider secrets from an Ethical Hacker on Internet Safety
Welcome and getting started
[Launch Video 1] The dangers of the Internet (16:13)
[Launch Video 2] got Hacked? (11:21)
[Launch Video 3] How's your online privacy? (13:18)
[Launch Video 4] Early Bird Preview (19:55)
Richard Tardif Internet Safety University Testimonial (0:41)
Welcome Introduction (2:39)
Barbara Niven Barbara Niven Hollywood Actress Unleash Your Star Power Testimonial (1:00)
Tightening your computer security
Introduction to Updating Windows 7, 8 & 10 Part 1 of 5 (1:30)
Updating Windows 7 to prevent hacking Part 2 of 5 (2:02)
Updating Windows 8 to prevent hacking Part 3 of 5 (2:32)
Updating Windows 10 to prevent hacking Part 4 of 5 (2:41)
How to update and maintain your Mac to prevent hacking Part 5 of 5 (4:45)
Enabling real-time threat detection for Windows and Mac Part 1 (4:32)
Enabling real-time threat detection for windows 7 Part 2 (1:47)
Enabling real-time threat detection for Windows 8 Part 3 (2:30)
Enabling real-time threat detection for Windows 10 Part 4 (2:20)
Enabling real-time threat detection for Mac Part 5 (1:56)
How to create an unbreakble password (3:26)
Securing Windows 7,8,10 Operating Systems (7:45)
Physically protecting your computer from threats (3:28)
Making sure your Windows Firewall is enabled (3:22)
Scanning your computer for misconfigurations (8:04)
Updating and Securing Mozilla Firefox browser (2:21)
updating and securing chrome (3:47)
Updating and Securring Safari browser (1:52)
Updating and Securring Internet Explorer browser (4:35)
Staying Safe Online
how and why hackers pick you (6:20)
Give me 4 minutes, and I'll tell you if your windows PC has been hacked (4:06)
How hard is it to target you or your kid online (5:34)
Performing advanced Google searching to reveal personal information (4:16)
Acronyms and abbreviations (6:20)
Google Chrome Password manager (2:43)
Microsoft Edge Password Manager (2:39)
securing your email account after it was hacked (3:24)
Social Networking Safety
Introduction to enabling advanced security for your logins (2:03)
Enabling advanced security for Google (2:11)
Enabling advanced security for Facebook (1:55)
Enabling advanced security for Instagram (0:58)
Enabling advanced security for LinkedIN (1:04)
Enabling advanced security for Hotmail (1:17)
Enabling advanced security for iCloud (2:29)
Enabling advanced security for Twitter (1:29)
Fake profiles and dating sites (3:12)
Dangers of quizzes and status updates (3:18)
How to perform a proper Facebook Privacy Checkup (9:04)
Internet Safety for kids presentation for adults
internet safety for kids part 1 (7:48)
internet safety for kids part 2 (4:32)
internet safety for kids part 3 (9:52)
internet safety for kids part 4 (3:43)
How pimps recruit teens over social media - Part 1 (10:21)
How pimps recruit teens over social media - Part 2 (12:20)
Mobile Security
Securing your home router-getting started (2:13)
Securing your home router (6:41)
Public Wifi Safety (4:49)
Avoiding the Top Internet Scams
Avoiding the Top Internet Scams Part 1 (2:06)
Avoiding the Top Internet Scams Part 2 (5:13)
Avoiding the Top Internet Scams Part 3 (6:53)
Avoiding the Top Internet Scams Part 4 (5:24)
Avoiding the Top Internet Scams Part 5 (3:47)
Avoiding the Top Internet Scams Part 6 (4:49)
Avoiding the Top Internet Scams Part7 (1:58)
Ransomware Survival Guide - What to do Before, During and After an Attack
Ransomware survival guide - Introduction (11:25)
Contact me for the business edition 1-844-296-5649 x 24
Conclusion
Conclusion (4:16)
Teach online with
Avoiding the Top Internet Scams Part 5
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock