This course was created with the
course builder. Create your online course today.
Start now
Create your course
with
Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Insider secrets from an Ethical Hacker on Internet Safety
Welcome and getting started
[Launch Video 1] The dangers of the Internet (16:13)
[Launch Video 2] got Hacked? (11:21)
[Launch Video 3] How's your online privacy? (13:18)
[Launch Video 4] Early Bird Preview (19:55)
Richard Tardif Internet Safety University Testimonial (0:41)
Welcome Introduction (2:39)
Barbara Niven Barbara Niven Hollywood Actress Unleash Your Star Power Testimonial (1:00)
Tightening your computer security
Introduction to Updating Windows 7, 8 & 10 Part 1 of 5 (1:30)
Updating Windows 7 to prevent hacking Part 2 of 5 (2:02)
Updating Windows 8 to prevent hacking Part 3 of 5 (2:32)
Updating Windows 10 to prevent hacking Part 4 of 5 (2:41)
How to update and maintain your Mac to prevent hacking Part 5 of 5 (4:45)
Enabling real-time threat detection for Windows and Mac Part 1 (4:32)
Enabling real-time threat detection for windows 7 Part 2 (1:47)
Enabling real-time threat detection for Windows 8 Part 3 (2:30)
Enabling real-time threat detection for Windows 10 Part 4 (2:20)
Enabling real-time threat detection for Mac Part 5 (1:56)
How to create an unbreakble password (3:26)
Securing Windows 7,8,10 Operating Systems (7:45)
Physically protecting your computer from threats (3:28)
Making sure your Windows Firewall is enabled (3:22)
Scanning your computer for misconfigurations (8:04)
Updating and Securing Mozilla Firefox browser (2:21)
updating and securing chrome (3:47)
Updating and Securring Safari browser (1:52)
Updating and Securring Internet Explorer browser (4:35)
Staying Safe Online
how and why hackers pick you (6:20)
Give me 4 minutes, and I'll tell you if your windows PC has been hacked (4:06)
How hard is it to target you or your kid online (5:34)
Performing advanced Google searching to reveal personal information (4:16)
Acronyms and abbreviations (6:20)
Google Chrome Password manager (2:43)
Microsoft Edge Password Manager (2:39)
securing your email account after it was hacked (3:24)
Social Networking Safety
Introduction to enabling advanced security for your logins (2:03)
Enabling advanced security for Google (2:11)
Enabling advanced security for Facebook (1:55)
Enabling advanced security for Instagram (0:58)
Enabling advanced security for LinkedIN (1:04)
Enabling advanced security for Hotmail (1:17)
Enabling advanced security for iCloud (2:29)
Enabling advanced security for Twitter (1:29)
Fake profiles and dating sites (3:12)
Dangers of quizzes and status updates (3:18)
How to perform a proper Facebook Privacy Checkup (9:04)
Internet Safety for kids presentation for adults
internet safety for kids part 1 (7:48)
internet safety for kids part 2 (4:32)
internet safety for kids part 3 (9:52)
internet safety for kids part 4 (3:43)
How pimps recruit teens over social media - Part 1 (10:21)
How pimps recruit teens over social media - Part 2 (12:20)
Mobile Security
Securing your home router-getting started (2:13)
Securing your home router (6:41)
Public Wifi Safety (4:49)
Avoiding the Top Internet Scams
Avoiding the Top Internet Scams Part 1 (2:06)
Avoiding the Top Internet Scams Part 2 (5:13)
Avoiding the Top Internet Scams Part 3 (6:53)
Avoiding the Top Internet Scams Part 4 (5:24)
Avoiding the Top Internet Scams Part 5 (3:47)
Avoiding the Top Internet Scams Part 6 (4:49)
Avoiding the Top Internet Scams Part7 (1:58)
Ransomware Survival Guide - What to do Before, During and After an Attack
Ransomware survival guide - Introduction (11:25)
Contact me for the business edition 1-844-296-5649 x 24
Conclusion
Conclusion (4:16)
How to perform a proper Facebook Privacy Checkup
Complete and Continue