In a world of digital technology, it is easy to forget one sobering fact: our identity can be stolen from under our nose, with one click of the mouse, propelling us into nightmares in a matter of minutes, anytime, anywhere and on any one of our darling gadgets. Hackers, malware, botnets and all form of digital threats are ever more sophisticated, waiting in the shadows for that one opportunity to steal your sensitive information.
Terry Cutler, A Certified Ethical Hacker and international award winner reminds us of just how vulnerable our data really is, through chilling real-life stories, such as that of a simple USB key left purposefully behind, in any targeted enterprise’s lavatory, where an unsuspecting (albeit good-willed) employee can just pick it up, plug it in and thus, lead the hackers right into the company’s core data.
Terry’s training will teach you how to
- Easily come up with an undecipherable password
- How to secure your information on social media
- How to detect threats
- How to identify frauds
- How to find out what personal information about yourself is floating on the web
- How to protect your children against cyberpredators.
Your Instructor
Terry Cutler is a government-cleared cybersecurity expert (a certified ethical hacker), and the Founder and Lead Ethical Hacker at Cyology Labs in Montréal, Canada. He specializes in the anticipation, assessment, and prevention of security breaches for governments, corporations, businesses, and consumers, as well as Internet Safety for Children.
As an award-winning information security strategist for almost 20 years, Mr. Cutler has advised some of Canada’s largest companies on how to prevent and remedy internal and external security penetration. For the general public, he developed an effective online learning program arranged in modules and updated regularly to keep up with the rapidly changing digital landscape in which “wild-west” internet bandits constantly seek and find ways to break into our lives.
Terry Cutler is a frequent contributor to media reportage about cyber-crime, spying, security failures, internet scams, and the real social network dangers that families and individuals face every day.
Terry Cutler has coined the term Cyologist™ to describe what he does. His mission is to “help individuals and corporations protect themselves from data breaches and other online cyber threats through his videos, media appearances, coaching products and consulting services.”
Course Curriculum
-
Preview[Launch Video 1] The dangers of the Internet (16:13)
-
Preview[Launch Video 2] got Hacked? (11:21)
-
Preview[Launch Video 3] How's your online privacy? (13:18)
-
Preview[Launch Video 4] Early Bird Preview (19:55)
-
PreviewRichard Tardif Internet Safety University Testimonial (0:41)
-
PreviewWelcome Introduction (2:39)
-
PreviewBarbara Niven Barbara Niven Hollywood Actress Unleash Your Star Power Testimonial (1:00)
-
StartIntroduction to Updating Windows 7, 8 & 10 Part 1 of 5 (1:30)
-
StartUpdating Windows 7 to prevent hacking Part 2 of 5 (2:02)
-
StartUpdating Windows 8 to prevent hacking Part 3 of 5 (2:32)
-
StartUpdating Windows 10 to prevent hacking Part 4 of 5 (2:41)
-
StartHow to update and maintain your Mac to prevent hacking Part 5 of 5 (4:45)
-
StartEnabling real-time threat detection for Windows and Mac Part 1 (4:32)
-
StartEnabling real-time threat detection for windows 7 Part 2 (1:47)
-
StartEnabling real-time threat detection for Windows 8 Part 3 (2:30)
-
StartEnabling real-time threat detection for Windows 10 Part 4 (2:20)
-
StartEnabling real-time threat detection for Mac Part 5 (1:56)
-
StartHow to create an unbreakble password (3:26)
-
StartSecuring Windows 7,8,10 Operating Systems (7:45)
-
StartPhysically protecting your computer from threats (3:28)
-
StartMaking sure your Windows Firewall is enabled (3:22)
-
StartScanning your computer for misconfigurations (8:04)
-
StartUpdating and Securing Mozilla Firefox browser (2:21)
-
Startupdating and securing chrome (3:47)
-
StartUpdating and Securring Safari browser (1:52)
-
StartUpdating and Securring Internet Explorer browser (4:35)
-
Starthow and why hackers pick you (6:20)
-
StartGive me 4 minutes, and I'll tell you if your windows PC has been hacked (4:06)
-
StartHow hard is it to target you or your kid online (5:34)
-
StartPerforming advanced Google searching to reveal personal information (4:16)
-
StartAcronyms and abbreviations (6:20)
-
StartGoogle Chrome Password manager (2:43)
-
StartMicrosoft Edge Password Manager (2:39)
-
Startsecuring your email account after it was hacked (3:24)