As with Introduction to PC Security, Debbie Mahler has written another marvelous course in Advanced PC Security. She writes beautifully and the use of analogies is wonderful and makes tough stuff easy to understand. This is a comprehensive and challenging course and very worthwhile; but made easier because of Debbie's great style and manner."
Debbie Mahler is a great instructor. Her courses are the most informative courses I have taken online. The information covered in the course continues to help me long after the courses are completed."
Excellent course and perfect follow-up to the introductory PC security course."
Excellent course. I am still digesting the information. Very informative. Thank you for an excellent course."
Excellent presentation of the material. There were some tough lessons, but the instructor did an outstanding job in making it understandable. I learned lots of very valuable information from this course."
Great course - I would recommend this course to anyone who has an interest in implementing stronger security measures. Highly recommended for small business. Thanks."
Ms Mahler's classes are among the best I've taken. She explains a complicated subject in an understandable concise manner."
I want to commend you on this class, the way you structured and covered your material, and explained the procedure on how to perform the utility and access the data…great class!"
You are a great teacher. I have never read a lecture, lesson, or notes that were so enjoyable. I can tell you love what you do because it shows and comes alive in your words. I felt like I was sitting in a actual classroom with you teaching. I think that is pretty remarkable…Thank you so much for being there every time I had a question or problem. Please keep doing what you are doing. It is very refreshing to an adult student who is middle aged and has many obligations. Once again, thank you."
This was the most fun schooling I've had in a long time. Thanks for making it so interesting. I actually looked forward to doing the lessons, and I can't wait to continue practicing what I've learned here."
Course Code: hck
Learn about different types of hackers, what motivates them, and when hacking is considered ethical. You will conduct a security audit on your network by trying to penetrate it just as a hacker would! Then, learn the insider techniques of how hackers gain information about business networks through preying on employees!
Discover how the search engine works and see how public and private information is stored. You will learn how hackers extract this wealth of information and how they use it against you. Then, learn how an advanced search query can turn into a useful hacking technique.
Examine the purpose, function, and communication methods of each layer within the OSI 7 Layer Network Model. Then, discover how communication between two networks takes place, and learn how you can capture packets from your network just as a hacker would.
Learn how to look for signs that your network has been exposed or penetrated. Then, examine a PC from the inside out. You will understand what ports are, where they are located, and what they do.
Learn to manage the risk involved with running certain network programs by understanding what they do, how they operate, and what you can do to keep them from exposing your network core. Then, learn all about rootkits - the malicious programs that run undetected in the background of your system.
Learn how to conduct a risk analysis in order to determine the most vulnerable points within your network. Then, get an introduction to computer forensics and learn how to become a computer investigator so that you'll be prepared if a hacker ever violates your system.
Debbie Mahler has worked for 15 years in the computer repair industry and runs her own IT business. She teaches on a wide range of business-related topics at the university level and has written six books on the business. She also contributes to several publications. Mahler holds a Bachelor of Art in Applied Behavioral Psychology and the title of Symantec Software Partner and Security Specialist.
Completion of our online Introduction to PC Security course (or equivalent experience), or completion of Introduction to Networking course (or equivalent experience). You must be familiar with PC and networking terminology and have at least a basic knowledge of how networks function.
Introduction to PC Security
Learn the fundamentals of PC and network security from this expert-developed course.
Course Code: PCS
Introduction to Networking
Learn the fundamentals of networking and prepare for a career in a new and fast-growing field.
Course Code: ITN
The instructional materials required for this course are included in enrollment and will be available online.
A new session of each course opens each month, allowing you to enroll whenever your busy schedule permits.
Once a course session starts, two lessons will be released each week for the six-week duration of your course. You will have access to all previously released lessons until the course ends.
The interactive discussion area for each lesson automatically closes two weeks after each lesson is released, so you’re encouraged to complete each lesson within two weeks of its release.
The final exam will be released on the same day as the last lesson. Once the final exam has been released, you will have two weeks plus 10 days (24 days total) to complete the final and finish any remaining lessons in your course. No further extensions can be provided beyond these 10 days.