This course has made my decision to further my interest in pc security for possible future employment. I have learned so much from you these past 6 weeks. I will definitely recommend your course to friends and relatives."
This course was excellent. Every lesson kept me interested. The assignments taught me very useful things to be done on my computer. The material is challenging, and I expect to want to review it many times in the future. The instructor demonstrated that she really knows her stuff!"
Very informative course. The presentation and additional materials helped out a lot. At 31, it is my first step in a better career, and am very grateful for teachers like you!"
What a fantastic course. It has really made me stop and think about the nitty and gritty of my computers. No more using just the default settings on my security settings!"
I have to admit I was completely clueless on how encryption works with WiFi. The horror stories on the web about individuals hacking personal info by breaking encryption always concerned me, as I had no real idea on securing my own network. Now I have an idea how to go forward with securing my laptop and other computers."
This course has been an eye opener for me; I now have a much better understanding about the Good, Bad and the Ugly of the CyberSpace World (www). At the beginning of this course I was still having internet security problems, which caused me to stumble for the first few weeks. I finally changed to "Clear" as my modem/ISP and my "www" world turned PEACE! This course helped me to see that my "aircard" was definitely manipulated/compromised. I also changed my AntiVirus software to "ESET"...and that is working! I'm presently communicating on a computer that was so compromised that techs in NYC and here in Dallas could not find the problem (blue screen at startup, force shutdowns, etc.). All of that is GONE! GONE! GONE!"
I just wanted to thank you for such an excellent course. I've learned so much. You not only know your subject matter, you are a master at teaching it! Thanks again"
Hello, I want to express appreciation for how well I picked up and managed the onslaught of newer information. I am good with languages, so it was a natural for me. But I am picky: The instructor presented the information just right. I was able to assimilate most, if not all, through the readings, the quizzes, and going over the final test. It was excellent!
Thank you, Debbie!
I've been in IT for 22 years and the government for the past 13. I've taken many courses and taught many as well. I don't remember anyone delivering a course as good as you did in this class. Great job, and I hope I have the opportunity to learn from you again."
Thanks for the great content in this course. Working in IT for many years, I've worked with many of the topics you discussed but never took a course that contained all the details. It was great to have a real professional providing real world information I can use on a daily basis. I will be looking forward to the advanced class."
Course Code: pcs
You will learn the facts and myths about PC security. You will be introduced to the language of security and what you need to know about each acronym. You will be able to assess your own risk and perform a self-assessment to evaluate just how vulnerable you are to security flaws. Then you will discover the basics of networks and how your PC connects to them.
Learn how computers talk to each other and to other devices. You will also learn how, why, and where the weak links of security are in software and operating systems. Then you will investigate the world of viruses, worms, and blended threats. You’ll learn what they are and the differences between all three. You will learn why people create them and where they come from.
Become acquainted with the ware family. They are the products that download themselves onto your computer without your consent or knowledge. You will also learn how to remove these unwanted guests. Then you will find out if someone really can control your computer without your knowledge. You will also gain information on protecting your computer and your network to keep your business and personal data private.
Have you ever tried to access the Web but received an error saying the page can’t be displayed, you aren’t connected, or you don’t have access? Denial of Service attacks and SYN flooding are two types of network attacks that often go unnoticed on personal PCs and small networks. After this lesson, you will know what happened to your Internet connection. Then you will be introduced to firewalls.
You will learn how to configure your firewall and maximize your network security. Then you will learn that laptops and wireless connectivity are two technologies that aren’t as secure as they appear. You will understand why after this lesson.
Learn what a Virtual Private Network is, how it’s different from standard networks, how it works, how to secure it, and how to set up your own. Then you will learn a simple method for staying up-to-date with security issues that only pertain to you. You’ll also learn about emerging security technology, sources to use that will help make the job of managing and securing your network easier, and creating a checklist to keep handy. Finally you can test yourself to see how well you’ve secured your own PC or network.
Debbie Mahler teaches students at the college and university level on a wide range of business-related topics, worked for nearly 15 years in the PC repair business, has a successful online IT business, has written six books, and writes for several newsletters and other publications. Long before PC security was a front-page topic, Debbie Mahler was reporting on, and educating the public about, viruses and other security threats. It was this early groundwork that earned her the title of Symantec Software Partner and Security Specialist. Debbie holds a B.A. in Applied Behavioral Psychology with graduate work in Organizational Psychology and Computer Information Systems. She was a presidential scholar and graduated with high academic honors including Phi Theta Kappa.
A familiarity with general computing terminology, an understanding of any operating system you are using (Mac, Windows, or Linux) and an ability to locate programs and change settings.
Instructional material requirements:
A new session of each course opens each month, allowing you to enroll whenever your busy schedule permits!
Once a session starts, two lessons will be released each week, for the six-week duration of your course. You will have access to all previously released lessons until the course ends.
Keep in mind that the interactive discussion area for each lesson automatically closes 2 weeks after each lesson is released, so you’re encouraged to complete each lesson within two weeks of its release.
The Final Exam will be released on the same day as the last lesson. Once the Final Exam has been released, you will have 2 weeks plus 10 days to complete the Final and finish any remaining lessons in your course. No further extensions can be provided beyond these 10 days.