This course is designed to provide mature professionals with the knowledge and skills needed to understand and apply various computer security concepts. Participants will learn about authentication, 2FA, anti-virus, firewalls, encryption, DNS, geo-identifiers, and OSINT.
Through hands-on exercises, case studies, and practical examples, participants will gain a deeper understanding of computer security and its importance in today’s digital world.
Course Outline:
Introduction to Computer Security
- Definition of computer security
- The importance of computer security
- Common computer security threats
- Authentication
Usernames and passwords
- Two-factor authentication (2FA)
- Biometric authentication
- Single sign-on (SSO)
- Anti-virus
Definition of anti-virus
- Types of malware
- How anti-virus software works
- Best practices for using anti-virus software
- Firewalls
Definition of firewalls
- Types of firewalls
- How firewalls work
- Best practices for using firewalls
- Encryption
Definition of encryption
- Types of encryption
- How encryption works
- Best practices for using encryption
- DNS
Definition of DNS
- How DNS works
- Common DNS attacks
- Best practices for using DNS
- Geo-Identifiers
Definition of geo-identifiers
- How geo-identifiers work
- Common uses of geo-identifiers
- Privacy concerns related to geo-identifiers
- OSINT
Definition of OSINT
- Common sources of OSINT
- How OSINT is used in computer security
- Best practices for using OSINT
- Â
Course Requirements:
- Participants should have basic computer skills and familiarity with the internet.
- Access to a computer or laptop with internet access is required.
- No prior knowledge of computer security is required.
Course Duration:
Course Format:
The course will be delivered online through a combination of pre-recorded lectures, live virtual sessions, and hands-on exercises.
Course Outcome:
Upon completion of this course, participants will have gained a solid understanding of computer security concepts, tools, and techniques. They will be able to apply this knowledge in their personal and professional lives to better protect their digital assets and sensitive information.
Course Content
Gaining Access
About Instructor
