Certificate in Introduction to PC Security Online Course

Course

Online

Price on request

Description

  • Type

    Course

  • Methodology

    Online

  • Start date

    Different dates available

Learn the Fundamentals of PC and Network Security This Certificate in Introduction to PC Security Online Course, taught by a security expert, will quickly bring you up to speed on the fundamentals of PC and network security. You'll understand and explore the many vulnerabilities of operating systems, software, and networks. Then, you'll get into the minds of hackers and crackers, developing an understanding of the exploits they use to access your computer without your knowledge. You'll find out why, where, and how viruses, worms, and blended threats are created. You'll be able to identify and work to prevent DoS, SYN flooding, and other network attacks. You'll learn a safe way to share files and data across the Internet through a virtual private network. And you'll be able to install and configure a firewall to build an impenetrable moat around your computer or network. What you don't know about PC security really can hurt you! Learn why you're at risk and what you can do to protect your precious personal and business data from the outside world. Course Fast Facts: Only 6 weeks to complete this course
Approximately only 2 to 4 hours per week of study is required This course is delivered 100% on-line and is accessible 24/7 from any computer or smartphone Instructors lead each course and you will be able to interact with them and ask questions You can study from home or at work, at your own pace, in your own time You can download printer friendly course material or save for viewing off line You will be awarded a certificate at completion of this course How to study online course? Upon enrolment an automated welcome email will be sent to you (please check your junk email inbox if not received as this is an automated email), in order for you to access your online course, which is Available 24/7 on any computer or smart mobile device. New courses start every month to ensure that we have the correct ratio of...

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Entry requirements Students must have basic literacy and numeracy skills. Minimum education Open entry. Previous schooling and academic achievements are not required for entry into this course. Computer requirements Students will need access to a computer and the internet. Minimum specifications for the computer are: Windows: Microsoft Windows XP, or later Modern and up to...

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Risk
  • Access
  • Security
  • Networks
  • Internet
  • Email
  • Network
  • Network security
  • Firewall
  • PC
  • PC training
  • Operating Systems
  • Private
  • Systems
  • IT risk
  • IT Security
  • Network Training

Course programme

There are 12 units of study

Introduction to PC Security
In our first lesson, you'll learn the facts--and the myths--about PC security. Then, I'll introduce you to the language of security and explain what you need to know about each acronym. By the end of this lesson, you'll also be able to assess your own risk, whether you're an individual or manage a network of any size. You'll also perform a self-assessment to evaluate just how vulnerable you are to security flaws.

Your PC and Network
If you ever wondered what technical gurus are speaking about when they talk about LANs, WANs, VPNs, and P2P, you'll find detailed answers in this lesson. Discover the basics of networks and how your PC connects to them.

PCs, Networks, and Software Demystified
Most of us don't stop to think about how a Mac can talk to a PC and vice versa. Yet, different types of machines talk to each other on a daily basis across networks. They also talk to printers, fax machines, and a host of other devices. The OSI model for network connections lets you accomplish this, and you'll learn all about it in this lesson. I'll also teach you how, why, and where the weak links of security are in software and operating systems.

Viruses, Worms, Blended Threats, and More
Get ready to investigate the world of viruses, worms, and blended threats. You'll learn what they are and the differences between all three. I'll also show you why people create them and where they come from. Of course, all this knowledge will also teach you how to protect yourself and your network from the hackers and crackers of the world.

The Family of Malware
We’ll introduce you to the ware family in this lesson. Who is the ware family? They are the products that download themselves onto your computer without your consent or knowledge—spyware, scumware, malware, and adware. You'll meet them and learn all about their family traits and values. I'll also show you where they live, places they frequent, and how to remove these unwelcome guests that inhabit your PC.

Exploits and Vulnerabilities
You may have heard of them: vulnerabilities, exploits, and exposure. But what are they? Have you ever wondered if someone really can control your computer without your knowledge? If you've been pondering these questions lately, then you'll find your answers here, along with priceless information on protecting your computer and your network to keep your business and personal data private.

Network Attacks
Have you ever tried to access the Web but received an error saying the page can't be displayed, you aren't connected, or you don't have access? If so, you may have been under an attack! Denial of Service attacks and SYN flooding are two types of network attacks that seem to go unnoticed on personal PCs and small networks. Why? Because beginners don't know what they are, why they're happening, or where they're coming from. After this lesson, you'll no longer be left wondering what happened to your Internet connection.

Everything You Wanted to Know About Firewalls! (Part One)
This lesson will introduce you to firewalls. Join me in this lesson, and you'll soon start building an impenetrable moat around your network.

Everything You Wanted to Know About Firewalls! (Part Two)
Now that you have your moat built, it's time to arm up and defend yourself. In this lesson, you'll learn how to configure your firewall and maximize your network security.

Laptops, Notebooks, Netbooks, and Wireless Networking
You may want to check out this lesson before you grab your laptop and run off to the next Internet café, because what you learn today may surprise you! Laptops and wireless connectivity are the buzzwords of the moment, but these two technologies aren't as secure as they appear. You'll understand why in this lesson.

Virtual Private Networking (VPN)
I'm going to share my love for VPNs with you today. You'll learn what a Virtual Private Network is, how it's different from standard networks, how it works, how to secure it, and how to set up your own. Just think about the possibilities! You can share files with family across the miles by allowing them to connect remotely to your designated shared folders. You can share music files, family pictures, and anything else you choose to give them access to.

The Changing Face of Security
Now that you know what's out there, how can you possibly keep on top of security issues? There's so much information out there, how will you know what applies to you? Have no fear, for I'll show you a simple method for staying up-to-date with those security issues that only pertain to you. You'll also learn about emerging security technology, sources to use that will help make the job of managing and securing your network easier, and creating a checklist to keep handy. Finally, you can test yourself against the first security assessment to see how well you've secured your own PC or network.

Additional information

Through well-crafted lessons, expert online instruction and interaction with your tutor, participants in these courses gain valuable knowledge at their convenience. They have the flexibility to study at their own pace combined with enough structure and support to complete the course. And they can access the classroom 24/7 from anywhere with an Internet connection.

New sessions of each course run every month. They last six weeks, with two new lessons being released weekly (for a total of 12). The courses are entirely Web-based with comprehensive lessons, quizzes, and assignments. A dedicated professional instructor facilitates every course; pacing learners, answering questions, giving feedback, and facilitating discussions.

...

Certificate in Introduction to PC Security Online Course

Price on request