Login: Password:  Do not remember me

Categories




Video TrainingPersonal Information Security



Personal Information Security
Published 11/2022MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHzLanguage: English | Size: 5.04 GB | Duration: 8h 45m

Becoming invisible (or almost) to the eyes of the big brother

What you'll learn
How mass surveillance and profiling work and how to defend ourself
What tools to use, how to choose them, and what practices to adopt to protect ourself
Useful strats to protect our business
How to increase anonymity and reduce our digital fingerprint on the Internet
How to communicate by circumventing censorship
How to correct bad habits in the use of our devices that can harm us
The background of the technology we use every day with an overview of news from around the world
How and why the threats we face today arose and what risks we face
How the Internet has changed from its origins to become the network we know today
What other threats we may face in the future
Requirements
No knowledge or experience is necessary.


The course is designed for people who want to learn from scratch or learn more about topics that are increasingly felt nowadays without becoming experts on the subject, and is developed without the use of technicalities.
Description
The digital information that have now become our digital identity have become more and more valuable, but the attention paid to protecting them has not increased in equal measure, and among the many reasons why this has not happened, the first is undoubtedly the lack of tangibility of the risks: we do not perceive them until they present the bill. Exactly what happens when somebody sign a contract with closed eyes. Even worse, we often entrust them to third parties who are neither able nor interested in truly protecting them. We have seen in recent years how even the most famous big names of the Internet have had very serious and unacceptable security problems, somes culpable but somes malicious. And what can happen when in addition to commercial interests, on top of our data, inclinations and behavior, also criminal or political interests surfaceWe have filled our homes and offices with devices that somes work behind our backs, or we have chosen services thinking there was no alternative but to sacrifice our privacy and security. But even the apparently banal things can have a heavy bill; let's make a few examples:How many use passwords that are the same for all services, built on personal information (names, affections, birth dates, logical patterns...), because one does not know how to easily manage dozens and dozens of complex passwords, whose information used to create them are publicly visible on their social profilesHow much of this information are even used to recover access to a bank account, such as with the "security questions" that have very little securityHow many post their movements on social networks allowing thieves to enter their homes at the best , or post photos taken at home in which their security systems are visibleHow many use cloud services without knowing which of them by contract, can do whatever they want with the data they upload to them and that perhaps could be valuable projectsJust as a financial culture can help to protect savings, a culture about the conscious use of technology can help protect oneself. Somes all it takes is small actions such as small habit changes to achieve great results, but the difficulty is figuring out where to start to get to the required awareness without necessarily becoming an IT expert.This course was created exactly with that goal in mind. It tells events involving the technologies we use every day that are unknown to many, touching ethical and legal aspects. It collects all the most important actions and tools by contextualizing them and allowing even non-experts to start protecting themselves right away, coming to gain autonomy in choosing privacy-friendly IT applications and services.

Overview

Section 1: The basics

Lecture 1 Presentation, objectives and structure

Lecture 2 Internet, 1995 circa

Lecture 3 The Privacy

Lecture 4 What are the dangers

Section 2: Internet, from 2008 to TODAY

Lecture 5 The social media

Lecture 6 The search ees

Lecture 7 The cloud systems

Section 3: Identifying the weak points

Lecture 8 Metadata and intrusions

Section 4: How to protect ourselves

Lecture 9 1st level tools

Lecture 10 2nd level tools

Lecture 11 3rd level tools

Lecture 12 Messaging applications

Lecture 13 Good habits

Lecture 14 The passwords

Lecture 15 The Wi-Fi

Section 5: Choosing the tools

Lecture 16 Guidelines for choosing reliable programs and services

Section 6: In conclusion

Lecture 17 What threats for the future What else can we do

Lecture 18 Final considerations

People with no experience in cybersecurity who want to gain a higher level of awareness about the dangers and defend themselves without becoming experts.,People looking for practical, easy-to-apply tips for using their devices more securely and protecting their communications and sensitive information.,People curious about the background of today's most prevalent technologies and the events around the world that have seen them take center stage in recent years.

HomePage:
Https://anonymz.com/https://www.udemy.com/course/personal-information-security/




DOWNLOAD
1dl.net


uploadgig.com


rapidgator.net


[related-news]

Related News

    {related-news}
[/related-news]

Comments (0)

Search



Updates




Friend Sites


» TinyDL
» EbookTra
» 0dayHome

Your Link Here ?
(Pagerank 4 or above)