Course code Title Language Price # Unit Startdate Hour Enddate Location Signup
QAPYOF End User Security: Protecting Your Online Footprint on your request on your request Contact Us

End User Security: Protecting Your Online Footprint

End User Security: Protecting Your Online Footprint

Overview

Course code: 
QAPYOF
Duration: 
1
Time Unit: 
Day(s)
Overview: 

This course is designed to show delegates how easy it can be for others to obtain data about ourselves through various means, but also how much of this can be stopped with a few tweaks to our machines and our online behaviour. The day is divided into three key sections - an introduction and two main topic sections, Personal Data and Computer data.

If a stranger came up to you on the street, would you give them your name, National Insurance Number, e-mail address, date of birth or other such information? Probably not!

Yet people give out this sort of personal information on the Internet every single day, often without a second thought about what happens to it once the send or post button has been pressed. Even when we do not give out this information freely, it has become increasingly easy to collate snippets of data, and to then deduce personal information.

In some cases, the personal comments we make online can affect the work systems we use. Careless talk on social sites and forums can allow hackers to leverage their way into our corporate systems.

Target Audience:

This course is aimed at anyone who wishes to learn about protecting themselves when using the Internet and the World Wide Web.

  • At the conclusion of this course, delegates will be able to describe some of the ways in which their personal data can be inadvertently exposed to others whilst online and understand how this can be controlled or stopped.
  • Delegates will understand the importance of being vigilant with their data and how to avoid some of the tricks that fraudsters might employ to elicit our data through social engineering.
  • Delegates will also look at the ways our machines can expose our data and learn how to correctly configure tools that will help control the amount of information our machines emit.

Topics

Topics: 

Module 1 - Introduction

Your online identity and why it matters - This introduction module outlines the sorts of data we leave behind and how it could be used by others to commit many different crimes such as fraud and identity theft. It also highlights how companies are using this data to personalise adverts to individuals and to ensure that they hit their demographic markets. It also shows how data you publish today could affect your life years down the line.

Module 2 - Personal Data

This module looks at the sorts of places that we visit on the Internet, and the types of data we may publish about ourselves, from Social Networks to blogs, e-mails and more. We look at how we gradually expose more and more of our private lives online.

It's not just the data we publish ourselves online that we need to worry about. We increasingly use the Internet and WWW for shopping, so inevitably we have to offer up highly sensitive data relating to our bank or credit cards - How safe is e-commerce?

Criminals will go to great lengths to obtain our data, we therefore have to be very wary of fake e-mails and web sites that try to trick us into divulging sensitive information. This module shows delegates how to spot and avoid such traps.

We also look at how to create secure online identities with strong passwords and varying levels of anonymity.

Module 3 - Computer data

When we use the WWW, our computers leave a trail of digital data that can be used to identify and expose our online activities. By understanding what these digital breadcrumbs are, we can take steps to remove or alter them so that they become useless to others.

In this module, delegates will learn about Geo-locating via IP addresses, GPS and Wi-Fi, they will learn about anonymous web browsing via proxy services, about the data browsers offer up to others and how web sites share our online activities with the use of cookies.

We will look at how to configure some of the more popular browsers to cut down on the amount of data our machines emit and how to install tools that can cover the areas the browsers cannot.

Prerequisites

Prerequisites: 
  • No pre-requisites are expected other than a familiarity with Windows and browser technologies.