Start learning with our library of video tutorials taught by experts. Get started

Computer Privacy and Security Essential Training (2006)
Illustration by Bruce Heavin

Computer Privacy and Security Essential Training (2006)

with Patrick Crispen

Video: Welcome

The Internet is an unmatched resource for home, education, and business. And no matter where and how you are using the Internet, it is critical that you protect your privacy and security while you are online. Computer Privacy & Security Essential Training is a movie-based tutorial designed for both novice and experienced Windows or Macintosh users who want to avoid the varied security issues plaguing most Internet-connected computers. Instructor Patrick Crispen shows you how to effectively resolve most of your computer's vulnerabilities, covering physical security, malware, the hidden tracking features in Microsoft Office, and the five things you must do each week to minimize the chances that your computer will be compromised.
Expand all | Collapse all
  1. 53s
    1. Welcome
      53s
  2. 25m 27s
    1. The basics
      7m 50s
    2. The threats
      6m 59s
    3. The impact of security and privacy breaches
      6m 24s
    4. Microsoft's 10 immutable laws of security
      4m 14s
  3. 1h 17m
    1. What are firewalls and how do they work?
      9m 17s
    2. What firewalls can't do
      2m 52s
    3. Hardware versus software firewalls
      4m 45s
    4. Setting up and securing a hardware firewall/router
      11m 30s
    5. Configuring and using the firewall in Windows XP
      4m 3s
    6. Configuring and using the firewall in Windows XP SP2
      3m 23s
    7. Configuring and using the firewall in Mac OS X
      3m 39s
    8. Commercial and free software firewalls pt 1
      7m 44s
    9. Commercial and free software firewalls pt 2
      7m 14s
    10. Testing your firewalls
      1m 25s
    11. Sygate Online Services
      14m 35s
    12. Shields Up
      6m 59s
  4. 1h 26m
    1. How wireless networks work and how to secure them
      20m 53s
    2. Wireless encryption 101
      11m 10s
    3. Securing a Linksys wireless router
      16m 5s
    4. Securing a D-Link wireless router
      8m 26s
    5. Securing a NETGEAR wireless router
      9m 18s
    6. Securing an Apple Airport
      11m 30s
    7. Connecting your PC to a secure wireless network
      8m 41s
  5. 43m 53s
    1. Why patch?
      10m 42s
    2. What is patch management?
      3m 52s
    3. Running Microsoft Update
      9m 15s
    4. Running Apple Software Update
      2m 7s
    5. Patching other software
      6m 51s
    6. Dealing with exploits on unpatched computers
      6m 43s
    7. Patch hoaxes
      4m 23s
  6. 39m 12s
    1. Definitions
      12m 6s
    2. Why is antivirus software necessary?
      5m 53s
    3. Picking an antivirus solution
      5m 16s
    4. Configuring your antivirus
      7m 6s
    5. Updating your antivirus definitions
      2m 29s
    6. Renew or uninstall?
      1m 10s
    7. Virus hoaxes
      5m 12s
  7. 49m 7s
    1. Definitions, damage, and how spyware gets installed
      9m 15s
    2. Spyware detection and removal
      4m 37s
    3. Cookies
      4m 18s
    4. How to download and run Spybot Search and Destroy
      6m 18s
    5. How to download and run Lavasoft Ad-Aware
      6m 29s
    6. How to run Hijack This and post a log
      8m 3s
    7. How to download and run MacScan
      5m 14s
    8. Fake antispyware
      4m 53s
  8. 28m 49s
    1. What is safe surf?
      8m 37s
    2. Ditch or secure Internet Explorer
      11m 24s
    3. Why P2P is so dangerous
      8m 48s
  9. 22m 25s
    1. The implications of MTBF
      4m 48s
    2. What to back up and how
      14m 25s
    3. The myth of the 100 year CD
      3m 12s
  10. 25m 29s
    1. What is the 'Weekly Fab Five'?
      1m 33s
    2. One: Update your antivirus/antispyware
      3m 27s
    3. Two (PC): Update your OS (Windows Update)
      3m 14s
    4. Two (Mac): Update your OS (Apple Software Update)
      1m 54s
    5. Three (PC): Check your hard drive (Windows)
      4m 56s
    6. Three (Mac): Check your hard drive (Macintosh)
      4m 29s
    7. Four: Defragment your hard drive
      3m 49s
    8. Five: Back up your data
      2m 7s
  11. 24m 30s
    1. Extra stuff?
      2m 35s
    2. Displaying hidden file extensions on a PC
      4m 10s
    3. Disabling Auto-Run on a PC
      3m 30s
    4. Removing private information from Microsoft Office documents
      4m 55s
    5. Creating secure documents with Adobe Acrobat
      5m 22s
    6. Disabling universal plug and play
      3m 58s
  12. 45m 1s
    1. Protecting your children online
      11m 45s
    2. Safe online purchasing
      9m 6s
    3. Best practices for creating secure passwords
      8m 16s
    4. Clearing your tracks in Internet Explorer 6.x
      7m 6s
    5. Clearing your tracks in Firefox 1.x
      5m 29s
    6. Clearing your tracks in Safari
      3m 19s
  13. 21m 24s
    1. Web bugs and HTML mail
      8m 22s
    2. How to safely handle email attachments
      2m 55s
    3. How to spot phishing scams
      10m 7s
  14. 9m 2s
    1. How to destroy media backups
      3m 35s
    2. How to deep clean your computer before you give it away
      5m 27s
  15. 3m 9s
    1. Where to get more information on security training and certification
      2m 53s
    2. Goodbye
      16s

Watch this entire course now—plus get access to every course in the library. Each course includes high-quality videos taught by expert instructors.

Become a member
Please wait...
Computer Privacy and Security Essential Training (2006)
8h 21m Appropriate for all Apr 27, 2006

Viewers: in countries Watching now:

The Internet is an unmatched resource for home, education, and business. And no matter where and how you are using the Internet, it is critical that you protect your privacy and security while you are online. Computer Privacy & Security Essential Training is a movie-based tutorial designed for both novice and experienced Windows or Macintosh users who want to avoid the varied security issues plaguing most Internet-connected computers. Instructor Patrick Crispen shows you how to effectively resolve most of your computer's vulnerabilities, covering physical security, malware, the hidden tracking features in Microsoft Office, and the five things you must do each week to minimize the chances that your computer will be compromised.

Subject:
Business
Author:
Patrick Crispen

Welcome

Closed captioning isn’t available for this video.

There are currently no FAQs about Computer Privacy and Security Essential Training (2006).

Share a link to this course
Please wait... Please wait...
Upgrade to get access to exercise files.

Exercise files video

How to use exercise files.

Learn by watching, listening, and doing, Exercise files are the same files the author uses in the course, so you can download them and follow along Premium memberships include access to all exercise files in the library.
Upgrade now


Exercise files

Exercise files video

How to use exercise files.

For additional information on downloading and using exercise files, watch our instructional video or read the instructions in the FAQ.

This course includes free exercise files, so you can practice while you watch the course. To access all the exercise files in our library, become a Premium Member.

Upgrade now

Are you sure you want to mark all the videos in this course as unwatched?

This will not affect your course history, your reports, or your certificates of completion for this course.


Mark all as unwatched Cancel

Congratulations

You have completed Computer Privacy and Security Essential Training (2006).

Return to your organization's learning portal to continue training, or close this page.


OK

Course retiring soon

Computer Privacy and Security Essential Training (2006) will be retired from the lynda.com library on April 21, 2014. Training videos and exercise files will no longer be available, but the course will still appear in your course history and certificates of completion.


Become a member to add this course to a playlist

Join today and get unlimited access to the entire library of video courses—and create as many playlists as you like.

Get started

Already a member?

Become a member to like this course.

Join today and get unlimited access to the entire library of video courses.

Get started

Already a member?

Exercise files

Learn by watching, listening, and doing! Exercise files are the same files the author uses in the course, so you can download them and follow along. Exercise files are available with all Premium memberships. Learn more

Get started

Already a Premium member?

Exercise files video

How to use exercise files.

Ask a question

Thanks for contacting us.
You’ll hear from our Customer Service team within 24 hours.

Please enter the text shown below:

The classic layout automatically defaults to the latest Flash Player.

To choose a different player, hold the cursor over your name at the top right of any lynda.com page and choose Site preferencesfrom the dropdown menu.

Continue to classic layout Stay on new layout
Welcome to the redesigned course page.

We’ve moved some things around, and now you can



Exercise files

Access exercise files from a button right under the course name.

Mark videos as unwatched

Remove icons showing you already watched videos if you want to start over.

Control your viewing experience

Make the video wide, narrow, full-screen, or pop the player out of the page into its own window.

Interactive transcripts

Click on text in the transcript to jump to that spot in the video. As the video plays, the relevant spot in the transcript will be highlighted.

Thanks for signing up.

We’ll send you a confirmation email shortly.


Sign up and receive emails about lynda.com and our online training library:

Here’s our privacy policy with more details about how we handle your information.

Keep up with news, tips, and latest courses with emails from lynda.com.

Sign up and receive emails about lynda.com and our online training library:

Here’s our privacy policy with more details about how we handle your information.

   
submit Lightbox submit clicked