Note: This course was recorded and produced by Mentor Source, Inc. We're pleased to host this training in our library.
- Balancing security, convenience, and mobility
- Working in wireless and wired situations
- Avoiding common threats
- Enabling firewalls
- Setting up a VPN and router
Skill Level Beginner
- [Instructor] Hi, I'm Jordan Scott, computer engineering expert. This course provides an overview of what to expect when traveling with respect to cybersecurity. Welcome, let me start by telling you a little bit about myself. I have been a warfighter or supported warfighters for over a decade. As one of the first operational army electronic warfare officers since the Cold War, I gained some very unique experience with respect to information warfare. It is also where I picked up my call sign, Cancer, which is just a radio name.
I'm a master of science in computer engineering, open source collaboration proponent, technology integrator, and proven innovator. I have worked in additional environments, such as global positioning system, missile defense, software development, system of systems integration, and cybersecurity. I've earned a Security +, and I'm an active member of the Association of Old Crows and IEEE. I've recently done quite a bit of travel for work, and I've come across many situations.
I would definitely say international travel is far more complicated with respect to cybersecurity. Yet the principles are mostly the same. I suppose your individual situation may require specific or specialized approaches, but for the purpose of this training, we will keep things generic. Now let's get started. We'll begin with looking at general aspects of computer security. These aspects can easily be tuned with traveling. Next we will explore the big picture of wireless and wired situations, granted there are differences, yet in most characteristics they are quite the same.
After that, I'll go over some common threats and countermeasures you might discover, and some travel tips on how to secure your device, some of the technologies available, and a little bit about what not to do. Then of course, we'll end with a conclusion. Throughout this course, we will also provide examples of threats, vulnerabilities, and underlying computer techniques. Ready? Here we go.