This book will provide all the practical knowledge needed to test your network’s security using a proven hacker’s methodology.

Learn the secrets from one of the world’s most successful Cyber Security Experts:

A miracle has bloomed and is now an invited guest in your living rooms, bedrooms and in your hands. It’s called the Internet and its everywhere. Internet Safety expert Terry Cutler has been a witness to the miracle but has also seen its dark side. What used to be a gateway to connect socially and to learn has become a haven for cyber bullies and predators intend on harming our kids and taking advantage of our senior citizens. Protecting families has become Terry’s passion, and he is offering an ongoing video series with up to date simple tips and tricks for protecting families who are increasingly online.

 

Terry’s videos will introduce you to this dark side that many of our children are experiencing while online and connecting through social media sites. He will show you how to Google yourself, search out fake profiles, recognize changes in the behaviours of family members, how to block objectionable material, create strong passwords, encouraging us all to assume a mindset toward Internet safety.

 

Here’s what we’ll learn

 

Tightening your computer security: In this module I’d like to walk you through a pre-flight check before we head back onto the internet. In a lot of cases, I often see machines that are already infected, or have too much access enabled that would easily facilitate a virus infection. I’ll walk you through how to do this on both a Mac and PC. We’ll do a quick checkup to make sure your browser is configured for safe and convenient browsing. I’ll guide you with a simple tool that will allow you to find out if you’re already hacked and being spied on hackers or by someone you already know like a crazy ex-boyfriend or girlfriend. And finally, I’ll also walk you through step-by-step how to create an unbreakable password which will be required going forward for all your online activity. No more weak John123 passwords YEEEEEEESSSSSSSS!!!

 

Staying Safe Online: In the staying safe online module, I’ll explain why and how hackers and scammers are targeting and tricking you into clicking on stuff you shouldn’t be. I’ll teach you about how Internet predators groom children and who the perfect victims are. I’ll even show you how to search for information about yourself that you didn’t even know existed.

 

Social Networking safety: In this “social networking safety” module, I’ll walk you through how to lock down your accounts on the most popular social media sites. I’ll even walk you through step by step how to perform a Facebook privacy checkup, and how to spot fake profiles. This is very handy for the folks on dating sites. I’m sure you’d rather learn to do a few clicks rather than risking going on that date.

 

Addressing Cyber Bullying, Revenge porn and Sextortion: This is a very hot topic at the moment. In this “Cyber Bullying, revenge porn and sextortion” module, we’ll cover what it is, the seriousness of it and how not to respond to cyber harassment.

 

Mobile Security: Your entire world is on your mobile device. You don’t realize it until the phone goes missing. In this “mobile security” module, I’m going to guide you on how to secure your device and set it up for “self-destruct mode” incase if it was lost and someone is trying to crack your code. I’ll teach you how to enable automated backups, and finally how not to get bill shock whenever you lend your child your phone.

 

Internet Scams: In this “internet Scams” module, I’ll show you how to avoid getting hacked or scammed by dissecting a few sample emails that I’ve received over the years. We’ll discuss a very serious type of malware called Ransomware that generated about a billion dollars for cyber criminals

 

Solutions and Strategies: In this “solutions and strategies” modules, we’ll talk about how parents and their kids can work together and share online experiences to facilitate a way for parents to be able to guide their kids online like they do in the real world. I’ll discuss monitoring tools which you can install on your PC or router so that you can Trust but verify what your kids are doing online.

 

Conclusion: In this “conclusion” module, we’ll wrap up this course and I’ll give you my 2 cents on what threats are on the horizon that you should be aware of. Especially when your fridge, toaster and car get connected into the internet. The fun is just getting started !!

Conduct realistic and effective security tests on your network by learning how key data systems are stealthily exploited.

Learn the secrets of the world’s most successful Internet Marketers: