About this course

Course type Specialist
Course code QAPYOF
Duration 1 Day

Updated for 2018, this one day course is designed to show delegates how easy it can be for others to obtain data about ourselves through various means, but also how much of this can be stopped with a few tweaks to our machines and our online behavior.

If a stranger came up to you on the street, would you give them your name, National Insurance Number, e-mail address, date of birth or other such information? Probably not!

Yet people give out this sort of personal information on the Internet every single day, often without a second thought about what happens to it once the send or post button has been pressed. Even when we do not give out this information freely, it has become increasingly easy to collate snippets of data, and to then deduce personal information. In some cases, the personal comments we make online can affect the work systems we use. Careless talk on social sites and forums can allow hackers to leverage their way into our corporate systems.

Our mobile devices have a number of inherent security weaknesses out of the box, learn about mobile device security.

Target Audience:

This course is aimed at anyone who wishes to learn about protecting themselves when online and using mobile devices.

Prerequisites

No pre-requisites are expected other than a familiarity with Windows and browser technologies.

Delegates will learn how to

  • At the conclusion of this course, delegates will be able to describe some of the ways in which their personal data can be inadvertently exposed to others whilst online and understand how this can be controlled or stopped.
  • Delegates will also look at the ways our machines can expose our data and learn how to correctly configure tools that will help control the amount of information our machines emit.
  • Delegates will understand the importance of being vigilant with their data and how to avoid some of the tricks that fraudsters might employ to elicit our data through social engineering.

Outline

Module 1 – Introduction

Your online identity and why it matters. This introduction module outlines the sorts of data we leave behind and how it could be used by others to commit many different crimes such as fraud and identity theft.

Module 2 – Device Data

When we connect to the internet and use the WWW, our computers leave a trail of digital data that can be used to identify and expose our online activities. By understanding what these digital breadcrumbs are, we can take steps to remove or alter them so that they become useless to others.

In this module, delegates will learn about Geo-locating via IP addresses, GPS and Wi-Fi and how to mitigate against them using a number of anonymous web browsing techniques.

Module 3 – Browsers and Applications

Browsers and applications are the window to the digital world, however they transmit data largely without our knowledge. In this module delegates will learn how and what kinds of data is being collected and how to correctly configure browsers and applications in order to limit not only the information we let out but the access we are giving.

Module 4 – Personal data

This module looks at the sorts of places that we visit on the Internet and the types of data we may publish about ourselves, from Social Networks to blogs, e-mails and more. We look at how we gradually expose more and more of our private lives online.

We also look at how to create secure online identities with strong passwords and varying levels of anonymity.

Module 5 – Online Fraud

1 in 10 people will fall victim to online crime. Criminals will go to great lengths to obtain our data, we therefore have to be very wary of fake e-mails and web sites that try to trick us into divulging sensitive information. This module shows delegates how to spot and avoid such traps.

It's not just the data we publish ourselves online that we need to worry about. We increasingly use the Internet and WWW for shopping, so inevitably we have to offer up highly sensitive data relating to our bank or credit cards - How safe is e-commerce?

Specialist Course

1 Day

Duration

This course is authored by QA

Delivery Method

Delivery method

Classroom / Attend from Anywhere

Receive classroom training at one of our nationwide training centres, or attend remotely via web access from anywhere.

Trusted, awarded and accredited

Fully accredited to ensure we provide the highest possible standards in learning

All third party trademark rights acknowledged.