Computer Security & Internet Privacy - Class 2

Event Information

Share this event

Date and Time




Los Angeles, CA

View Map

Refund Policy

Refund Policy

Refunds up to 1 day before event

Event description



This course is an actionable, step-by-step guide to securing your computers & smartphones and maintaining privacy while online.

It is composed of two separate classes and is for both Windows and Mac users who are interested in improving their security and privacy.

The course material is written for both "power users" who are quite adept at using computers, as well as novice users. Step-by-step instructions and screenshots are provided along for each topic.

Course Info:
This is the course that should have come as a User Guide to every computer and smartphone purchase.

Do you notice one or more of these signs when using your computer?
• advertising pop-up windows even when not using a browser
• constant or occasional cryptic error message screens
• new user accounts are added
• you notice that your settings have been changed
• you're locked out of your own files; some other process is using it
• you see a black command prompt screen appear then disappear in a split second

Your computer may be infected with malware.

The information, advice and tips in this course will be very useful for yourself or for a loved one to give yourselves the knowledge & skills to help protect from cyber attacks, cyber spying and identity theft. Cyber criminals use people's personal information or sensitive corporate data to commit cyber crimes. Cyber criminals can use your browsing history to commit blackmail. Ransomware attacks cost individual consumers thousands of dollars and companies tens of thousands of dollars. Corporate espionage costs companies billions of dollars every year. The cost of identity theft can even be more expensive, sometimes it can cripple your life. So even if you say you have "nothing to hide", you still need to protect your private and personal info so other people cannot use it to impersonate you and access your bank accounts or open bank accounts, credit cards or credit lines in your name with your info. Imagine if your laptop or smartphone gets lost or stolen - what can someone do with that information contained in it, from usernames, contacts, browsing history, location history or locations frequented, etc.

Computer manufacturers, retailers and resellers do not require or recommend customers to have computer security & privacy knowledge. They do not even mention it; they just take your money.

Personal consumers are vulnerable as well as small businesses, as they usually don't have the budget for network security like the bigger companies.

** This class will be 3 to 3.5 hours in duration

In Class 2, you will learn to:

- Anonymously And Privately Browse The Web

- Browse The Web More Securely and Safely

- Understand How Malware Uses Your Browser To Attack You

- Configure Your Browser Settings To Close Security Loopholes

- Install Useful Browser Security Add-ons, Plug-ins and Extensions

- Know How To Determine If Your Browser Has A Secure Connection To A Website

- Know How To Clear Your Browser of Personal Data Such As Browsing History & Caches

- Prevent Websites From Tracking You

- Prevent Websites From Spying On You And Gathering Personal Information About You

- Prevent Websites From Running Rogue Javascript On You

- Protect Your Computer From Viruses and Other Malware

- Protect Yourself From Phishing/SpearPhishing Attacks

- Understand The Anatomy of a URL And Determine If It Is Real Or Fake

- Identify Fake Links Sent via Email or Text So You Know Which Ones Not To Click On

- Install Useful Browser Security Add-ons, Plug-ins and Extensions

- Send Email Securely And Privately From Prying Eyes

- Learn How To Use Passwords More Securely

- Securely Use Your Passwords And Use Password Managers

- Choose An Email Client That Can Send Securely And Privately For Your Desktop and Smartphone

- Configure Your Email Client To Use A VPN or Proxy

- Configure Your Skype To Use A VPN or Proxy

- Avoid Fake Public Wifi Hotspots Set Up By Hackers

- Identify Router-based Man-In-The-Middle Attacks

- Monitor Network Activity In Your Computer And See If Malware Or Botnet Is Using It

- Monitor Activity In Your Home Network And See If Malware Or Botnet Is Using It

- Harden Your Home or Office Router

- Secure Your Phone Calls

- Use Secure Messaging Apps Instead of Standard Text/SMS messages

- Use Private Or Unlisted Phone Numbers When Transacting With Strangers Online

- Configure Your Smartphone's (Android & iPhone) Privacy Settings

- Encrypt Your Smartphone's Hard Drive or Storage To Protect It In Case It Is Lost or Stolen

- Identify & Uninstall 'Junk' Apps That Came Pre-installed in Your Phone

- Use A VPN or Proxy In Your Smartphone

- Use A Private & Anonymous System That Is Free & Portable (perfect for use at cyber cafes)

Class 1 is available here https://secureprivateclass1.eventbrite.com

Organizer Info:
The instructor has 19+ years of experience in information technology, computer systems & software development (17+ years of experience architecting & building IP network-based applications and distributed systems) and for the past 12 years has focused on learning & applying computer security & privacy best practices for internet-connected computers & machines. As a software architect and developer, he has many years of experience designing and building security architectures for the applications & systems he built as well as implementing specific security measures to further protect these applications & systems. This has resulted in having a track record of having been hit by only one virus infection, ZERO ransomware attacks, ZERO adware infections, ZERO phishing attacks, and ZERO identity thefts.

As part of his job as a software developer and engineer, he has successfully decompiled the compiled binaries of commercial software products to view the source code to figure out how to communicate & manipulate them to achieve desired functionality in the software applications & systems he built. This 'reverse engineering' approach is similar to the approach cyber attackers and malware authors use to discover vulnerabilities in software that they can exploit.

To prevent hackers from breaking into and implementing this approach to software applications & systems he has built, the instructor has implemented defensive techniques such as server hardening, network monitoring & response, application monitoring & response, anti-XSS, anti-SQL injection, code obfuscation, variable obfuscation, string encryption, resource encryption and many others to thwart cyber attackers & malware authors. Most software binaries are not obfuscated nor encrypted. As such, it is fairly easy to decompile these binaries, view the code, and figure out ways to exploit it

The course materials for these classes spring from the knowledge & experience from the many years of doing this in the field.

This is an online/virtual event at the convenience of your own location. Prior to the start (10-15 hours), you will receive a registration link and info to join the webinar.

Good knowledge of how to use your computer and some technical knowledge on how to configure settings. Step-by-step instructions and screenshots will be provided and a pdf copy will be provided after the webinar.

Share with friends

Date and Time



Los Angeles, CA

View Map

Refund Policy

Refunds up to 1 day before event

Save This Event

Event Saved