These courses will teach you the most common types of computer security risks, how to protect yourself against those risks, as well as best practices on how to secure a home wireless network.
If you aren't familiar with these topics, don't worry! You can go through our labs to prepare yourself for the quiz. However, if you are familiar with them, take the quiz and see how you do.
Be sure to go through both courses to earn your certificates. Click 'Launch Lab' to complete each task, then take the quiz to test your knowledge.
Learn how to secure a home wireless network. Setting up and securing your network isn’t difficult, but it is essential to ensure that access is not granted to just anyone. Protecting yourself from internet security risks can save you a lot of time and headache in the future.
WATCH VIDEOTest your skills to ensure you can secure your home wireless network.
LAUNCH LABProtecting your information is challenging. Attempts to compromise your information are becoming more sophisticated every year, which makes them difficult to detect and prevent. Learn best practices for protecting your information.
WATCH VIDEOLearn what common computer security measures can be used to protect in personally identifying information, including government ID numbers, birthdates, addresses, email addresses, phone numbers, financial information, and account credentials.
READ LESSONLearn how to configure a firewall. Firewalls restrict network traffic based on a set of rules. These rules determine what kind of network traffic is allowed through, and what kind of network traffic is denied. The goal is to prevent unauthorized connections to computer systems. A firewall is like a gatekeeper guarding a door. It creates a barrier that makes it difficult for attackers to get access to a computer through the network.
WATCH VIDEOOne of the most important things you can do to keep your computer system secure is to make sure you've installed good anti-malware software. Anti-malware software tries to detect malicious files before they infect your system. Learn how to protect your computer against malware.
WATCH VIDEOWindows security is a very broad topic, but the following are two important security measures that you need to be familiar with: • Configuring a firewall. • Using anti-malware software. Learn how to implement both of these on your computer.
READ LESSONWeb browsers have become essential tools for most businesses and other organizations. However, they are also vulnerable to security threats. Learn about some of the most important web browser technologies that can protect you against these threats.
WATCH VIDEOInternet users sometimes assume information found on the Web has gone through a scrupulous vetting process to ensure its accuracy, reliability, and safety. However, this is not true. Accurate, inaccurate, safe, unsafe, benign, and malicious information can all be found on the Internet. Find out how to stay safe.
WATCH VIDEOYou should always be aware of the social engineering exploits that are common on the Internet. Social engineering is when an attacker attempts to fool victims into revealing sensitive information. Learn how to safeguard your sensitive information.
READ LESSONEcommerce makes business transactions convenient and efficient, consumers need to adopt safeguards to protect themselves against identity theft and fraud. Learn what safeguards you should have in place to ensure you are being safe while purchasing online.
WATCH VIDEOTake a look at the table that describes six tips for consumer to ensure you are being safe!
READ LESSONEncryption makes it so unauthorized people can't use your data even if they manage to intercept it. Authentication is how you prove your identity to the computer. Learn about encryption and authentication.
WATCH VIDEOEncryption and authentication are two vital ways of keeping private information safe when it's transmitted over the Internet. Click to view the table that describes several terms related to encryption and authentication.
READ LESSONTest your skills to ensure you have achieved a basic level of competency in maintaining online safety and security.
LAUNCH LABTest your skills to ensure you are familiar with a Windows Firewall.
LAUNCH LABTest your skills to see if you can block location tracking and third-party cookies on Google Chrome.
LAUNCH LABTest your skills to see if you can clear the browswer cache on Google Chrome.
LAUNCH LABTest your skills and see if you can locate and delete all of the social engineering exploits.
LAUNCH LABTest your skills and see if you can configure the content settings in Google Chrome.
LAUNCH LABTest yourself to earn your Online Safety and Security certification!
LAUNCH QUIZLearn about the three general concepts to consider when determining physical security: prevention, detection, and recovery.
WATCH VIDEOLearn more about Physical Security, Control Measures, and take an in-depth look at Defense.
READ LESSONImplement your physical security plan in this lab by dragging the correct items from the shelf onto the various locations in the building. As you drag the items from the shelf, the possible drop locations are highlighted. To implement your plan, you must:
LAUNCH LABTest yourself to see how ready you are for the final exam.
LAUNCH QUIZUtilizing anti-malware software is one of the more essential steps you can take to protect a system. Learn about anti-Trojan and antivirus software.
WATCH VIDEONetstat is a tool you can run on Windows to show active network connections on the local machine. Watch how Netstat works to show the port, protocol, state of each connection, and the local and foreign IP addresses involved in each connection.
WATCH VIDEOLearn how you can use TCPView to discover which network ports are in use on the local machine and how it tracks the local and remote addresses the computer is talking on. This is useful when troubleshooting a machine's network usage or for discovering hidden services talking to the internet in the background.
WATCH VIDEOGet the facts on anti-malware software, malware detection methods, penetration testing malware, and malware removal.
READ LESSONTest your skills to see if you can find and identify any ports susceptible to hacking attacks.
LAUNCH LABSee if you can use netstat to identify open ports on the system.
LAUNCH LABTry your hand at using a remote computer to scan open ports on an internal network.
LAUNCH LABTest your skills at configuring Windows Defender on a computer.
LAUNCH LABTest your knowledge to earn your Anti-malware certificate.
LAUNCH QUIZCopyright © 2024 TestOut Corp. Copyright © CompTIA, Inc. All rights reserved. | Privacy Policy | Accessibility | License Agreement
Microsoft, MCA, Office, Excel, Word, and Windows are the trademarks of Microsoft. Cisco and CCNA are the trademarks of Cisco. Certified Ethical Hacker and CEH are the trademarks of the EC-Council. Neither TestOut nor CompTIA have any affiliation with any of these companies, and the products and services advertised herein are not endorsed by any of them.