Learn and Win

These courses will teach you the most common types of computer security risks, how to protect yourself against those risks, as well as best practices on how to secure a home wireless network.

If you aren't familiar with these topics, don't worry! You can go through our labs to prepare yourself for the quiz. However, if you are familiar with them, take the quiz and see how you do.

Be sure to go through both courses to earn your certificates. Click 'Launch Lab' to complete each task, then take the quiz to test your knowledge. 

For more details on prizes, click here.


Home Wireless Network    Online Safety & Security
Implement Physical Security    Combat Malware
After finishing these courses, you should be proficient in the following tasks:
online-security-img1
  • Secure a home wireless network.
  • Configure Windows Firewall for different networks.
  • Evaluate email messages to determine if they represent a possible social engineering attack.
  • Safely spend money on the Internet.
  • Know what a wireless network is and how it should be set up.
  • Describe the basics of data encryption.
  • Describe the importance of having a secure password.
  • Define different kinds of malware and know how to avoid them.
  • Clear a browser's cache.
  • Configure browser privacy and security features such as pop-up blockers, location tracking, and cookies.
TESTOUT IT FUNDAMENTALS PRO
Secure A Home Wireless Network
*Reminder- If you are familiar with the topics, you don't need to go through each section;
take the quiz first and see how you do.


10.4.7
Encryption (video)

Learn how to secure a home wireless network. Setting up and securing your network isn’t difficult, but it is essential to ensure that access is not granted to just anyone. Protecting yourself from internet security risks can save you a lot of time and headache in the future.

WATCH VIDEO
10.4.8
Configure File Encryption (lab)

Test your skills to ensure you can secure your home wireless network.

LAUNCH LAB


TESTOUT OFFICE PRO
Online Safety and Security
*Reminder- If you are familiar with the topics, you don't need to go through each section;
take the quiz first and see how you do.
 
1.4.1
Computer Security Risks

Protecting your information is challenging. Attempts to compromise your information are becoming more sophisticated every year, which makes them difficult to detect and prevent. Learn best practices for protecting your information.

WATCH VIDEO
1.4.2
Computer Security Risks

Learn what common computer security measures can be used to protect in personally identifying information, including government ID numbers, birthdates, addresses, email addresses, phone numbers, financial information, and account credentials.

READ LESSON
1.4.3
Windows Firewall

Learn how to configure a firewall. Firewalls restrict network traffic based on a set of rules. These rules determine what kind of network traffic is allowed through, and what kind of network traffic is denied. The goal is to prevent unauthorized connections to computer systems. A firewall is like a gatekeeper guarding a door. It creates a barrier that makes it difficult for attackers to get access to a computer through the network.

WATCH VIDEO
1.4.4
Malware Protection on Windows

One of the most important things you can do to keep your computer system secure is to make sure you've installed good anti-malware software. Anti-malware software tries to detect malicious files before they infect your system. Learn how to protect your computer against malware.

WATCH VIDEO
1.4.5
Windows 10 Security Measures

Windows security is a very broad topic, but the following are two important security measures that you need to be familiar with: • Configuring a firewall. • Using anti-malware software. Learn how to implement both of these on your computer.

READ LESSON
1.4.6
Configuring Web Browsers

Web browsers have become essential tools for most businesses and other organizations. However, they are also vulnerable to security threats. Learn about some of the most important web browser technologies that can protect you against these threats.

WATCH VIDEO
1.4.7
Internet Safety and Security

Internet users sometimes assume information found on the Web has gone through a scrupulous vetting process to ensure its accuracy, reliability, and safety. However, this is not true. Accurate, inaccurate, safe, unsafe, benign, and malicious information can all be found on the Internet. Find out how to stay safe.

WATCH VIDEO
1.4.8
Internet Safety Facts

You should always be aware of the social engineering exploits that are common on the Internet. Social engineering is when an attacker attempts to fool victims into revealing sensitive information. Learn how to safeguard your sensitive information.

READ LESSON
1.4.9
Ecommerce Safeguards

Ecommerce makes business transactions convenient and efficient, consumers need to adopt safeguards to protect themselves against identity theft and fraud. Learn what safeguards you should have in place to ensure you are being safe while purchasing online.

WATCH VIDEO
1.4.10
Ecommerce Safety Facts

Take a look at the table that describes six tips for consumer to ensure you are being safe!

READ LESSON
1.4.11
Encryption and Authentication

Encryption makes it so unauthorized people can't use your data even if they manage to intercept it. Authentication is how you prove your identity to the computer. Learn about encryption and authentication.

WATCH VIDEO
1.4.12
Encryption and Authentication Facts

Encryption and authentication are two vital ways of keeping private information safe when it's transmitted over the Internet. Click to view the table that describes several terms related to encryption and authentication.

READ LESSON
1.4.13
Skills Lab: Practice Online Safety and Security

Test your skills to ensure you have achieved a basic level of competency in maintaining online safety and security.

LAUNCH LAB
1.4.14
Applied Lab: Configure Windows Firewall

Test your skills to ensure you are familiar with a Windows Firewall.

LAUNCH LAB
1.4.15
Applied Lab: Configure Privacy Settings
in Google Chrome

Test your skills to see if you can block location tracking and third-party cookies on Google Chrome.

LAUNCH LAB
1.4.16
Applied Lab: Clear the Browser Cache

Test your skills to see if you can clear the browswer cache on Google Chrome.

LAUNCH LAB
1.4.17
Applied Lab: Respond to Social
Engineering

Test your skills and see if you can locate and delete all of the social engineering exploits.

LAUNCH LAB
1.4.18
Applied Lab: Configure Google
Chrome Pop-ups

Test your skills and see if you can configure the content settings in Google Chrome.

LAUNCH LAB
1.4.19
Concept Questions

Test yourself to earn your Online Safety and Security certification!

LAUNCH QUIZ


TESTOUT SECURITY PRO
Implement Physical Security
*Reminder- If you are familiar with the topics, you don't need to go through each section;
take the quiz first and see how you do.
 
3.1.1
Physical Security (video)

Learn about the three general concepts to consider when determining physical security: prevention, detection, and recovery.

WATCH VIDEO
3.1.2
Physical Security Facts (fact sheet)

Learn more about Physical Security, Control Measures, and take an in-depth look at Defense.

READ LESSON
3.1.3
Implement Physical Security (lab)

Implement your physical security plan in this lab by dragging the correct items from the shelf onto the various locations in the building. As you drag the items from the shelf, the possible drop locations are highlighted. To implement your plan, you must:

LAUNCH LAB
3.1.4
Section Quiz (Exam)

Test yourself to see how ready you are for the final exam.

LAUNCH QUIZ


TESTOUT ETHICAL HACKER PRO
Combat Malware
*Reminder- If you are familiar with the topics, you don't need to go through each section;
take the quiz first and see how you do.
 
9.2.1
Anti-Malware Software (video)

Utilizing anti-malware software is one of the more essential steps you can take to protect a system. Learn about anti-Trojan and antivirus software.

WATCH VIDEO
9.2.2
Scan for Open Ports with Netstat (video)

Netstat is a tool you can run on Windows to show active network connections on the local machine. Watch how Netstat works to show the port, protocol, state of each connection, and the local and foreign IP addresses involved in each connection.

WATCH VIDEO
9.2.3
Track Port Usage with TCPVIEW (video)

Learn how you can use TCPView to discover which network ports are in use on the local machine and how it tracks the local and remote addresses the computer is talking on. This is useful when troubleshooting a machine's network usage or for discovering hidden services talking to the internet in the background.

WATCH VIDEO
9.2.4
Anti-Malware Software Facts (fact sheet)

Get the facts on anti-malware software, malware detection methods, penetration testing malware, and malware removal.

READ LESSON
9.2.5
Detect Open Ports with Nmap (lab)

Test your skills to see if you can find and identify any ports susceptible to hacking attacks.

LAUNCH LAB
9.2.6
View Open Ports with netstat (lab)

See if you can use netstat to identify open ports on the system.

LAUNCH LAB
9.2.7
Scan for Open Ports from a Remote Computer (lab)

Try your hand at using a remote computer to scan open ports on an internal network.

LAUNCH LAB
9.2.8
Counter Malware with Windows Defender (lab)

Test your skills at configuring Windows Defender on a computer.

LAUNCH LAB
9.2.9
Section Quiz (Exam)

Test your knowledge to earn your Anti-malware certificate.

LAUNCH QUIZ