Academy Training
Protecting Yourself, Family and Co-Workers from Physical and Cyber Threats
The learning from the courses in this track may be the most important gift you give to yourself, family and co-workers. Physical and cyber security are on the minds of many people in the United States and beyond. This includes many in our User Group community. We are pleased to offer a unique training opportunity that will increase your personal sense of safety, train you in how to react to some of the most unthinkable situations life can throw at us and help us all be smarter about protecting our own cyber footprint. This track includes two important courses: what to do in an active shooter situation and personal cyber privacy and security. Each course is a half-day in duration and you will leave both courses with actionable plans and tactics that you can share with family and co-workers.
Personal Cyber Privacy & Security:
There is a lot of focus and conversation around securing corporate systems and devices, but little time spent on keeping your personal information safe and secure. This course will cover, in great detail, how changing just a few everyday e-habits with new and safer practices can prevent a lot of headaches for you and your family. The instructor has been in the IT world for more than 30 years and thought that he knew all about protecting himself and his information on the internet; he now acknowledges he was wrong. He started studying and taking personal privacy and security seriously in 2008 and was completely surprised by how much information we give up every day just doing the most basic things on the internet.
• Self-Background Check
• Social Networks
• Preparation
• People Directory Removal
• Data Broker Removal
• Data Marketers
• Credit Companies
• Anonymous Purchases
• Anonymous Credit Cards
• Anonymous Telephones
• Aliases
• Disinformation
• Future Habits
• Anonymous Physical Address
• Smartphone Threats
• Encrypted Messaging and Voice Communications and Email Accounts and Email Encryption
• Passcodes and Encryption
• Location Services
• Exit Data
• Video Metadata
• App Permissions
• Lost-Device Apps
• Computer Security Best Practices
• Anti-Virus and Anti-Malware
• Internet Browser Selection and Setup
• Online Account Security
• Full Disk Encryption and File Level Encryption
• Secure File Deletion
• System Clean-Up
• Tor and Virtual Private Networks Open DNS
• Wi-Fi Security and Best Practices
• Firewalls