Updated for 2018, this one day course is designed to show delegates how easy it can be for others to obtain data about ourselves through various means, but also how much of this can be stopped with a few tweaks to our machines and our online behavior.
If a stranger came up to you on the street, would you give them your name, National Insurance Number, e-mail address, date of birth or other such information? Probably not!
Yet people give out this sort of personal information on the Internet every single day, often without a second thought about what happens to it once the send or post button has been pressed. Even when we do not give out this information freely, it has become increasingly easy to collate snippets of data, and to then deduce personal information. In some cases, the personal comments we make online can affect the work systems we use. Careless talk on social sites and forums can allow hackers to leverage their way into our corporate systems.
Our mobile devices have a number of inherent security weaknesses out of the box, learn about mobile device security.
This course is aimed at anyone who wishes to learn about protecting themselves when online and using mobile devices.
Module 1 – Introduction
Your online identity and why it matters. This introduction module outlines the sorts of data we leave behind and how it could be used by others to commit many different crimes such as fraud and identity theft.
Module 2 – Device Data
When we connect to the internet and use the WWW, our computers leave a trail of digital data that can be used to identify and expose our online activities. By understanding what these digital breadcrumbs are, we can take steps to remove or alter them so that they become useless to others.
In this module, delegates will learn about Geo-locating via IP addresses, GPS and Wi-Fi and how to mitigate against them using a number of anonymous web browsing techniques.
Module 3 – Browsers and Applications
Browsers and applications are the window to the digital world, however they transmit data largely without our knowledge. In this module delegates will learn how and what kinds of data is being collected and how to correctly configure browsers and applications in order to limit not only the information we let out but the access we are giving.
Module 4 – Personal data
This module looks at the sorts of places that we visit on the Internet and the types of data we may publish about ourselves, from Social Networks to blogs, e-mails and more. We look at how we gradually expose more and more of our private lives online.
We also look at how to create secure online identities with strong passwords and varying levels of anonymity.
Module 5 – Online Fraud
1 in 10 people will fall victim to online crime. Criminals will go to great lengths to obtain our data, we therefore have to be very wary of fake e-mails and web sites that try to trick us into divulging sensitive information. This module shows delegates how to spot and avoid such traps.
It's not just the data we publish ourselves online that we need to worry about. We increasingly use the Internet and WWW for shopping, so inevitably we have to offer up highly sensitive data relating to our bank or credit cards – How safe is e-commerce?
No pre-requisites are expected other than a familiarity with Windows and browser technologies.