3.95 out of 5
12 reviews on Udemy

How To Keep Your Computer Safe From The Bad Guys

This course is based off the same presentation I give to the FBI, DEA, colleges and high schools students.
Scott Ford
103 students enrolled
English [Auto-generated]
Define common terms in the world of computer security.
Keep your computer safe at home, on the road, in the hotel, library and coffee shop.
Protect precious data, pictures and memories stored on the computer.
Protect yourself from malware like viruses, Trojans, worms and spyware.
Defend yourself from typical social engineering attacks like phishing, spam and shoulder surfing.

Scott Ford, former FBI Cyber and DEA trainer, teaches you the basics of how to keep your computer and personal information secret. We delve into the basics of computer security that every computer user should know.

In this course we examine physical security, network security, Internet security, as well as social engineering. At the completion of this course you will know how to keep your computer safe.

This course is designed around a series of video lectures as well as links and recommendations to resources Scott has used to teach FBI Cyber, FBI CART, DEA, Intelligence Community agents as well as college and high school students.

Introduction To Computer Security


Welcome to Introduction to Computer Security. When you have completed this video you will have a better understanding about what we will cover in this course. I want to thank you for joining me on this journey.

Course Layout

This Introduction To Computer Security course is based on a lecture I have given to FBI Cyber, FBI CART, DEA, US Intelligence Agents, college and high school students. At the end of this video you will know how I have organized this course.

How To Take This Class

At the end of this video you will know how to best take this Introduction To Computer Security class.

The Journey Begins
Introduction To Computer Security

A quick knowledge check of materials presented in Section 1: Introduction To Computer Security.

Physically Protecting The Computer

Types of Electrical Events

When you are done with this video you will be able to identify and describe the different types of electrical events that can damage your computer and other digital devices.

Protect The Device From Electrical Damage

In the previous video you learned all about the different types of electrical events. At the end of this video you will be able to protect your computer and digital devices against the many types of electrical events.

Protecting Against Theft

You will know how to keep your computer safe at home and on the go. We look at some basic steps you can take to reduce the risks of bad guys stealing your computer and digital devices.

Phyiscally Protecting The Computer

A quick knowledge check for section 2.

Authentication- Who Are You?

Usernames & Passwords

You will learn all about how to make the most effective password as well as what not to do. We have also provided several great resources on passwords, including additional advice and a collection of free password managers.

Smart Cards

We look at smart cards and how they help with authentication.

Security Tokens

We look at security tokens/key fobs. This is can be an important component for two step authentication.


Biometrics could be the next evolution in authentication. In this video we take a quick look at what biometrics is and what we measure.


Data Is King

Backup That Data

Your data is the most important thing on your computer! Family pictures, financial information and more can not be replaced if lost. When you are done with this lesson you will know how to backup your data as well as learn about companies that offer cloud backup and storage.


If the bad guys get their hands on your devices it wont take long for them to see your private information. Encryption is a way to keep your data safe even if it falls into the wrong hands. At the end of this lesson you will know how to encrypt your data on PC and Mac.

Destroy The Data

With all this talk about protecting your data sometimes you want to destroy your information. This video shows you how to effectively destroy your data so you can throw out your old computer with confidence.

Protecting Data On Smartphones

With more and more of our personal information on our smartphones we take a look at how to protect that data in the event it is lost. You will learn how to remotely locate, lock and erase your smartphone.

Data is King



Before we talk about keeping your computer clean, we need to get a basic understanding of what nasty stuff is out there. After this lesson you will know more about viruses then you want.

Trojan Horse

Trojan horses are installed by unsuspecting users. Because it is the user that installes Trojans, you will learn how to identify bad software.


Worms can infect hundreds of thousands of systems in a week. In this lesson you will learn what they are and one of the best ways to keep them from hurting your computer.


A relatively new comer to the world of malware these nasty things can steal your most personal information. When you are done with this lesson you will know what the most dangerous types of spyware are and how to keep an eye out for them.

Am I Infected?

Now that we have a good understanding of malware, it is time to determine if your computer is infected. At the conclusion of this lesson you will be able spot classic signs of infections.

Protecting Yourself Against Malware

In many cases once a computer has become infected the only solution is to reinstall the operating system. This lesson will help you keep malware from getting on your system. You will learn about different types of antivirus software, firewalls programs and of course best practices you can take to avoid the risk of infection.


Social Engineering: Hacking Humans

Introduction To Social Engineering

Social engineering is the act of manipulating people into performing actions or divulging confidential information. In this video, we look at at the basics of social engineering. In the other videos, we examine the more common types of social engineering in more details. I also recommend an outstanding book: No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing. 

Dumpster Diving

Dumpster diving is a common social engineering technique. It relies on people and companies not destroying important documents before throwing them into the garbage. 

Shoulder Surfing

Snooping over someone's shoulder and looking at what they are doing is shoulder surfing. This is common in coffee shops, libraries and airports. 


Tailgating is actually a type of infiltration. It is entering a building in the guise of legitimacy. Bad guys rely on looking and acting the part.

The Problem With Emails

Email is a major way that bad guys will attack users. We talk about spam, phishing, Bacn (not a typo), Spear Phishing and Whale Phishing. We also look at general email tips. 

Social Media and Social Engineering

“Criminals have begun harvesting data from social networks to target specific users instead of spamming everyone” What you post on social media can and will be used against you. In this video, we talk about some good practices when using social media.

Social Engineering
Thank You and Good Bye

Thank you so much for taking this course. I hope you learned a ton and are now more conident when it comes to keeping your computer and personal information safe. Please be sure to leave me some feedback so I can improve this for future students.

You can view and review the lecture materials indefinitely, like an on-demand channel.
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don't have an internet connection, some instructors also let their students download course lectures. That's up to the instructor though, so make sure you get on their good side!
4 out of 5
12 Ratings

Detailed Rating

Stars 5
Stars 4
Stars 3
Stars 2
Stars 1
30-Day Money-Back Guarantee


2 hours on-demand video
Full lifetime access
Access on mobile and TV
Certificate of Completion