Become a member
Online Access to 1000+ Courses!

Fundamentals of Computer Security Course

8.5hrs (92 Lessons) 2008-05-21

This Course can only be played using a subscription. You can play only first 3 chapters for free. Click Here to avail a subscription
In this age of malware, identity theft, and hackers, both computer users and network administrators have to know how to secure their systems. VTC's Fundamentals of Computer Security will take you through the basics of protecting your computer systems and networks from these threats. Veteran VTC author Bobby Rogers will provide in-depth explanation on the foundational concepts and terms necessary to lock down your system and prevent attacks from both the Internet and malicious users. To begin learning simply click the links.

Hello and welcome to the Virtual Training Company course, Fundamentals of Computer Security. Hi! IÕm Bobby Rogers and IÕm going to be your guide throughout this course. I hope youÕll enjoy learning about the basics of computer security during this title. This title is not necessarily for the basic computer user, but also itÕs not necessarily for the advanced computer security expert either, but rather those of you who probably fall somewhere in between that spectrum. A basic user who knows something about computers, who uses them every day or a beginning network administrator whoÕs just getting into the security realm, both of those audiences would benefit from this course. So letÕs go ahead and take a look at what weÕre going to talk about for the duration of this course. First of all, weÕre going to do a brief introduction and course outline, which is what weÕre doing right now. Then weÕre going to talk about basic security principles and terms. I think itÕs very important that you understand some of the definitions and terminology that we talk about during the course. In fact, I think itÕs so important weÕre going to have two separate sessions on it; a part one and a part two. IÕm going to cover things like the CIA Triad and separation of duties and other terms that you may have heard before but not necessarily have known what they meant. Then weÕre going to get into the nitty-gritty. WeÕll talk about host security. When we talk about host security, weÕre essentially talking about how to secure a computer and its operating system and so forth. Then weÕll take a look at network security. WeÕll broaden our horizons a little bit and discuss the particulars of TCP/IP security, firewalls and things like that. Then weÕll go ahead and look at Internet and email security. These two aspects of security are very important because these are two things that everyone uses in their daily lives these days. ItÕs important to know how to secure your Internet experience and your email communications. After that weÕre going to take a look at applications security. This is frequently one of the most forgotten-about aspects of security because this is an aspect that programmers generally are able to control; however, there are things that we can do to secure our applications so that they wonÕt open backdoors for hackers and so forth on our operating systems and computers. After that, weÕll take a look at human and physical security. Now, I know this is something that a lot of security experts donÕt necessarily think about because they tend to think about security in terms of bits and bytes. Well, human and physical security are very important aspects of a total security program and this is important even to you as a casual user or to you as a network administrator. WeÕll also look at access control concepts. This is where we might get a little bit into theory and weÕll talk about some of the access control theories and concepts and basically how access control is used to secure our computers and operating systems. Then weÕll switch gears a little bit. WeÕre going to talk about malware. When we talk about malware, weÕre essentially talking about viruses, spyware, adware and things like that. WeÕre going to talk about what they are, how to cure them, how to prevent them. Then weÕll switch gears again and weÕre going to get to some more non-technical stuff, such as law, ethics, and privacy. A lot of people donÕt think of these things in terms of computer security, but theyÕre very important things because everything we do affects other people on the Internet or on the network. And there are laws that are written to protect people and their security from malicious users. ThereÕs also the ethical aspects of using the Internet and computers and donÕt forget, there are privacy aspects that we all care about and you should know how these aspects affect you and computer security. Then weÕll get into a little of the paperwork part of security. Now, this is something that not a lot of people like to deal with, but itÕs very important that you understand that policies, procedures and documentation are all very important things when setting up a computer security posture on your network. Then, finally, weÕre going to talk about basic cryptography. Now, weÕre not going to get heavy into the math for cryptography, so donÕt get too intimidated. What we will do is cover the basic terms that youÕll encounter when talking about cryptography so you can learn to talk intelligently about it and understand what itÕs all about. Then weÕll look at some best security practices. These are proven security practices that are found from government, industry and experienced network administrators. WeÕll talk about those best security practices and how you can implement them on your computers and your networks. And then weÕll do a quick course wrap-up. WeÕll briefly recap the things weÕve talked about. And finally, IÕll tell you a little bit about myself as the author. So sit back and relax. ItÕs going to be a fun course. ItÕs going to be a very good course and I hope that you learn a little bit from it that you didnÕt know before about computer security.  

  • Course: Fundamentals of Computer Security
  • Author: Bobby Rogers
  • SKU: 33874
  • ISBN: 1-934743-69-0
  • Work Files: No
  • Captions: No
  • Subject: Networking & Security
  • The first 3 chapters of courses are available to play for FREE (first chapter only for QuickStart! and MasterClass! courses). Just click on the movie link to play a lesson.
Course outline
Introduction & Course Outline

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Basic Security Principles & Terms I

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
The CIA Triad (05:03)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Basic Security Principles & Terms II
Attack Vectors (05:30)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Computer System Security
OS Security (07:06)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Network Security

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Internet & Email Security

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Email Threats (05:18)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Application Security

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Web Security (05:10)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Human & Physical Security

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
User Security

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Passwords (06:37)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Auditing (06:17)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Malware

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Viruses pt. 1 (03:33)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Viruses pt. 2 (05:27)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Spyware (02:18)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Law, Ethics, & Privacy

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Privacy pt. 1 (07:20)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Privacy pt. 2 (03:34)

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Policies/Procedures & Documentation

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Basic Cryptography

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Best Security Practices

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Wrap-Up

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference
Credits

BOOKMARKS

Subscribed users can bookmark any lesson for later viewing

Lesson Notes

Subscribed users can add notes to any lesson for future reference