 Hi everyone, this is Tony Spinoza and I want to welcome you to my cyber security training course We will cover five short modules on how to increase your security online by changing a couple of your device's security settings So let's get started with the first module the firewall The firewall is a computer network system that is designed to block unauthorized access while permitting outward communication This means that you will increase your security and prevent cyber threats Like fraud and viruses, so you will be safe and protected by turning on the settings So right here. I've got an Apple MacBook Pro I'm an Apple user and and I will make other videos for the Windows users through my other PC So for an Apple user, you would go to your system preferences, which is this little gear icon right here and You will pull up the system preferences. Next you go to the security and privacy, which is the little safe house lock item and You want to go to your firewall tab, which is this third one right here Mine is currently on But in order to make changes you want to click on the lock and then put in your password Unlock it and the lock unlocks So I'm gonna turn mine off But I want to tell you that the firewall is turned on and set up to prevent unauthorized Applications programs and services from accepting incoming connections So this would be if somebody wants to send you a virus while you are online This is why the firewall is important important. So right now I'll turn it off and All incoming connections to this computer are allowed So does that make sense to you? How you would be permitting somebody externally from the internet to attack you from the internet That's how this happens online and that's why the firewall is very important. So we want to leave it turned on So we'll prevent any unauthorized applications programs and services from accepting incoming connections Okay, we are officially secure with the first module the firewall. We have completed this step So in another video, I will show when though users Had I accomplished this but is Similar you go to the system Settings and then security and privacy. So let's go to the next module and cover data encryption Thank you so much for watching. Hi everyone. This is Tony Spinoza Welcome to my cyber security training course And we will cover five short modules and how to increase your online security by changing your devices security settings Let's get started with the first module the firewall A firewall is a computer network system designed to block unauthorized access while permitting outward communication In device settings Under privacy and security choose firewall and enable it This will maximize your device network security and prevent cyber attacks like fraud and viruses So right now you should be able to see My computer screen. This is my windows PC And the way to turn on the firewall Is you go over here to the lower left icon for the windows start And you click on this gear range, which is the settings Next we will go to the update and security Next go to windows security And you go to firewall and network protection This brings up another page And here you can see that I've got my firewalls turned on So let's click on a private network And then you will see here microsoft defender firewall And here you can turn it on and turn it off We want our microsoft defender firewall to be turned on and This is where you will know and trust the people and the devices on the network And your device Is set as discoverable The microsoft defender firewall will prevent any unauthorized users from accessing your device And this is how you properly do it On a windows pc Hi everyone, welcome to module 2 where you will learn what data encryption is what it's for and how to use it Data encryption is a computer process that secures your data using secret code That prevents fraud and malicious attacks It requires extra time and storage memory But it improves your speed and your overall security What I noticed is that it's sped up my browser slowed up times and they're almost instant now So for apple users, I want to show you how to do this You want to go to your system preferences and click this gear icon Next click the security and privacy icon And you want to be on the file of all This secures your data on your disk by encrypting its contents automatically Mine is currently turned on that's why it says turn off right here And when you click turn on it gives you a secret key This code is very important. Take a picture in a screenshot of it and keep it in a safe place You will need your login password or a recovery key to access your data A recovery key is automatically generated as part of this setup If you forget both your password and your recovery key the data will be lost Okay, so that is the encryption process and right now I need some power to finish mine It's very time consuming so plan accordingly So if you want to learn more security features follow me on to module number three. Thank you for watching Hi everyone, this is Tony Spinoza. Welcome to module two Where you will learn what data encryption is what it's for and how to use it Data encryption is a computer process that secures data using secret code That prevents fraud and malicious attacks This process takes up extra memory and time but can increase overall speed and security It sped up my browser load up times which are almost instant now For the windows pc users What you want to do is open your settings Go down here to the windows start button Click on settings And you want to be on your windows update You can also click on Install now for any windows updates that are available. I don't really use this computer. So I don't update it often But I would have to update it in order to get one final feature that would say Data encryption now here it would be low It would be below windows insider program Then you would click on the data encryption tab and you would turn it on Like I showed you guys for the firewall Device security is also here And you would have another feature here after your update that would say data encryption That is the process involved for data encryption for windows pc users And I will see you In the next module Where we will learn about Two-factor verification Okay guys. Thank you very much Hi everyone. This is Tony Spinoza and today I will teach you about encrypting your apps files for an iOS device or apple Apple smartphones And I just want to go over this overview Data protection is an iOS feature that you use to secure your apps files and prevent unauthorized access to them Data protection is enabled automatically when the user sets an active passcode for the device You read and write your files normally, but the system encrypts and decrypts your content behind the scenes The encryption and decryption process are automatic and hardware accelerated You specify the level of data protection that you want to apply to each of your files There are four levels available each of which determines when you may access the file If you do not specify a protection level when you create and creating a file iOS applies default protection level automatically No protection. The file is always accessible Complete until first user authentication, which is the default And I'm just going to go over quickly. The next one is over complete unless open And the last one is complete. The file is accessible only when the device is unlocked So let's go over on how to do this Um, I think I do want to read completely what it says over here because The first level of no protection the file is always accessible That would defeat the purpose and we wouldn't add security And next complete until first user authentic authentication, excuse me, which is the default The file is inaccessible until the first time the user unlocks the device After the first unlocking of the device the file remains accessible until the device shuts down or reboots Third level complete unless open You can open existing files only when the device is unlocked If you have a file already open you may continue to access that file even after the user locks the device You can also create new files and access them while the device is locked or unlocked And then the complete level the file is accessible only when the device is unlocked So how do you do this? You go to your home screen Go to your settings Next Go to your touch id and passcode I have a passcode set But let's pretend that somebody doesn't And this is for data encryption, but as you can see the little red thumb print Fingerprint I've got him set to five fingers to recognize this So you would go here to the Change passcode It would tell you to put one in So you would put one in there And you would make sure that you have this set to immediately require a passcode Right here at the bottom you can see I have data protection is enabled and that is because I've got a passcode So that's how you would put a passcode And it would make you go in here and press one on you can't see the rest of the screen which has numbers But you've got the series of numbers which you can choose from but you can't see that right now through your screen So I will cancel out of there And this also enables people to create The fingerprints. So let's try doing that real quick adding a fingerprint. It looks like I've got them filled And I've got finger five This is finger one Let's try deleting finger five And then adding a fingerprint Place your finger lift and rest your finger on the home button repeatedly I'm going to use my right hand pinky first two three four five six seven oops Keep going to capture and continue The edges on my prep wants to get the edges Make sure that I get the edges Okay, that is complete touch ID is ready So this means touch identification and is using biometrics Or you're the scanning of your fingerprint And your print can be used for unlocking your iphone And this is pretty cool right now. I will show you I am locking Okay, and I think it went back So back again Can't see the numbers but you can see and here we have it again So there it is finger five So that is how you enable your data encryption And your fingerprint pass codes So move on to the next module and I will see you there. Thank you so much Hi everyone, this is Tony Spinoza. Welcome to module three where you will learn what two factor verification is Which uses text message codes To secure your email account Whatever email account that you've got Go to it and then go to your account Click on manage account And go to your security I've already tried this step so In order to protect my identity and my cell phone number. I'm not going to put it on that's why it's turned off So protecting your account with two step verification Is every time you sign into your google account. You'll need a password and a verification code. They text you the code It's very fast It adds an extra layer of security And you enter your password and the unique verification code that's sent to your phone If someone steals your computer, they won't be able to access anything because they would need to steal your cell phone as well And they would need the password to it again. That's why passwords and two step verifications are very important So in order to get started You got to put in your device And then you continue with it And then you put in your cell phone and you can get the code via text or phone calls You put in your cell phone number You just type it in and then you press send and it will immediately send to your phone and then Once you hit send Then we'll have you put in the code and you'll be able to turn on this two step verification So this is very important and that is how you complete this step for two step verification So we are not complete with this module next. I will teach you about creating algebraic passwords So follow me on to module number four. Thank you for watching This is tony spinosa. Welcome to module four Where you will learn about creating algebraic passwords Algebraic passwords include about 10 or 15 characters and they are listed like this So think about algebra and the equations So let's begin by stating the obvious Right now I am not in a secure Website what this means is that it can have malicious activity or it could be privately owned and Many different things but this one is going to be okay for now Something you do want to avoid is clicking on ads or anything that looks out of the ordinary So let's begin. I'm going to show you a couple of passwords that I've created So right now Let's look at these additions You want to have one of each Each character that way it's it has variety. So we will choose Characters like the exclamation points the at the pound the money sign The percentage ampersand the asterix parentheses the plus and minus signs And anything else that you can think of one uppercase lowercase number symbols and We want to avoid repeating characters consecutive letters And consecutive lowercase letters and consecutive numbers Okay, so let's begin when I want to create our first equation parentheses and dash Six and I want you to be able to see this guys So let's do something like that And that will be our first exponent and then we will try one capital letter one exclamation point A number and then a lowercase letter some parentheses and then we'll put another uppercase another number lowercase And then another character So we took off With a lowercase letter and we can add a number and then another character We will finalize with this okay So very strong. You can see all the points that we've accumulated over here And do we have any repeat characters that are case sensitive I'm not sure we do But let's count 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 So the more characters you have the more complex it'll be to hack Or to commit fraud and any malicious activities. So that is how you create An algebraic password So next in module five we will learn about disconnecting outdated internet products So I will see you on the next module. Thank you for watching Hi everyone. This is Tony Spinoza. Welcome to the last module number five You will learn how to disconnect old internet devices to finalize increasing your cyber security If you have an old computer a printer a modem or a router that you're not using It would be best if you disconnect it from the internet by physically Removing the cables like this Here I've got an old central link modem that I'm not using And if I kept it on and there was sensitive data cyber criminals could access that data And use it for fraud. So one way to do it is to disconnect it from the power source But that's not going to keep you safe because they have a small battery inside And it still keeps the unit on and connected to the internet So anybody could access the data and hack it Next we want to disconnect all the cables going from the modem to the router The printer or an old computer and that will prevent from any access And all of these are unauthorized And if you have a small business or a large organization and any sensitive data You can actually remove the memory hard drive unit and keep it in a safe place All these old devices that you don't want they can be thrown in the trash They can be recycled at best buy Or you can donate and sell them to specialized computer repair facilities So with that being said that is how you disconnect all devices from the internet Don't forget to turn off the wi-fi if it's necessary like an old smartphone And I want to congratulate you on completing this cybersecurity training course After this module there will be a short test and this will measure your abilities To implement the security solutions and it will test the effectiveness of my training course Afterwards, there's a short survey. Please fill it out that way I can receive feedback that is specific to cyber security And with that being said I want to thank you for choosing my course and have a wonderful day Hi everyone. This is Tony Spinoza. Welcome to module six This is an extra module and I think it's very important to go over some browser settings That I think will be very important for you guys The reason why they they are important is because a lot of information and data gets stored in these browsers and I want to show you what that looks like Right now I am in the firefox browser And you want to click on firefox and then on preferences Next we are going to cover all the general settings These general settings right here in startup Are not very important in data and privacy And tabs That's not what we're after we're after the data sharing And the cookies and this is all data that gets saved from websites That can that are high risk and can cause harms So right here in applications choose how firefox handles The files you download from the web or the applications you use while browsing This is a high risk right here because Let's look at this Some of these websites they can track and collect your information and perhaps steal Very important credit card information or business accounts Or any any private information you don't want to share If you see anything suspicious right here You can click on it and look at it But choose how firefox handles the files you download So this is very important because If you change these settings it will help you Make better decisions Let's say right here on a portable document format Let's say I don't know who that is Where it's coming from if I tell it to always ask It will create a box that way anytime a PDF Opens up is going to tell me. Hey, are you sure you want this document? Do you know if it's safe? Or if it's got a virus and that's why always ask is very important versus save file If you choose this option of save file It will automatically save the file And you don't know if it's safe or not You can assign it to the mac os Default application or you can use another Now, hopefully If you're not an apple user don't be distracted by this Because if you use mozilla firefox It will look the same. It's going to be the same browser the same internet platform This is just going to say windows Let's keep moving on because This application is important But we need to check other settings digital rights management content We don't need to worry about digital rights Firefox is up to date it helps when you when you have all your devices up to date Making sure that your updates are current But if you do not need the updates for some reason, um, I don't always use them specifically on my cell phone because It slows it down. I've got an older cell phone and When you check kind of like on these what's new learn more tabs Under your update it'll tell you what it does and normally it says what model it's for And because minus in this not the same generation. It's not necessary That's why updates don't always apply to people You do want to enable it to be automatically Installing updates for you, which is recommended But you can also click check for updates, but let you choose to install them That way, uh If you don't need them you do not have to it's not a requirement You don't have to install them Make sure this is clicked on use recommended performance settings These settings are tailored to your computer's hardware and operating system. This will make it faster, uh, or more effective For browsing i'm not concerned with browsing right now But network settings i am can figure how firefox connects to the internet Let's click on our settings and see what's going on Okay These settings we do not have to mess with this has to do with connection settings and these are more complicated then, uh Then you need and uh these do not involve The type of cyber security we want Okay We finished the general. Let's go on to the home And right here the there isn't much value for cyber security It asks you about windows and tabs you can change your Home page, which is this home icon and you can set it to anything. I normally like to set set that to my email address New tabs, I normally like a blank page Uh, but there are benefits to having the firefox home default because When you open this like this it'll show you what you visit And that is why that's important Because it's very functional so we don't need to go over these Maybe in search Okay, now you see how these are listed right here These search shortcuts. This is how data is stored on these search engines and You could just go right here and remove it. Um These seem to be my shortcuts, which are not uh or a high risk But if you see something that you don't want or you don't recognize, I highly recommend that you remove it So you would click on it and then you would click on remove Let's get to the meat and potatoes or the most important part privacy and security Here browser privacy enhanced tracking protection Why would it give you an enhanced protection? Well, this is because there are cyber criminals or bad people They use the internet to take advantage of users that are not aware of Of their security settings. So that's why we need extra protection that way. They don't track us online if you go On any website and you and you click on some um something that's like recommended or that's sponsored You need to make sure that you know or that you trust that source Because that's how somebody could track you trackers follow you around online to collect information about your browsing habits and interests Perhaps somebody sees you that you click on one of their articles because you happen to be needing a recipe and he put up some ad for Something that you were looking for Perhaps one of those kitchen aid appliance that that make baked goods. I don't know what what they're called But it's as simple as this you went online you typed in kitchen aid Mixer it's probably a mixer one of those things This is exactly The one this is super popular and a lot of people Click on on these on these ads And see I don't know what credit and barrel is but they've got reviews and uh And let's say you are on a on a recipe website and then you're like, oh, yeah I was quoting these mixers the other day and you click on one and you're like oh and shop And it's like a it's a bad bad source That's where they can track you and they could uh learn your habits and interests And they could put up an ad of a fake mixer and then you're like, yeah, I'll buy this one It's got a great price and normally if it's too good to be true it is so watch out for that Some of the most uh important advice I can give people is not only that one But let's click on Let's click on reddit perfect So I was working on a academic survey the other day And see how it's got this lock This is a secure connection This is what you want Now if you go to a bad connection like the one I showed you Up ahead and in the module for algebraic passwords You will see that it has an unlocked Locked and it'll tell you that the connection is not secure That is not a website that you can trust And you shouldn't be on it sometimes Uh, you can use it like the way I did for something minor if it's private But normally for shopping is very crucial that you avoid that That connection that website like that mixer example that I gave you guys just now Okay, so let's quickly go over these Make sure If you're gonna have some exceptions For the protection of these websites, I don't know if it's like, uh, Bronco mail or like something voicey state Or like a library database That's something you could add and you could save changes to But otherwise I don't recommend using that Make sure this is clicked on standard. That way doesn't have any social media trackers cross-site tracking cookies Uh cookies are like crumbs kind of like a trail animate it'll um It'll keep all this data of all the websites you visit, uh, and it'll try to Attack you You can also enable this to be strict or stronger or custom to make it, uh, something that you want This is very important. You can delete. I recommend that you click this delete or select the delete cookies and cite data when Firefox is closed You can manage data So check it out. This is all the stuff I visited and there is just so much once you remove it all Or just clear the data Which is a lot 700 megabytes almost a gigabyte worth of, uh Tracking information you will be more secure You can also clear your history This will clear the browsing history and the downloads And that's very important because it will it will clean Clear and erase any data that is not necessary. So that will prevent any problems any cyber threats The permissions sometimes you will get a permission from an application that you don't know and And that's good to have because you want your computer to ask you permission that way if something Comes up out of the ordinary like oh, I'm not working with this. I don't recognize this program It was supposed to be youtube, but it's not it's something else. It's like Allow access to fast videos online something like that That comes off questionable That's where you you would want to block that permission Firefox data collection use This is questionable. Um, it does help, uh The mozilla firefox organization, which they are trustworthy Uh to send them right here the technical and interaction data because The this browser used to crash a lot and so it's got to go through a lot of updates and a lot of repairs digital repairs So I would make the exception for firefox to share data, but with facebook tiktok Snapchat instagram and youtube. I I wouldn't share data. I I also don't think I would share data with Apple safari and google chrome browsers or uh microsoft edge Firefox I would but uh, it's not it's not necessary and you could and you could check these out off You're no longer allowing mozilla to capture technical or an interaction data. All past data will be deleted within 30 days That's cool. We we don't need any more errors Allow firefox to install and run studies Let's not let's let's be very strict on that side of things Make sure this is on the security that you've got these settings enabled deceptive content and dangerous software protection Make sure this enabled blocked dangerous and deceptive content blocked dangerous downloads warn you about unwanted and uncommon software Very strong stuff right here on the certificates When I serve a request for personal certificate I ask you every time And this is a communication Certificate it has to do with with the way computer systems communicate in a very complex manner using Numbers binary language Okay, so we've got privacy insecurity Completed