Skip Navigation

Online help Learning at your own pace, or facilitated by an instructor

Introduction to PC Security (Self-Paced Tutorial)

Instructor

Unassigned Faculty

See Course Dates

What You Will Learn

Learn the fundamentals of PC and network security from this expert-developed course.

Introduction to PC Security (Self-Paced Tutorial)
Course Dates

Online help Learning at your own pace, or facilitated by an instructor

$189.00

Introduction to PC Security (Self-Paced Tutorial)

99 Seats Open

Selected Course

Dates:

Course type: Security

Times:

Location: Self-Paced Campus Map

Contact Hours: 0.0

Other Details

Course Code: NETSEC-911-6

Category: Security

Contact Hours: 0.0

Format: Online

After registering for this course, you can come back to the catalog to register for more courses.

Issues with registering? Please contact us at CERegistration@jccc.edu or call 913-469-2323.

Similar Courses

Security image
Online help Learning at your own pace, or facilitated by an instructor
Certified Information Systems Auditor (CISA) Session start date:
0.0 contact hours $649.00
Security image
Online help Learning at your own pace, or facilitated by an instructor
Introduction to Cybersecurity (Self-Paced Tutorial) Session start date:
0.0 contact hours $169.00
Security image
Live Online help Real-time discussions with your instructor and fellow students via technology
Information Security, Incident Response and Computer Forensics Session start date: Dec 2
12.0 contact hours $950.00
Security image
In Person help Traditional, instructor-led and offered in a classroom at JCCC
Security+ Exam Prep Session start date: Dec 9
35.0 contact hours $2,199.00
Security image
Live Online help Real-time discussions with your instructor and fellow students via technology
CompTIA Cybersecurity Analyst (CySA+) Bootcamp Session start date: Dec 9
30.0 contact hours $2,995.00
Security image
Live Online help Real-time discussions with your instructor and fellow students via technology
Introduction to Hacking, Defense and Response Session start date: Jan 6
12.0 contact hours $950.00
Security image
Live Online help Real-time discussions with your instructor and fellow students via technology
Certified Information Systems Auditor (CISA) Bootcamp Session start date: Jan 7
30.0 contact hours $3,525.00
Security image
Live Online help Real-time discussions with your instructor and fellow students via technology
Applying the Risk Management Framework (RMF) and NIST Controls Session start date: Jan 7
24.0 contact hours $3,595.00
Security image
Live Online help Real-time discussions with your instructor and fellow students via technology
Information Security Essentials Session start date: Jan 14
21.0 contact hours $1,299.00
Security image
Live Online help Real-time discussions with your instructor and fellow students via technology
Information Security, Incident Response and Computer Forensics Session start date: Jan 27
12.0 contact hours $950.00
 
Close Modal Window

Online Registration Temporarily Down

Please contact us at ceregistration@jccc.edu or call 913-469-2323 to register now or please visit us later.

Close
Close Modal Window

1 Introduction to PC Security

In your first lesson, you will learn the facts--and the myths--about PC security. By the end of this lesson, you will also be able to assess your own risk, whether you're an individual or manage a network of any size. You will also perform a self-assessment to evaluate just how vulnerable you are to security flaws.

2 Your PC and Network

If you ever wondered what technical gurus are speaking about when they talk about LANs, WANs, VPNs, and P2P, you will find detailed answers in this lesson. Discover the basics of networks and how your PC connects to them.

3 PCs, Networks, and Software Demystified

Most of us don't stop to think about how a Mac can talk to a PC and vice versa. Yet, different types of machines talk to each other on a daily basis across networks. They also talk to printers, fax machines, and a host of other devices. The OSI model for network connections lets you accomplish this, and you will learn all about it in this lesson.

4 Viruses, Worms, Blended Threats, and More

Get ready to investigate the world of viruses, worms, and blended threats. You will learn what they are and the differences between all three. Of course, all this knowledge will also teach you how to protect yourself and your network from the hackers and crackers of the world.

5 The Family of Malware

This lesson introduces you to the ware family. What is the ware family? They are the products that download themselves onto your computer without your consent or knowledge-spyware, scumware, malware, and adware. You will meet them and learn all about where they live, places they frequent, and how to remove these unwelcome guests.

6 Exploits and Vulnerabilities

You may have heard of them: vulnerabilities, exploits, and exposure. But what are they? Have you ever wondered if someone really can control your computer without your knowledge? If you've been pondering these questions lately, then you will find your answers here, along with priceless information on protecting your computer and your network to keep your business and personal data private.

7 Network Attacks

Have you ever tried to access the Web but received an error saying the page can't be displayed, you aren't connected, or you don't have access? Denial of Service attacks and SYN flooding are two types of network attacks that seem to go unnoticed on personal PCs and small networks. After this lesson, you will no longer be left wondering what happened to your Internet connection.

8 Everything You Wanted to Know About Firewalls. (Part One)

This lesson will introduce you to firewalls. Join me in this lesson, and you will soon start building an impenetrable moat around your network.

9 Everything You Wanted to Know About Firewalls. (Part Two)

Now that you have your moat built, it's time to arm up and defend yourself. In this lesson, you will learn how to configure your firewall and maximize your network security.

10 Laptops, Notebooks, Netbooks, and Wireless Networking

Laptops and wireless connectivity aren't as secure as they appear. You will understand why in this lesson.

11 Virtual Private Networking (VPN)

This lesson explores the Virtual Private Network and how it's different from standard networks, how it works, how to secure it, and how to set up your own. You can share files with family across the miles by allowing them to connect remotely to your designated shared folders. You can share music files, family pictures, and anything else you choose to give them access to.

12 The Changing Face of Security

Now that you know what's out there, how can you possibly keep on top of security issues? There's so much information out there, how will you know what applies to you? You will learn about emerging security technology that will help managing and securing your network easier. Finally, you can test yourself against the first security assessment to see how well you've secured your own PC or network.

Close Modal Window

Online help Learning at your own pace, or facilitated by an instructor

Introduction to PC Security (Self-Paced Tutorial)

DATE TIME DAY PRICE AVAILABILITY LOCATION  
$189.00 99 Seats Open Self-Paced Campus Map Register
Close Modal Window

Online help Learning at your own pace, or facilitated by an instructor

$189.00

Introduction to PC Security (Self-Paced Tutorial)

99 Seats Open

Selected Course

Dates:

Course type: Security

Times:

Location: Self-Paced Campus Map

Contact Hours: 0.0

Other Details

Course Code: NETSEC-911-6

Category: Security

Contact Hours: 0.0

Format: Online

After registering for this course, you can come back to the catalog to register for more courses.

Issues with registering? Please contact us at CERegistration@jccc.edu or call 913-469-2323.