PC Security Advanced

Picture of PC Security Advanced
Quick Facts
  • Delivery Method Online
  • Professional Certificate
  • 24hrs Suggested Study Time
  • 3 Months Access
  • Tutor Support
  • Study On Any Device
  • 2594 Students

Use ethical hacking techniques to locate and close security holes in your own network.

When is hacking legal? When you use it to secure your own network. This new method of hacking, called ethical hacking or white-hat hacking, uses common and readily available hacking tools and techniques to audit your network so you can locate and close security holes. Whether you're running a small home network or you're an enterprise network administrator, this course will teach you how to better protect your system against those who wish to gain unauthorised access.

You'll gain an understanding of the complex method of electronic breaking and entering. You'll learn the terms and programming behind the interaction between hardware and software when communicating through a network. You'll follow packets of data from one point to another through an entire network, and find out where the flaws exist for data loss and security breaches. You'll discover the role of the seven layers of the OSI model, and the dependencies of hardware and software interaction through packet transmission. And you'll find out how private data can quickly become public knowledge.

Hackers are costing businesses around the globe several billions of dollars every year. Don't become part of that sad statistic. Sooner or later, you know that somebody is going to try and break into your network. Why not learn how hackers think so you can harden your defenses against them?

Courses are delivered to you through expertly executed lessons, online instruction and interaction with like-minded students. Our courses are designed to deliver all of the benefits of studying in a classroom whilst giving you the flexibility to study at a time and place to suit your needs. You can access your classroom 24/7 from any device with an internet connection.

This course has a 3 month duration. You'll complete comprehensive lessons, quizzes and assignments before submitting your final exam at the end of the course to achieve your certificate. Courses must be completed within the 3 month access period.

If you've ever wondered about the different types of hackers, what motivates them, and when hacking is considered ethical, this lesson answers these questions and more! You'll learn about the white-, black-, and gray-hat hackers, why they hack, the methods they use, and the ethics of computing and hacking. You'll also get your feet wet by learning how to conduct a security audit on your network by trying to penetrate it just as a hacker would!

This is the lesson where you'll learn about people hacking! Social engineering is the official term for the physical and psychological methods hackers use to gain entry to your system. Intrigued? Good. Get ready to learn the insider techniques of how hackers gain information about your networks through preying on the weakest link in any organization—its employees!

If you've ever used the Google search engine to find information on the Internet, you know how powerful it is. Hackers know this too, and they have found a way to use the built-in power of Google to gather information about your network! By learning how the search engine works, you'll see why and how Google stores so much public and private information. Then, you'll learn how hackers extract this wealth of information and how they use it against you.

In this lesson, you'll learn advanced Google hacking techniques so that you can perform a Google hack for your security audit. Get a full list of advanced hacking operators and discover—in depth—the advanced method of querying Google. Through a step-by-step example, you'll see how a search query is performed and what results look like. And of course, you'll learn how to incorporate this hacking method into your own security audit!

Have you ever wondered what really goes on within your network? The OSI 7 Layer Network Model is the standard on which networks are built, so in order to fully understand how networks are hacked, you need to understand this model. But have no fear! You'll learn the purpose, function, and communication methods of each layer within the model. And I assure you it will be painless!

Have you ever wanted to see what kind of information your network is sending out into cyberspace? Well, it's all in the packets. Once you understand the OSI 7 Layer Network Model, you can now understand packets that travel across a network. It's in those packets that hackers can gain the most information about your network. You'll learn how communication between two networks takes place—from the initial handshake to the termination of the connection—and how you can capture packets from your network just as a hacker would.

Now that you've learned how a hacker scouts out your network and gains information, it would be nice to know from what direction they'll attack you from, won't it? Learn how to look for signs that your network has been exposed or penetrated. By understanding the levels of security, from vulnerability through exposure, you'll view a hack through the eyes of a real hacker.

We all know that common ports connect printers, USB devices, and the like. But, did you know that there are also ports hidden inside your computer? And more importantly, do you know how these hidden ports can endanger you if they are left exposed on your network? In this lesson, we'll look at a PC from the inside out. This lavishly illustrated lesson will help you understand what ports are, where they are located, and what they do. Then, it's a short step to understanding how leaving these ports open can result in a hacker learning the services and software running on your network.

While the term necessary evil is a cliché, we do have a few necessary evils in the computing world. In order to make networks function, sometimes we need to run programs that might not be good for our security. You'll need to learn to manage the risk involved with running these services by understanding what they do, how they operate, and what you can do to keep them from exposing your network core.

Get ready to learn about rootkits in this information-packed lesson! A hacker's best friend, these malicious programs run undetected in the background of your system, launching malicious attacks, sometimes even without your knowledge. It's both hard to find and hard to get rid of rootkits, so for the sake of your PC's security, get ready to apply this lesson today!

Have you ever analyzed your risk? In this lesson, you'll learn how to conduct a risk analysis in order to determine the most vulnerable points within your network. Hand in hand with the analysis is your audit plan, where you can probe your computer or network for the weakest links. And then, we'll talk about what to do once you've found them.

If you like forensics television shows like CSI, this lesson is for you. No PC security course could be complete without an introduction to computer forensics, which is a precise science used to contain security breaches and minimize loss in the event of an attack. Learn how to become a computer investigator so that you'll be prepared if a hacker ever violates your system.

Debbie Mahler

Debbie Mahler

Debbie Mahler teaches students at college and university level on a wide range of business-related topics.  She worked for nearly 15 years in the PC repair business, has a successful online IT business, has written six books, and writes for s... Read more

Read Debbie Mahler's Profile

Frequently Asked Questions

Once you've made the payment, we'll send you a confirmation email with a link to start your course. Feel free to get started whenever you're ready!

You'll have 3 months access to your course. In that time you are free to study at your own pace. The course duration is 24 hours.

Online learning is a flexible way to study that fits around your schedule, giving you the freedom to learn at your own pace from anywhere in the world. You'll have 3 months to complete the course and can take the multiple-choice questions and final exam whenever it suits you.

If you need help, you can contact us anytime. You can also join the discussion area where you can interact with other students. The discussion area for each lesson is open for the entire duration of the course.

Of course! We offer a 7-day money back guarantee. As long as you haven't completed the course, you can get a full refund within 7 days of enrolling.

We do not offer extensions or transfers for this self-paced course. However, you will have 3 months to complete the course, and if you need to cancel within the first 10 days of enrolment, we offer a money back guarantee.

The Learning Environment

From the moment that you enrol in the PC Security Advanced you will become an integral part of our learning community. You'll find yourself with the freedom to learn at a speed that suits you, on any device, from anywhere in the world. Achieving your career goals no longer has to mean compromising family and work commitments.

Our Values

Learn At Your Own Pace

We believe in personalised learning. That's why we provide all the tools and support you need to succeed at your own pace. With flexible learning, you'll stay motivated and retain more information. Plus, you can balance your studies with work and family commitments to make your dreams a reality.

We Won't Break The Bank

Education should be accessible to anyone who wants to learn. That's why we offer some of the most competitive prices in the industry with payments plans for just $25 per week. Investing in your future is a smart choice and doesn’t have to break the bank.

Industry-Led Courses

There's no better way to learn than from experts with years of experience in your field. That's why each of our 200+ industry-led courses are designed to give you a real-life perspective on your industry. With our expert mentors, you'll learn from people who have a wealth of knowledge and experience, and who are passionate about sharing it with you.

Get The Personal Support You Deserve

At Vibe Learning, we're real people who are dedicated to providing you with personal support every step of the way. Our industry experts are not only professional and knowledgeable but also incredibly passionate about sharing their expertise with you. With their guidance, you'll gain invaluable insights and practical knowledge to help you succeed.

Microsoft Outlook 2007 Fundamentals Online Course | Vibe Learning
 

Microsoft Outlook 2007 Fundamentals

Picture of Microsoft Outlook 2007 Fundamentals
Quick Facts
  • Delivery Method Online
  • Professional Certificate
  • 24hrs Suggested Study Time
  • 3 Months Access
  • Tutor Support
  • Study On Any Device
  • 2641 Students

Become a productive and confident Microsoft Outlook 2007 user.

Want to learn Microsoft Outlook 2007 fast? Want to become a confident and productive user of this powerful program without having to memorise a lot of technical mumbo-jumbo? In this course, you'll see what's new in Outlook 2007 and get up and running quickly with the most important aspects of the program, from basic e-mailing to automating your work with rules. You'll learn security basics and how to perform maintenance tasks, like backing up your data. You'll even create a Google Gmail account for class assignments and personal use. You'll also interact with other students and an instructor whose Outlook books, articles, and online courses have helped thousands of people like you learn the essentials of earlier editions of Outlook. Whether you're new to Outlook or you've been using it for years, you're sure to learn something useful in every lesson.

Courses are delivered to you through expertly executed lessons, online instruction and interaction with like-minded students. Our courses are designed to deliver all of the benefits of studying in a classroom whilst giving you the flexibility to study at a time and place to suit your needs. You can access your classroom 24/7 from any device with an internet connection.

This course has a 3 month duration. You'll complete comprehensive lessons, quizzes and assignments before submitting your final exam at the end of the course to achieve your certificate. Courses must be completed within the 3 month access period.

Are you ready to get organized and become more efficient? For a lot of people, Microsoft Outlook 2007 is the answer to increased productivity in the workplace and at home. We'll start with a whirlwind tour of the interface and the help systems so you can get familiar with the program if you're new to it. Then we'll get you hooked up with a Google Gmail e-mail account you can use with this course and ever after. We'll wrap up the lesson with a look at keyboard shortcuts that can make navigating Outlook a breeze.

Now that you have an e-mail account, it is time to put it to use. In this lesson, you'll learn how to send, receive, and reply to e-mail messages. We'll also go over Desktop Alerts, Outlook's way of notifying you that you have new messages to read or tasks to do.

Now that you have the e-mail flowing, it's time to see how Outlook can help you manage it. Today, we'll look at how you can simplify your life by handling all your e-mail accounts in one place. You'll also see how you can use message groups and flags to keep track of conversations and organize your inbox. Plus, you'll love how Outlook helps you file messages with rules that do all the work of a personal assistant.

Outlook contacts can do everything the proverbial little black book could do—and a whole lot more! In this lesson, you'll see how you can create contacts and use the information they contain in other areas of Outlook, like the address fields of an e-mail message. You can even search your contacts, making it easy to find information about that guy, John, whose last name you can never remember, or the phone number of that little restaurant on Santiago Street.

These days, there are many ways to communicate electronically. Outlook 2007 works with two new technologies (instant messaging and RSS feeds) to expand the ways you can communicate. So today, we'll take a quick look at instant messaging programs and how they work with Outlook. Then, we'll dive into RSS feeds, a popular new way to get news and other information delivered right into Outlook folders.

It's time for a big change of gears. So far in this course, we've been using Outlook to communicate. But Outlook can also manage your personal information. In this lesson, we're going to focus on the personal information manager side of Outlook, starting with the calendar. The calendar got a major makeover in this version, so even if you're an Outlook veteran, you'll find a lot of new tips and tricks in this lesson.

Do you have tasks you need to do? Why not let Outlook help you keep track of them instead of relying on 50 random scraps of paper, each with a different notation? In this lesson, you're going to see how Outlook can help you keep track of all the stuff you need to do. You'll learn how to set automatic reminders that tell you when it's time to get cracking on a particular task so you'll always get your work done on time!

If you're wondering how to keep track of all the stuff that doesn't fit into e-mail messages or calendar appointments or a to-do list, you'll find all the answers in this lesson. Outlook's notes and shortcuts will be your new best friends. You'll learn how top use notes to store bits of information and shortcuts to tell you where you stored something on your computer. These tools make life a lot easier!

It's time to talk about managing your Outlook information again. We'll go back to talking about folders and rules in this lesson, but this time we'll have a different emphasis. You'll also find out how you can print information you want to take with you when you're away from your computer.

No matter how well you organize and manage information, there will come a time when you want to get old items out of the way without losing them. In this lesson, you'll learn how to archive your old information and back it up. We'll also talk about the tools you can use to help you find a specific item among the hundreds or thousands of items you may have stored.

There's a dark side to everything, and the unfortunate thing about using any e-mail program is that it's a door into your world. Spammers, hackers, phishers, and other individuals who want to spy on you, impersonate you, or even steal from you might try sneaking in through Outlook. Today, we're going to talk about Outlook's security measures and how you can use them to protect yourself from these unscrupulous people.

Microsoft put huge efforts into making Outlook easy to use. But that doesn't necessarily mean that it does everything exactly the way you'd like it to. In this final lesson, we'll look at some ways you can customize Outlook to make it work more the way you want it to.

Bill Mann

Bill Mann

Bill Mann has been writing about software and the Internet for over 15 years and has relied on Microsoft Outlook to keep him organised and on track since it first became available. He is the author of more than 15 books, including two about Outloo... Read more

Read Bill Mann's Profile

Frequently Asked Questions

Once you've made the payment, we'll send you a confirmation email with a link to start your course. Feel free to get started whenever you're ready!

You'll have 3 months access to your course. In that time you are free to study at your own pace. The course duration is 24 hours.

Online learning is a flexible way to study that fits around your schedule, giving you the freedom to learn at your own pace from anywhere in the world. You'll have 3 months to complete the course and can take the multiple-choice questions and final exam whenever it suits you.

If you need help, you can contact us anytime. You can also join the discussion area where you can interact with other students. The discussion area for each lesson is open for the entire duration of the course.

Of course! We offer a 7-day money back guarantee. As long as you haven't completed the course, you can get a full refund within 7 days of enrolling.

We do not offer extensions or transfers for this self-paced course. However, you will have 3 months to complete the course, and if you need to cancel within the first 10 days of enrolment, we offer a money back guarantee.

The Learning Environment

From the moment that you enrol in the Microsoft Outlook 2007 Fundamentals you will become an integral part of our learning community. You'll find yourself with the freedom to learn at a speed that suits you, on any device, from anywhere in the world. Achieving your career goals no longer has to mean compromising family and work commitments.

Our Values

Learn At Your Own Pace

We believe in personalised learning. That's why we provide all the tools and support you need to succeed at your own pace. With flexible learning, you'll stay motivated and retain more information. Plus, you can balance your studies with work and family commitments to make your dreams a reality.

We Won't Break The Bank

Education should be accessible to anyone who wants to learn. That's why we offer some of the most competitive prices in the industry with payments plans for just $25 per week. Investing in your future is a smart choice and doesn’t have to break the bank.

Industry-Led Courses

There's no better way to learn than from experts with years of experience in your field. That's why each of our 200+ industry-led courses are designed to give you a real-life perspective on your industry. With our expert mentors, you'll learn from people who have a wealth of knowledge and experience, and who are passionate about sharing it with you.

Get The Personal Support You Deserve

At Vibe Learning, we're real people who are dedicated to providing you with personal support every step of the way. Our industry experts are not only professional and knowledgeable but also incredibly passionate about sharing their expertise with you. With their guidance, you'll gain invaluable insights and practical knowledge to help you succeed.