Computer & Internet Security For Kids/Teens [Age 8-18] Years
Published 8/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 527.38 MB | Duration: 0h 54m
Published 8/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 527.38 MB | Duration: 0h 54m
[The course is accessible to students who are learning under adult supervision.]
What you'll learn
The students will learn how to create strong passwords.
The students will learn how to save passwords in a safe place.
The students will learn 2 methods to hide passwords.
The students will learn how to avoid emails contains spam, advertising abd viruses.
The students will learn how to archive or delete unimportant email messages.
The students will learn how to use a free powefull antivirus [Nod32] and update it every month.
The students will learn how to use my Binary CodeSoft© PasswordGenerator to build [Hard-to-guess passwords]
Requirements
Princepals of computer and internet knowledge.
Windows Operating System (7, 10, or 11)
Microsoft Office 2010 version or higher
Description
Those under 18 may use the services only if a parent or guardian opens their account, handles any enrollments, and manages their account usage. As such, any subject matter oriented towards young students must be clearly marketed to parents and guardians who will be supervising their learning.The course simply takes the kids and youth on a journey to understand the meaning of Cyber Security and its components.And teaching students some useful tricks to hide personal information & data from hackers and snooping.The first trick:- How to hide your accounts, links, and software passwords in a Microsoft Word file (*.docx).Many of us sometimes forget the passwords for social networking accounts, personal emails, and program accounts for study or work. Binary Code Soft has found an easy solution to all these annoying problems. The first solution is called (secret ink), and it is a simple method that uses the capabilities of the Office Word program to save passwords in a safe place in a way that only you know.- For more security, you can save the Word file using a password to open it.You can use a single file that collects all passwords. You can make it [itself] password protected but that's another level of protection. In the coming videos, we will learn other methods using the Excel program to protect files and save our passwords easily. The purpose of these lessons is to protect children and youth from hackers and privacy intruders, with simple, uncomplicated, and inexpensive methods as well.The second trick:-Open a new Excel file or one that you use and know its location. Stand in the [Name Box] and enter the PIN code you only the one know. Maybe 4-digit numbers or 6-digit numbers. You directly move to the row with this reference number. Then type the link to the website, and then press the [Tab] key to move to the next cell. Then write the password. And choose the color of the font to be written [save the file]Many of us sometimes forget the passwords for social networking accounts, personal emails, and program accounts for study or work. Binary Code Soft has found an easy solution to all these annoying problems. The second solution is called (Your Pin code), and it is a simple method that uses the capabilities of the Office Excel program cells reference to save passwords in a safe place in a way that only you know.You can use a single file that collects all passwords. And also, make it password protected but that's another level of protection. In the coming videos, we will learn other methods using an Excel VBA program to generate passwords not less than [14] characters and hard/impossible to Gissing to protect files and save our passwords easily. The purpose of these lessons is to protect children and youth from hackers and privacy intruders, with simple, uncomplicated, and inexpensive methods as well.
Overview
Section 1: Company Introduction
Lecture 1 Binary CodeSoft - Online presentation
Section 2: Introduction
Lecture 2 Introduction
Section 3: First Trick
Lecture 3 Secret ink method
Lecture 4 Practical Example on First Trick
Section 4: Second Trick
Lecture 5 Using Microsoft Excel application
Lecture 6 Practical Example on Second Trick
Section 5: Creative tool to login
Lecture 7 Kids version with Avangers user interface
Lecture 8 Teens version with new user interface design
Lecture 9 Adults version with new simple interface design
Section 6: Get your own Superman protection
Lecture 10 How to download, install, and activate
Section 7: Protect your Microsoft Office files using password.
Lecture 11 Step by step
Section 8: Protect your portable USB devices [Flash memory - portable SSD]
Lecture 12 Use Pitlocker
All users of computer and internet specially age from 8- 18 years.