This specific course informs about possible risks and threats on the Internet. Whenever possible, hints are given to identify and prevent the dangers.
Possible risks on the web 
In this training, you will come to know about situations on the Internet that might cause some harm. It is explained, how these work and what you should be aware of to avoid becoming a victim of fraud.
For an easier understanding of this training, a recommended prerequisite is: Get familiar with frequently used terms related to the Internet
♦ How a link works and what to consider 
Introducing what is behind a link in a document or website. How it is possible to use a link for fraud. Showing how you can check where the link leads to. When it is better not to use the given link and what you can do alternatively.
♦ User tracking 
By using an example, it is demonstrated what user tracking is, how it works and what it is used for. Further, it is mentioned how you can limit the user tracking.
♦ What hackers are trying to find 
Mentioning what hackers are typically looking for to get access to your computer or mobile phone. Giving answers to following questions:
- Which programs are often attacked?
- How they will infect your computer?
- What is possible to do for minimizing probable risks of a successful hacker attack?
♦ Methods how hackers are cracking passwords 
Explaining different strategies for cracking passwords. As a result, suggestions are provided how to build safer passwords.
♦ Bots – Chat or Social Bots 
What Bots are and what is their usage. Where is their potential for misuse? What are typical indicators of Bots?
♦ Fake users and their intended use ![]()
On the Internet, it is possible to pretend to be someone else. Potential reasons for using false user profiles are stated.
♦ Social engineering 
Characterization typical ways of social engineering. What are their goals and possible impacts. Demonstrating a realistic attempt and providing some prevention tips.
♦ Scamming (Romance scamming) 
Description of methods, goals, and diverse types of scamming. Several tips are provided how to recognize possible scamming. What to do when someone was scammed.
♦ Artificial intelligence (AI) 
What it is and what effects are possible.
Pointing out some drawbacks of AI and their potential consequences for us.
| Back to start of text |
Internet threats and possible prevention 
Presentation of several frequently used dangers on the Internet. Some practical advice are provided how you can detect and prevent these.
For easier understanding of this training, a recommended prerequisite is: Get familiar with the basic Internet related terms
This specific section covers following topics:
♦ Collecting sensitive information (Phishing) 
Detailed demonstration what to typically look for in a phishing attempt by using an example. Conclusions and practical recommendations are offered.
♦ Ransomware that locks the access to your computer or own files
Explaining what this is and pointing out the separate types. 
General description of possible reasons for typically getting the ransomware. Free and paid software is usable to protect your Windows computer.
Anyhow, there is no 100% guarantee for the protection. The most sufficient protection is, to make regular backups of your private files and store them on a separate device. But the anti-ransomware programs will help protect your systems and ease you recover as fast as possible with minimal damage to your systems.
But note, no matter how willing you might be to pay the ransom, it's no guarantee that you'll receive your data back.
What to do when ransomware has locked my computer, smartphone, or my files? Several reasons are mentioned for not paying the ransom.
In case ransomware has encrypted your private files on the computer, read here for getting more information what you can accomplish: Possible removal of ransomware 
♦ Practical options to identify fake online shops 
Several useful hints are introduced that may help to check if an online shop is trustworthy. Checking a few things will provide more relevant information about the online shop.
Like, who finally is the owner of the website. Comparing this with the information provided in the online shop.
Besides of investigating the payment options, several further checks are introduced.
| Back to start of text |
