Study Recommendations

5. Study Recommendations Plus Cert of Completion for CPEs

Maintaining security, privacy and anonymity can be a complex thing in order to achieve good security, good privacy.

And to be anonymous, you must understand detail.

So the course goes in depth.

It is both.

And in depth, any course that just touches on the surface of security, we'll leave gaps and any gap makes you vulnerable.

So any course that attempts to help protect you online has to have some depth and breadth to it, or it would fail to teach you enough so you can protect yourself align.

But just because the topic is in depth and complex, doesn't mean it's not possible to learn.

If you find the topic interesting, then that's all you need.

I recommend making notes, read around the topics we cover and feel free to ask questions.

When you have them, I provide lots of external references to websites, reports, news articles, Wikipedia, and so on is not necessary to read them all.

These are just for further reading.

If you want to go further into the topic.

I also recommend setting up a test environment in order to practice what you learn and I'll teach you how to set up a test environment later on in the course, one of the best ways to learn is to learn, to teach someone else.

If you have in your mind that you need to teach what you are learning to someone else after, or actually do teach someone else that will really help you retain what you learned.

According to a psychology report, learners retain approximately 90% of what they learn when they teach someone else or if they use it immediately, which is why I recommend you learn it from the perspective that you're going to teach someone else or actually teach someone else.

And you set up the test environment.

So you can use these things immediately.

This is not a course for you just to watch and listen, and then forget, this is a course for you to actually learn and then be able to practically apply.

And also learners retain approximately 75% of what they learn when they practice what they learned and you can see some of the other statistics here.

There are many referenced items in this course, and most of them are free.

I've made an effort to make sure that they are free, but you may want to purchase additional software, hardware, and services that are discussed in this course.

An example could be, you want to buy a VPN or you want an email service, or you want to buy a hardware router, or you want to pay for a virtual machine and so on.

Although it's absolutely not necessary to buy anything to understand this course.

I'm just letting you know that you may wish to make additional purchases after you learn certain topics and I have no affiliation with any of the products that are discussed in this course.

They're only what I recommend or what are required to know about in order to understand the topic.

I could have a different operating systems on the course, and it may be, you never have any intention to use a particular operating system that I'm talking about.

When I am talking about a particular operating system, I make it clear.

Most often in the title.

So you can potentially miss those videos.

If you wish, like for example, windows 10, you may never have any intention to use that.

So therefore there may be no point in watching a video that teaches you how to change the privacy settings.

So, as I said, you might choose to skip those sections as they're not relevant to you, but that's up to you.

I don't recommend skip the sections on Linux, particularly because when it comes to serious security and privacy, the Linux and Linux top operating systems really are required.

And some final advice take affirmative action.

Knowledge is no good.

If it's not applied, most people will listen to some of this course.

And apply only a bit of it, but if the consequences of a breach in your security, privacy, or anonymity is high, then you have to take affirmative action and apply the techniques I teach you here.

And finally, my hope is that the information this cause will be used positively to improve people's freedom, security, privacy, anonymity, and above all Liberty.

Please do no harm with this information and stay legal.

Once you have completed each volume, you can get a certificate of completion signed by me, which you can see here in front of you.

This provides the relevant information that you need to earn something called continuous professional education credits or CPE.

These are the qualifications that you might have now, or you may wish to get in the future, such as security plus, CISSP, CISA, CISM and so on.

So if you want your CPE points, once you have completed this volume and the other volumes, make your request for the certificate here, this URL.

This service is provided free of charge, but do allow 28 days for the certificate to be processed or four volumes of this course amount to actually over 50 hours.

So that's actually a lot of CPE credits if you want to earn your CPEs.

So go to that URL when you've completed each volume.

Complete and Continue  

Become a Member and Get Unlimited Access to 340+ Top Cyber Security Courses.