The wall of AWESOME!
1st place winner: Toastmaster's District Humorous Speech Award
Jeremy speaks with students at the University of Advancing Technology, Tempe AZ

Opened my eyes to much needed information and to have a better grasp of the Internet.

Class attendee
Interagency OPSEC Support Staff

[Corkboard source]

Passwords and Authentication Bootcamp

If someone uses employee credentials to access your building or computer network, it could quickly become a disaster. Similarly, no employee wants some thief masquerading as them when they commit crimes. Proper authentication is important to everyone, but few really understand the risks and weaknesses of the systems they use. The purpose of this session is to describe the most common authentication methods, the risks of each, and countermeasures to handle those risks. Included are:

As always, you have two options: Hire me to teach your/your family/your company or learn right here, right now.

Ready to go?

If you'd like to discuss the seminar for use with company security days, private events, conferences, etc., please click here.

Supporting Materials

Learn More First

Other than my dashing good looks and lightning charisma, you can get a great deal of the same information for free right here on my website. Job number one is making us all safer after all:

As this is my newest talk, I'm still creating the web version of this information. In the meantime, here is the outline for the talk.

Talk Outline

Subject to change without notification of course.
  1. Biometrics – Voiceprint, facial recognition, fingerprint, and veinscans
  2. RFID – Electronic wireless identification
  3. Keys – Standard, physical keys
  4. Passwords – Computer passwords
"Instructor was wonderful! Extremely knowledgeable, great presentation style and enthusiastic. This course definitely succeeded in giving me the tools and awareness I need to evaluate information I post on-line."
Class attendee
National Defense University
IDENTITY THEFT
How to Steal Identities - Why It's So Easy
Credit Freeze
Data Defense
Credit Monitoring
Id Theft Insurance
The Identity Theft Victim's Mini-Guide to Recovery
PRIVACY
The Geek Privacy Principle
Nothing to Hide
Data Abuse
RFID - Radio Frequency IDentification
Privacy Alias/Persona
Data Defense
INTERNET SAFETY
Online Addiction
The Consequences of Posting Online
Photo Safety
Tricks and Scams
Account Hijacking
Trusting Companies
PASSWORDS
Bad Passwords
Password Tips and Tricks
Password Protection
Password Mugging
Computer Security
E-mail Safety
Kids and Computers
Shopping Online
Retailers
All About Warranties