Log in

Prepared Workshops

Computer Security Bootcamp

Designed for colleges and other community centers, but useful for businesses as well, this workshop is designed to demonstrate the proper configuration and use of general-use computers. Topics include:

  • Cleaning and optimizing slow or cluttered machines

    Over time, computers become slow and unusable usually because they've accumulated too much excess junk. I can teach you how to quickly and easily find and remove this clutter using a series of tips and freely available tools.
  • Installation and use of security software

    No matter how careful you are, eventually you'll get attacked online. I will help you install and configure your anti-virus and firewall so that any such attacks will be stopped in their tracks.
  • Safe browsing and Internet use techniques

    When searching the Internet, you should follow best practices. Which sites should you click on; which should you avoid? How do you know the difference? Can you spot a fake website? Do you know if the company you're about to buy something from is ok to deal with? I can help you learn.
  • Introduction to file encryption tools

    If you want to store important information on your computer, you need to properly protect it. It's far too easy to lose your computer or have it fall to hackers who can take your unprotected data and use it for anything they wish. I will show you how to use free tools to protect your information so that it can't be easily taken and turned against you.
  • How to set up regular file backups in case of emergency

    You likely already know how important backups are; especially if you've lost data in the past. But that doesn't mean you have the time or knowhow to fix the problem. Let me show you how to simplify your data storage and backup process and greatly reduce your risk of permanent data loss.
  • Website best-practices (signups, passwords, etc)

    Ever sign up for Facebook, Twitter, or any other online service? Doing so without caution can lead to embarrassment and/or breaches of your privacy and security. I can teach your attendees the best practices for using online services safely.

This workshop is intended to improve your computing experience permanently so it is is BOYC: Bring your own computer. Preferably the one you use and work on every day.

While many of the tools described are PC only, Linux or Mac users will still be able to utilize the techniques and methodologies described.

Customizable Workshops

Let's face it; you can scream till you're blue in the face. You might read everything here (or know it already) and try to share it with others. "Read this site", you say. "Be safer and smarter", you say. It won't work and we both know it.

Human nature has a way of making you ignore people you know and favor information from complete strangers. That's where I come in. I will come and teach your people in a few hours tips, tricks, and rules; maybe even the same ones you've always taught them. But this time they'll hear it. I use humor and relevant examples to present information that has impact!

After attending my seminars, expect your people to have a different view of safety and security and to be armed with the mentality and tools that will keep your people safe, your information secure, and lessen your chances of being the next news scandal.

Workshop Topics

Every need is different. Whether it be an "office security day", a forum, or conference, the time and topics you require may vary. That's each topic is listed with approximate times so you can mix and match to make a session that suits you:

Passwords and authentication (20 to 30 minutes)
Recommended audience: Good for anyone who uses computers at any level

Protecting your assets (physical and virtual) means keeping out intruders. This is done with passwords, biometrics, badges, access cards, etc (but mostly passwords). But when your people don't understand the basics of protecting these authentication methods, your adversaries can easily exploit them. For the first time, your people will learn not only why it's important to protect their passwords, but how easy it is to do so. Also included is some discussion of alternate authentication methods; what works, what doesn't, and risk mitigation strategies.

Internet safety (40 to 50 minutes)
Recommended audience: Anyone who uses the Internet to send (e-mail, chat, messaging) or receive (browsing, research) information

You don't want to see a virus alert at work
You don't want to see a virus alert at work
Most of Internet safety is just a matter of adjusting the way you think about things along with a little background on how the Internet actually works. Whether it's keeping employees from accidentally downloading a virus or teaching them how to tell which e-mails and websites are fake, a lot of pain can be avoided with comparatively little instruction.

Home and family safety (40 to 50 minutes)
Recommended audience: Anyone.

Keep your family safe and anonymous
Keep your family safe and anonymous
This is designed for employers who's employees work with sensitive information (government, defense contracts, police, lawyers etc). Bad guys will be more motivated to get to you through your employees so make sure they aren't unprepared for the threat. This session will mostly cover home computing, social networking, and privacy skills. Also good for employers who just want to make it clear that they care about their employees on a personal level!

Portable computing defense (20 to 30 minutes)
Recommended audience: Anyone who stores or transports sensitive information on tablets, phones, or media

An Android tablet device
An Android tablet device
Portable computing may add freedom and efficiency, but it also adds risk. I will show your employees the risks they face and give them concrete countermeasures to defend againt them. Be certain you give your employees the training they need and not just the devices.

Internet Research Skills (40 to 50 minutes)
Recommended audience: Employees in human resources, public relations, or the press office

Find or monitor. Put the power of the Internet in your hands.
Find or monitor. Put the power of the Internet in your hands.
This session is all about finding information. Do you want to screen new recruits? Do you want to know and manage your company's reputation online? Do you want to make sure your employees aren't posting too much work information online? Want to keep tabs on the competition? Or maybe you just want your employees to be able to efficiently find answers to problems online? No matter the need, efficient work comes from efficient use of the Internet as a fact-finding tool.

Business data defense (40 to 50 minutes)
Recommended audience: Anyone responsible for sensitive information

Learn how to protect your data (<a href=http://minorityman.deviantart.com/art/Martial-Arts-in-the-Sunset-65747732>Photo source</a>)
Learn how to protect your data (Photo source)
This is a rapid-pace session pointing out the most common ways that businesses lose their personnel, proprietary, or secret data. This will show techniques for stealing information, but focus on practical tips and a defensive mentality that will help your employees avoid current and future data theft.
Feel free to mix and match workshop topics and seminar topics to suit your needs!

Common Workshops

For students (high school and especially college) (3 to 4 hours)

  • Internet Search skills
  • Reclaiming your privacy from the Internet
  • Internet Safety
  • Home and family safety

Students who are going to be heading out into the workforce are more marketable if they have strong Internet skills and lack embarrassing personal information or photos. This workshop is focused on giving potential hires a better mindset when it comes to the Internet making them more efficient and more hireable.

Businesses that utilize computers (3 hours)

  • Passwords and authentication
  • Internet safety
  • Business data-defense

Kept intentionally short out of respect for the time commitment needed, this workshop answers the question: how can I best improve my employees' handling of sensitive data in the least amount of time, with the least cost and effort.

The wall of AWESOME!

One of the best instructors I've ever seen!

Class attendee
National Defense University

Instructor provided great content with superb enthusiasm.

Class attendee
National Defense University

Jeremy speaks with students at the University of Advancing Technology, Tempe AZ

"Jeremy presented the topic on a personnel level. He speaks from experience and has vast knowledge on his subject. He does not speak down to the audience nor does he assume that we should know what he is presenting. "

National OPSEC Conference