- Part 1 - Introduction
- Part 2 - From click to terminal: mastering Linux
- Part 3 - Securing your computer
- Part 4 - The browser: an OS within the OS
- Part 5 - Taking back control of your phone
- Part 6 - Securing your local network
- Part 7 - Final section
Welcome to the SCU202 course, the follow-up to the SCU101 course, which will take you further in your mastery of IT security by emphasizing individual sovereignty, privacy protection, and secure management of your personal data. Here's an overview of what you'll discover throughout SCU202 course.
Part 1 - Introduction
The course begins with a brief review of the concepts covered in SCU101 which will ensure that you're fully up to date on the fundamental principles necessary to properly approach what follows.
Part 2 - From click to terminal: mastering Linux
This part introduces the GNU/Linux system, a pillar of digital sovereignty. You'll explore the differences between Linux, Windows and macOS, discover the fascinating history of Linux and free software, and understand why Linux is often synonymous with security and freedom.
Next, you'll learn how to choose the Linux distribution that best fits your needs and desktop environment. Finally, you will take your first steps with Ubuntu through a detailed installation and configuration guide.
Part 3 - Securing your computer
In this section, you will learn how to strengthen the security of your computer. We will approach methods to effectively protect your access and separate your uses. You'll understand the importance of regular system and software updates to minimize potential vulnerabilities.
You'll also be trained to verify the integrity and authenticity of downloaded software to avoid infection or compromise, as well as using encryption effectively to secure your personal data and backups. Finally, you'll discover why and how to clean up your files' metadata to protect your privacy online.
Part 4 - The browser: an OS within the OS
Nowadays, web browsers are everywhere in our daily digital lives, and are often the primary target for cyberattacks. In this section, we retrace the history of browsers and their evolution.
You'll then discover an overview of today's rendering engines and browsers, their pros and cons, along with concrete best practices to secure your browsing as much as possible.
Part 5 - Taking back control of your phone
Today, our smartphones are extensions of both our personal and professional lives, making it so important to control their security. We'll explore in detail the various mobile operating systems, their advantages and limitations, while discovering open source alternatives to regain full sovereignty over your device.
You'll then learn the best practices for everyday security, from updates to separating your personal and professional data. Finally, you'll discover secure communication tools and alternative open source applications to enhance the privacy and security of your phone.
Part 6 - Securing your local network
Your home network is an important critical point when it comes to security. We'll start by taking a look at how a local network works, before moving on to the practical steps involved in securing it effectively.
You'll learn how to choose and configure a secure router, segment your network, strengthen your Wi-Fi network, and deploy monitoring tools to quickly detect any anomalies.
Part 7 - Final section
To wrap up the course, you'll be able to attempt the final exam to obtain your certificate and verify your comprehension of the topics discussed.
Are you ready to fully take control of your IT security, strengthen your individual sovereignty and guarantee your online privacy? Let's go!