The Bulletproof Computer

For the next three weeks I will be teaching a course designed to help computer users secure their computers and networks from Internet attacks.

The Bulletproof Computer

Fully updated for 2013.  Learn how to harden your computer from Internet threats. Computer Security is not just virus protection any more. You could be infected with a "Trojan Horse" or spyware, which is recording your keystrokes or has turned your computer into a Zombie Host for e-mail spammers. Hear about the basic risks associated with your Internet connection. Learn how to detect and remove viruses, ad-ware, spyware, and Trojans from your computer, and how to secure your computer from exposure to the never-ending array of new threats. While no computer security system will be 100% effective against every threat, you will learn how to set up defenses to prevent most Internet-borne exploits. We will also look at Parental Control software and services. This course is valuable for any computer user with a full time, high speed cable or DSL connection to the Internet.  1 session – 3 hours

To register, click on one of the program links below.

Tuesday, February 26, 2013 6-9 pm ISD 833 South Washington County

Monday, March 04, 2013 6-9 pm ISD 197 North Dakota County Tri-District

Tuesday, March 05, 2013 6-9 pm ISD 196 Rosemount, Apple Valley, Eagan

Wednesday, March 06, 2013 6-9 pm ISD 11 Anoka-Hennepin

Thursday, March 07, 2013 6-9 pm ISD 834 Stillwater

Thursday, March 14, 2013 6-9 pm ISD River Falls


About the Author:

Cybersecurity guru to business owners in the St Paul, Minneapolis, and western Wisconsin area. Computer security and hacking have been a passion of mine since I entered the computer and networking business in 2000. In 2013 I completed a course of study and certification exam to become a Certified Ethical Hacker (CEH). In 2016 I was certified as a Certified Information Systems Security Professional (CISSP). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of computer security, network security, and web site security. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also provide Cybersecurity Awareness Training for clients and their employees. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. The views expressed on this Web site are mine alone and do not necessarily represent the views of my employer.

Add a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.