Three steps to protect your home's Computer Systems
Three steps to protect your home's Computer Systems:
1 how to secure a WiFi
2 how to browse safely (in private) using a browser
3 how to use a password management program
This talk will be a step by step process with demos.
The goal of this talk is that the next day you will take the information and implement it on your computer.
About our Speaker:
Principal Interactive Security Training. Jay's work includes E-commerce, VPN work, security audit, workflow process, training, windows and Linux
enterprise designs. Jay works on various projects that include training, security designs, network infrastructures, enterprise designs and installations.
Jay's specializes in operating systems, deployment, Virtualization, Security and high performance computing. Jay has also been a contracted by Microsoft
to offering training in HPC, Security, Mobile, Windows and Azure for Research because of his real word experiences with these technologies.
Jay is also a global board member of GITCA, past President of ISACA-CT, past president APCUG, and a Microsoft MVP in enterprise
security one of under 60 in the world.