ASYMMETRIC CYBER SECURITY COURSE

THE ASYMMETRIC CYBER SECURITY COURSE – Cellular Phone

Cellular phones are the key to our lives. We store account usernames and passwords for our personal and business emails, bank accounts, credit cards, social media etc., on our cellular phones to make logging in that much easier. Facebook, Instagram, Snapchat and Twitter accounts are all at the tip of our fingers. Photos of our children, family, friends, and life events are kept with us all day and night, right on our cellular phones. We use our cellular phone numbers as log in verification data for certain services. So much of our cyber lives revolve around our cellular phones. It only makes sense that we take reasonable measures to secure our cellular phones, the contents in it and our communication.

The Asymmetric Cyber Security Course – Cellular is a 4-hour class that provides specialized instruction regarding both the physical and cyber security of cellular phones. Instruction includes the setting up of multiple layers of security for your device; use of “end-to-end” encrypted apps to keep your conversations private; organizing your phone’s apps in order to maximize its security and user-friendliness; setting up and managing compartmentalized communication networks; the encrypting, sending and decrypting or messages and much more. Techniques learned in the ACSC – Cellular course will provide you with an unparalleled measure of security and comfort in knowing that if your device is lost, your personal information is less likely to be compromised.

This course is taught by current and former members of the U.S. military’s elite Special Operations Command, Law Enforcement Officers and Defense Industry Contractors.


ADMINISTRATIVE NOTES

  • Class duration: 4 hours
  • Pre-requisites:
    • Know your individual operating system
    • Have the phone space available to install apps from ITunes or Google Play
  • Course cost: $150

 

THE ASYMMETRIC CYBER SECURITY COURSE – Computer

We rely on our computers to connect us with our friends, family, and coworkers. We use our computers to store an inordinate amount of information about our personal lives and our business ventures. Every site that we visit, and every page that we log into, is all stored to be recalled later by someone looking to exploit that information. Utilizing “open” Wi-Fi at hotels, or Internet cafes opens up our computers, and our information to the prying eyes of those ready to exploit this knowledge. Traveling through airport security, and having your computer taken by “accident” is not very likely, but it is possible and could lead to one of the worst situations that we could face. Our reliance on personal and business computers makes us susceptible to the unfortunate loss of information.

The Asymmetric Cyber Security Course – Computer is a 4-hour class that provides specialized instruction regarding both the physical and cyber security of computers. The instruction includes setting up multiple layers of security for your computer; creating encrypted storage volumes; the setup and use of “end-to-end” encrypted email accounts; the selection and use of virtual private networks (VPNs); the setup and management of compartmentalized communication networks; the encrypting of documents; complete or partial encryption hard-drives, and much, much more. In short, the techniques of ACSC – Computer will provide you with an unparalleled measure of security that if your laptop is lost your personal information is less likely to be compromised.

This course is taught by current and former members of the U.S. military’s Special Operations Command, Law Enforcement Officers, and Defense Industry Contractors.


ADMINISTRATIVE NOTES

  • Class duration: 4 hours
  • Pre-requisites:
    • Know your individual operating system
    • Have the ability to download, install and use programs onto your computer.
  • Course cost: $150

 

ASYMMETRIC CYBER SECURITY COURSE

ACSC – Cellular Phone

Cellular phones are the key to our lives. We store account usernames and passwords for our personal and business emails, bank accounts, credit cards, social media etc., on our cellular phones to make logging in that much easier. Facebook, Instagram, Snapchat and Twitter accounts are all at the tip of our fingers. Photos of our children, family, friends, and life events are kept with us all day and night, right on our cellular phones. We use our cellular phone numbers as log in verification data for certain services. So much of our cyber lives revolve around our cellular phones. It only makes sense that we take reasonable measures to secure our cellular phones, the contents in it and our communication.
 
The Asymmetric Cyber Security Course – Cellular is a 4-hour class that provides specialized instruction regarding both the physical and cyber security of cellular phones. Instruction includes the setting up of multiple layers of security for your device; use of “end-to-end” encrypted apps to keep your conversations private; organizing your phone’s apps in order to maximize its security and user-friendliness; setting up and managing compartmentalized communication networks; the encrypting, sending and decrypting or messages and much more. Techniques learned in the ACSC – Cellular course will provide you with an unparalleled measure of security and comfort in knowing that if your device is lost, your personal information is less likely to be compromised.
 
This course is taught by current and former members of the U.S. military’s elite Special Operations Command, Law Enforcement Officers and Defense Industry Contractors.


ADMINISTRATIVE NOTES

  • Class duration: 4 hours
  • Pre-requisites:
    • Know your individual operating system
    • Have the phone space available to install apps from ITunes or Google Play
  • Course cost: $150

 

THE ASYMMETRIC CYBER SECURITY COURSE – Computer

We rely on our computers to connect us with our friends, family, and coworkers. We use our computers to store an inordinate amount of information about our personal lives and our business ventures. Every site that we visit, and every page that we log into, is all stored to be recalled later by someone looking to exploit that information. Utilizing “open” Wi-Fi at hotels, or Internet cafes opens up our computers, and our information to the prying eyes of those ready to exploit this knowledge. Traveling through airport security, and having your computer taken by “accident” is not very likely, but it is possible and could lead to one of the worst situations that we could face. Our reliance on personal and business computers makes us susceptible to the unfortunate loss of information.

The Asymmetric Cyber Security Course – Computer is a 4-hour class that provides specialized instruction regarding both the physical and cyber security of computers. The instruction includes setting up multiple layers of security for your computer; creating encrypted storage volumes; the setup and use of “end-to-end” encrypted email accounts; the selection and use of virtual private networks (VPNs); the setup and management of compartmentalized communication networks; the encrypting of documents; complete or partial encryption hard-drives, and much, much more. In short, the techniques of ACSC – Computer will provide you with an unparalleled measure of security that if your laptop is lost your personal information is less likely to be compromised.

This course is taught by current and former members of the U.S. military’s Special Operations Command, Law Enforcement Officers, and Defense Industry Contractors.


ADMINISTRATIVE NOTES

  • Class duration: 4 hours
  • Pre-requisites:
    • Know your individual operating system
    • Have the ability to download, install and use programs onto your computer.
  • Course cost: $150