If there were a co-instructor (esp. with Windows system experience), I would be more likely to consider offering this. In the meanwhile, I suggest that you take advantage of computer learning opportunities in the Rogue Valley and Ashland's CERT.
How prepared are you in case a credit card, checkbook, computer or important information is destroyed, stolen or lost -- at home or on a trip -- due to fire, theft, or computer failure? This course can help you to assess and reduce your risks for items kept at home and for information on your computer or web sites. This course will focus on online resources.
About the Instructor
Steve Weyer is a software and web-site developer, long-time (25+ year) Macintosh user (also bilingual with Windows systems), and his "family's IT (Information Technology) department" (system protection, updates, recovery and backup). Steve's also dealt with a burglary of his home, and trained with Ashland's CERT (Community Emergency Response Team).
Steve Weyer has 40+ years experience with computer software, including research and development for Stanford University, Xerox, Atari, HP and Apple. After Steve moved to Ashland in 2006 (after first visiting in mid-70s), he’s been participating in Ashland's Mac Users Group and enjoying non-technical activities such as hiking, rock climbing, reading, theater, improv comedy, volunteering, and OLLI classes; Steve has taught Evolution of the Internet -- many questions from students about practical computer protection from malware, backups, etc. led to this possible separate course.
- Home: inventory valuable items & sensitive information: list/document, secure/hide, scan/shred docs; minimize mailings & paper; identity theft; credit reports/monitoring; disaster preparedness (maybe not needed if separate CERT OLLI course offered regularly); home security systems; housesitters/neighbors/police volunteers; ...
- Travel: WiFi; cybercafe safety; #s to take with you; ...
- Computer (focus on Macintosh & Windows systems): malware(viruses, keyloggers, spyware, etc.); software updates; securing WiFi & routers; passwords; browser practices (cookies; adware; Flash); email practices (IMAP; secure configuration); ...
- Information: backup strategies (clone, incremental; offsite; cloud/media selection); encrypted volumes (e.g., for financial records)
- ... ?