The Complete Cyber Security Course : Hackers Exposed!
-
Introduction
-
know Yourself – The Threat and Vulnerability LandscapeTheory and Practical1m 8sGoals and Learning Objectives41sProtect What You Value4m 37sWhat is Privacy, Anonymity and Pseudonymity4m 36sSecurity, Vulnerabilities, Threats and Adversaries4m 37sAsset Selection3m 21sThreat Modeling and Risk Assessments0sSecurity vs Privacy vs Anonymity – Can we have it all?0sConfidentiality, Integrity and Availability – (Security Attributes)0sDefense In Depth0sThe Zero Trust Model0s
-
Know Your Enemy – The Current Threat and Vulnerability LandscapeGoals and Learning Objectives0sWhy You Need Security – The Value Of A Hack0sThe Top 3 Things You Need To Stay Safe Online0sSecurity Bugs and Vulnerabilities – The Vulnerability Landscape0sHackers, crackers and cyber criminals0sMalware, viruses, rootkits and RATs0sSpyware, Adware, Scareware, PUPs & Browser hijacking0sWhat is Phishing, Vishing and SMShing0sSpamming & Doxing0sSocial engineering – Scams, cons, tricks and fraud0sCPU Hijackers – Crypto Mining Malware and Cryptojackers0sDarknets, Dark Markets and Exploit kits0sGovernments, spies and secret stuff part I0sGovernments, spies and secret stuff part II0sRegulating encryption, mandating insecurity & legalizing spying0sTrust & Backdoors0sCensorship0sCyber Threat Intelligence – Stay Informed0s
-
Encryption Crash CourseGoals and Learning Objectives0sSymmetric Encryption0sAsymmetric Encryption0sHash Functions0sDigital Signatures0sSecure Sockets Layer (SSL) and Transport layer security (TLS)0sSSL Stripping0sHTTPS (HTTP Secure)0sDigital Certificates0sCertificate Authorities and HTTPS0sEnd-to-End Encryption (E2EE)0sSteganography0sHow Security and Encryption is Really Attacked0s
-
Setting up a Testing Environment Using Virtual Machines (Lab)
-
Operating System Security & Privacy (Windows vs Mac OS X vs Linux)Goals and Learning Objectives0sSecurity Features and Functionality0sSecurity Bugs and Vulnerabilities0sUsage Share0sWindows 10 – Privacy & Tracking0sWindows 10 – Disable tracking automatically0sWindows 10 – Tool : Disable Windows 10 Tracking0sWindows 10 – Cortana0sWindows 10 – Privacy Settings0sWindows 10 – WiFi Sense0sWindows 7, 8 and 8.1 – Privacy & Tracking0sMac – Privacy & Tracking0sLinux and Unix “like” Operating systems0sGeneral Use Operating Systems (Windows, MacOS and Linux)0sGeneral Use Operating Systems With a Security and Privacy Focus (Debian, Arch)0sPure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)0sAnonymity Focused Operating Systems (Tails and Whonix OS)0sPenetration Testing and Ethical Hacking Focused Operating Systems0sMobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)0sLinux – Debian 8 Jessie – Virtual box guest additions Issue0s
-
Security Bugs and VulnerabilitiesGoals and Learning Objectives0sThe Importance of Patching0sWindows 7 – Auto Update0sWindows 8 & 8.1 – Auto Update0sWindows 10 – Auto Update0sWindows – Criticality and Patch Tuesday0sWindows 7, 8, 8.1 & 10 – Automate the pain away from patching0sLinux – Debian – Patching0sMac – Patching0sFirefox – Browser and extension updates0sChrome – Browser and extension updates0sIE and Edge – Browser and extention updates0sAuto updates – The Impact to privacy and anonymity0s
-
Reducing Threat Privilege
-
Social Engineering and Social Media Offence and DefenceGoals and Learning Objectives0sInformation Disclosure and Identity Strategies for Social Media0sIdentify Verification and Registration0sBehavioural Security Controls Against Social Threats (Phishing, Spam) Part 10sBehavioural Security Controls Against Social Threats (Phishing, Spam) Part 20sTechnical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)0s
-
Security Domains
-
Security Through Isolation and CompartmentalizationGoals and Learning Objectives0sIntroduction to Isolation and Compartmentalization0sPhysical and Hardware Isolation – How to change the Mac Address0sPhysical and Hardware Isolation – Hardware Serials0sVirtual Isolation0sDual Boot0sBuilt-in Sandboxes and Application Isolation0sWindows – Sandboxes and Application Isolation0sWindows – Sandboxes and Application Isolation – Sandboxie0sLinux – Sandboxes and Application Isolation0sMac – Sandboxes and Application Isolation0sVirtual Machines0sVirtual Machine Weaknesses0sVirtual Machine Hardening0sWhonix OS – Anonymous Operating system0sWhonix OS – Weaknesses0sQubes OS0sSecurity Domains, Isolation and Compartmentalization0s
-
Wrap Up
-
BONUS Section
Learn a practical skill-set in defeating all online threats, including – advanced hackers, trackers, malware, zero days, exploit kits, cybercriminals and more.
Become a Cyber Security Specialist – Go from a beginner to advanced in this easy to follow expert course.
Covering all major platforms – Windows 7, Windows 8, Windows 10, MacOS and Linux.
This course covers the fundamental building blocks of your required skill set – You will understand the threat and vulnerability landscape through threat modeling and risk assessments.
We explore the Darknet and mindset of the cyber criminal. Covering malware, exploit kits, phishing, zero-day vulnerabilities and much more.
You will learn about the global tracking and hacking infrastructures that nation states run. Covering the NSA, FBI, CIA, GCHQ, China’s MSS and other intelligence agencies capabilities.
You will understand the foundations of operating system security and privacy functionality. A close look at the new Windows 10 privacy issues and how to best mitigate them.
There is a complete easy to follow crash course on encryption, how encryption can be bypassed and what you can do to mitigate the risks.
Master defenses against phishing, SMShing, vishing, identity theft, scam, cons and other social engineering threats.
Finally we cover the extremely important, but underused security control of isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS.
This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.
What's included
- 12 hours on-demand video
- 1 article
- 1 downloadable resource
- Access on mobile and TV
- Certificate of completion