The Complete Cyber Security Course : Hackers Exposed!
Last updated 3/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 8.30 GB | Duration: 12h 5m
Last updated 3/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 8.30 GB | Duration: 12h 5m
Volume 1 : Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC
What you'll learn
An advanced practical skillset in defeating all online threats - advanced hackers, trackers, malware and all Internet nastiness & govenment mass surveillance.
Start a career in cyber security. Become a cyber security specialist.
The very latest up-to-date information and methods.
We cover operating system security, privacy, and patching - On Windows, MacOS and Linux.
Explore the threat landscape - Darknets, dark markets, zero day vulnerabilities, exploit kits, malware, phishing and much more.
You will master encryption in an easy to follow crash course.
Go in-depth into security through physical and virtual isolation and compartmentalization. Covering sandboxes, isolation, virtual machines, Whonix and Qubes OS.
You will learn about nation state secret tracking and hacking infrastructure.
A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed.
Requirements
A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
Please note this is Volume 1 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.
Description
Learn a practical skill-set in defeating all online
threats, including - advanced hackers,
trackers, malware, zero days, exploit kits, cybercriminals and more.
Become a Cyber Security Specialist - Go from a beginner to advanced in this easy to
follow expert course.
Covering all major platforms - Windows 7, Windows
8, Windows 10, MacOS and Linux.
This course covers the fundamental building blocks of your
required skill set - You will understand the threat and vulnerability landscape
through threat modeling and risk assessments.
We explore the Darknet and mindset of the cyber
criminal. Covering malware, exploit kits, phishing, zero-day
vulnerabilities and much more.
You will learn about the global tracking and
hacking infrastructures that nation states run. Covering the NSA, FBI, CIA,
GCHQ, China’s MSS and other intelligence agencies capabilities.
You will understand the foundations of operating
system security and privacy functionality. A close look at the new Windows
10 privacy issues and how to best mitigate them.
There is a complete easy to follow crash course on
encryption, how encryption can be bypassed and what you can do to mitigate
the risks.
Master defenses against phishing, SMShing, vishing,
identity theft, scam, cons and other social engineering threats.
Finally we cover the extremely important, but underused
security control of isolation and compartmentalization. Covering sandboxes,
application isolation, virtual machines, Whonix and Qubes OS.
This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.
Overview
Section 1: Introduction
Lecture 1 Welcome and Introduction to the Instructor!
Lecture 2 Security Quick Win!
Lecture 3 Goals and Learning Objectives - Volume 1
Lecture 4 Target Audience
Lecture 5 Study Recommendations
Lecture 6 Course updates
Lecture 7 Cyber Security and Ethical Hacking Careers
Section 2: know Yourself - The Threat and Vulnerability Landscape
Lecture 8 Theory and Practical
Lecture 9 Goals and Learning Objectives
Lecture 10 Protect What You Value
Lecture 11 What is Privacy, Anonymity and Pseudonymity
Lecture 12 Security, Vulnerabilities, Threats and Adversaries
Lecture 13 Asset Selection
Lecture 14 Threat Modeling and Risk Assessments
Lecture 15 Security vs Privacy vs Anonymity - Can we have it all?
Lecture 16 Confidentiality, Integrity and Availability - (Security Attributes)
Lecture 17 Defense In Depth
Lecture 18 The Zero Trust Model
Section 3: Know Your Enemy - The Current Threat and Vulnerability Landscape
Lecture 19 Goals and Learning Objectives
Lecture 20 Why You Need Security – The Value Of A Hack
Lecture 21 The Top 3 Things You Need To Stay Safe Online
Lecture 22 Security Bugs and Vulnerabilities - The Vulnerability Landscape
Lecture 23 Hackers, crackers and cyber criminals
Lecture 24 Malware, viruses, rootkits and RATs
Lecture 25 Spyware, Adware, Scareware, PUPs & Browser hijacking
Lecture 26 What is Phishing, Vishing and SMShing
Lecture 27 Spamming & Doxing
Lecture 28 Social engineering - Scams, cons, tricks and fraud
Lecture 29 CPU Hijackers - Crypto Mining Malware and Cryptojackers
Lecture 30 Darknets, Dark Markets and Exploit kits
Lecture 31 Governments, spies and secret stuff part I
Lecture 32 Governments, spies and secret stuff part II
Lecture 33 Regulating encryption, mandating insecurity & legalizing spying
Lecture 34 Trust & Backdoors
Lecture 35 Censorship
Lecture 36 Cyber Threat Intelligence – Stay Informed
Section 4: Encryption Crash Course
Lecture 37 Goals and Learning Objectives
Lecture 38 Symmetric Encryption
Lecture 39 Asymmetric Encryption
Lecture 40 Hash Functions
Lecture 41 Digital Signatures
Lecture 42 Secure Sockets Layer (SSL) and Transport layer security (TLS)
Lecture 43 SSL Stripping
Lecture 44 HTTPS (HTTP Secure)
Lecture 45 Digital Certificates
Lecture 46 Certificate Authorities and HTTPS
Lecture 47 End-to-End Encryption (E2EE)
Lecture 48 Steganography
Lecture 49 How Security and Encryption is Really Attacked
Section 5: Setting up a Testing Environment Using Virtual Machines (Lab)
Lecture 50 Goals and Learning Objectives
Lecture 51 Introduction to Setting up a Testing Environment Using Virtual Machines
Lecture 52 Vmware
Lecture 53 Virtual box
Lecture 54 Kali Linux 2018
Section 6: Operating System Security & Privacy (Windows vs Mac OS X vs Linux)
Lecture 55 Goals and Learning Objectives
Lecture 56 Security Features and Functionality
Lecture 57 Security Bugs and Vulnerabilities
Lecture 58 Usage Share
Lecture 59 Windows 10 - Privacy & Tracking
Lecture 60 Windows 10 - Disable tracking automatically
Lecture 61 Windows 10 - Tool : Disable Windows 10 Tracking
Lecture 62 Windows 10 – Cortana
Lecture 63 Windows 10 – Privacy Settings
Lecture 64 Windows 10 - WiFi Sense
Lecture 65 Windows 7, 8 and 8.1 - Privacy & Tracking
Lecture 66 Mac - Privacy & Tracking
Lecture 67 Linux and Unix “like” Operating systems
Lecture 68 General Use Operating Systems (Windows, MacOS and Linux)
Lecture 69 General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)
Lecture 70 Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)
Lecture 71 Anonymity Focused Operating Systems (Tails and Whonix OS)
Lecture 72 Penetration Testing and Ethical Hacking Focused Operating Systems
Lecture 73 Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)
Lecture 74 Linux - Debian 8 Jessie - Virtual box guest additions Issue
Section 7: Security Bugs and Vulnerabilities
Lecture 75 Goals and Learning Objectives
Lecture 76 The Importance of Patching
Lecture 77 Windows 7 - Auto Update
Lecture 78 Windows 8 & 8.1 - Auto Update
Lecture 79 Windows 10 - Auto Update
Lecture 80 Windows - Criticality and Patch Tuesday
Lecture 81 Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
Lecture 82 Linux - Debian - Patching
Lecture 83 Mac - Patching
Lecture 84 Firefox - Browser and extension updates
Lecture 85 Chrome - Browser and extension updates
Lecture 86 IE and Edge - Browser and extention updates
Lecture 87 Auto updates - The Impact to privacy and anonymity
Section 8: Reducing Threat Privilege
Lecture 88 Goals and Learning Objectives - Removing Privilege
Lecture 89 Windows 7 - Not using admin
Lecture 90 Windows 8 and 8.1 - Not using admin
Lecture 91 Windows 10 - Not using admin
Section 9: Social Engineering and Social Media Offence and Defence
Lecture 92 Goals and Learning Objectives
Lecture 93 Information Disclosure and Identity Strategies for Social Media
Lecture 94 Identify Verification and Registration
Lecture 95 Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1
Lecture 96 Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2
Lecture 97 Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)
Section 10: Security Domains
Lecture 98 Goals and Learning Objectives
Lecture 99 Security Domains
Section 11: Security Through Isolation and Compartmentalization
Lecture 100 Goals and Learning Objectives
Lecture 101 Introduction to Isolation and Compartmentalization
Lecture 102 Physical and Hardware Isolation - How to change the Mac Address
Lecture 103 Physical and Hardware Isolation - Hardware Serials
Lecture 104 Virtual Isolation
Lecture 105 Dual Boot
Lecture 106 Built-in Sandboxes and Application Isolation
Lecture 107 Windows - Sandboxes and Application Isolation
Lecture 108 Windows - Sandboxes and Application Isolation - Sandboxie
Lecture 109 Linux - Sandboxes and Application Isolation
Lecture 110 Mac - Sandboxes and Application Isolation
Lecture 111 Virtual Machines
Lecture 112 Virtual Machine Weaknesses
Lecture 113 Virtual Machine Hardening
Lecture 114 Whonix OS - Anonymous Operating system
Lecture 115 Whonix OS - Weaknesses
Lecture 116 Qubes OS
Lecture 117 Security Domains, Isolation and Compartmentalization
Section 12: Wrap Up
Lecture 118 Congratulations
Lecture 119 Certificate Of Completion for CPEs
Lecture 120 Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys)
Lecture 121 Sample from Vol 2 - Password cracking part 2
Lecture 122 Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3
Lecture 123 Sample from Vol 4 - Email clients, protocols and authentication
Section 13: BONUS Section
Lecture 124 BONUS - How to Start a Career in Cyber Security
This course is for anyone who wants to become an expert in security, privacy, and anonymity. This volume covers the required foundation building blocks of that skillset.,For anyone who would love to gain a practical skillset in mitigating the risk from, malware, Trojans, hackers, tracker, cyber criminals and all online threats.,This course is for anyone who wants to keep their precious files, emails, accounts and personal information out of the hands of the bad guys.,For beginners and intermediate Internet users who are interested in security, safety, and privacy.,For those who want privacy and anonymity online from hackers, corporations and governments.,This course is designed for personal and home Internet security, privacy, and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal Internet security, privacy and anonymity.