Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    The Complete Cyber Security Course : Hackers Exposed! (Last updated 3/2024)

    Posted By: ELK1nG
    The Complete Cyber Security Course : Hackers Exposed! (Last updated 3/2024)

    The Complete Cyber Security Course : Hackers Exposed!
    Last updated 3/2024
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 8.30 GB | Duration: 12h 5m

    Volume 1 : Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC

    What you'll learn

    An advanced practical skillset in defeating all online threats - advanced hackers, trackers, malware and all Internet nastiness & govenment mass surveillance.

    Start a career in cyber security. Become a cyber security specialist.

    The very latest up-to-date information and methods.

    We cover operating system security, privacy, and patching - On Windows, MacOS and Linux.

    Explore the threat landscape - Darknets, dark markets, zero day vulnerabilities, exploit kits, malware, phishing and much more.

    You will master encryption in an easy to follow crash course.

    Go in-depth into security through physical and virtual isolation and compartmentalization. Covering sandboxes, isolation, virtual machines, Whonix and Qubes OS.

    You will learn about nation state secret tracking and hacking infrastructure.

    A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed.

    Requirements

    A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.

    Please note this is Volume 1 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.

    Description



    Learn a practical skill-set in defeating all online
    threats, including - advanced hackers,
    trackers, malware, zero days, exploit kits, cybercriminals and more.
    Become a Cyber Security Specialist - Go from a beginner to advanced in this easy to
    follow expert course.  
    Covering all major platforms - Windows 7, Windows
    8, Windows 10, MacOS and Linux.
    This course covers the fundamental building blocks of your
    required skill set - You will understand the threat and vulnerability landscape
    through threat modeling and risk assessments.
    We explore the Darknet and mindset of the cyber
    criminal. Covering malware, exploit kits, phishing, zero-day
    vulnerabilities and much more.


    You will learn about the global tracking and
    hacking infrastructures that nation states run. Covering the NSA, FBI, CIA,
    GCHQ, China’s MSS and other intelligence agencies capabilities.

    You will understand the foundations of operating
    system security and privacy functionality. A close look at the new Windows
    10 privacy issues and how to best mitigate them.
    There is a complete easy to follow crash course on
    encryption, how encryption can be bypassed and what you can do to mitigate
    the risks.
    Master defenses against phishing, SMShing, vishing,
    identity theft, scam, cons and other social engineering threats.
    Finally we cover the extremely important, but underused
    security control of isolation and compartmentalization. Covering sandboxes,
    application isolation, virtual machines, Whonix and Qubes OS.
    This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.  

    Overview

    Section 1: Introduction

    Lecture 1 Welcome and Introduction to the Instructor!

    Lecture 2 Security Quick Win!

    Lecture 3 Goals and Learning Objectives - Volume 1

    Lecture 4 Target Audience

    Lecture 5 Study Recommendations

    Lecture 6 Course updates

    Lecture 7 Cyber Security and Ethical Hacking Careers

    Section 2: know Yourself - The Threat and Vulnerability Landscape

    Lecture 8 Theory and Practical

    Lecture 9 Goals and Learning Objectives

    Lecture 10 Protect What You Value

    Lecture 11 What is Privacy, Anonymity and Pseudonymity

    Lecture 12 Security, Vulnerabilities, Threats and Adversaries

    Lecture 13 Asset Selection

    Lecture 14 Threat Modeling and Risk Assessments

    Lecture 15 Security vs Privacy vs Anonymity - Can we have it all?

    Lecture 16 Confidentiality, Integrity and Availability - (Security Attributes)

    Lecture 17 Defense In Depth

    Lecture 18 The Zero Trust Model

    Section 3: Know Your Enemy - The Current Threat and Vulnerability Landscape

    Lecture 19 Goals and Learning Objectives

    Lecture 20 Why You Need Security – The Value Of A Hack

    Lecture 21 The Top 3 Things You Need To Stay Safe Online

    Lecture 22 Security Bugs and Vulnerabilities - The Vulnerability Landscape

    Lecture 23 Hackers, crackers and cyber criminals

    Lecture 24 Malware, viruses, rootkits and RATs

    Lecture 25 Spyware, Adware, Scareware, PUPs & Browser hijacking

    Lecture 26 What is Phishing, Vishing and SMShing

    Lecture 27 Spamming & Doxing

    Lecture 28 Social engineering - Scams, cons, tricks and fraud

    Lecture 29 CPU Hijackers - Crypto Mining Malware and Cryptojackers

    Lecture 30 Darknets, Dark Markets and Exploit kits

    Lecture 31 Governments, spies and secret stuff part I

    Lecture 32 Governments, spies and secret stuff part II

    Lecture 33 Regulating encryption, mandating insecurity & legalizing spying

    Lecture 34 Trust & Backdoors

    Lecture 35 Censorship

    Lecture 36 Cyber Threat Intelligence – Stay Informed

    Section 4: Encryption Crash Course

    Lecture 37 Goals and Learning Objectives

    Lecture 38 Symmetric Encryption

    Lecture 39 Asymmetric Encryption

    Lecture 40 Hash Functions

    Lecture 41 Digital Signatures

    Lecture 42 Secure Sockets Layer (SSL) and Transport layer security (TLS)

    Lecture 43 SSL Stripping

    Lecture 44 HTTPS (HTTP Secure)

    Lecture 45 Digital Certificates

    Lecture 46 Certificate Authorities and HTTPS

    Lecture 47 End-to-End Encryption (E2EE)

    Lecture 48 Steganography

    Lecture 49 How Security and Encryption is Really Attacked

    Section 5: Setting up a Testing Environment Using Virtual Machines (Lab)

    Lecture 50 Goals and Learning Objectives

    Lecture 51 Introduction to Setting up a Testing Environment Using Virtual Machines

    Lecture 52 Vmware

    Lecture 53 Virtual box

    Lecture 54 Kali Linux 2018

    Section 6: Operating System Security & Privacy (Windows vs Mac OS X vs Linux)

    Lecture 55 Goals and Learning Objectives

    Lecture 56 Security Features and Functionality

    Lecture 57 Security Bugs and Vulnerabilities

    Lecture 58 Usage Share

    Lecture 59 Windows 10 - Privacy & Tracking

    Lecture 60 Windows 10 - Disable tracking automatically

    Lecture 61 Windows 10 - Tool : Disable Windows 10 Tracking

    Lecture 62 Windows 10 – Cortana

    Lecture 63 Windows 10 – Privacy Settings

    Lecture 64 Windows 10 - WiFi Sense

    Lecture 65 Windows 7, 8 and 8.1 - Privacy & Tracking

    Lecture 66 Mac - Privacy & Tracking

    Lecture 67 Linux and Unix “like” Operating systems

    Lecture 68 General Use Operating Systems (Windows, MacOS and Linux)

    Lecture 69 General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)

    Lecture 70 Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)

    Lecture 71 Anonymity Focused Operating Systems (Tails and Whonix OS)

    Lecture 72 Penetration Testing and Ethical Hacking Focused Operating Systems

    Lecture 73 Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)

    Lecture 74 Linux - Debian 8 Jessie - Virtual box guest additions Issue

    Section 7: Security Bugs and Vulnerabilities

    Lecture 75 Goals and Learning Objectives

    Lecture 76 The Importance of Patching

    Lecture 77 Windows 7 - Auto Update

    Lecture 78 Windows 8 & 8.1 - Auto Update

    Lecture 79 Windows 10 - Auto Update

    Lecture 80 Windows - Criticality and Patch Tuesday

    Lecture 81 Windows 7, 8, 8.1 & 10 - Automate the pain away from patching

    Lecture 82 Linux - Debian - Patching

    Lecture 83 Mac - Patching

    Lecture 84 Firefox - Browser and extension updates

    Lecture 85 Chrome - Browser and extension updates

    Lecture 86 IE and Edge - Browser and extention updates

    Lecture 87 Auto updates - The Impact to privacy and anonymity

    Section 8: Reducing Threat Privilege

    Lecture 88 Goals and Learning Objectives - Removing Privilege

    Lecture 89 Windows 7 - Not using admin

    Lecture 90 Windows 8 and 8.1 - Not using admin

    Lecture 91 Windows 10 - Not using admin

    Section 9: Social Engineering and Social Media Offence and Defence

    Lecture 92 Goals and Learning Objectives

    Lecture 93 Information Disclosure and Identity Strategies for Social Media

    Lecture 94 Identify Verification and Registration

    Lecture 95 Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1

    Lecture 96 Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2

    Lecture 97 Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)

    Section 10: Security Domains

    Lecture 98 Goals and Learning Objectives

    Lecture 99 Security Domains

    Section 11: Security Through Isolation and Compartmentalization

    Lecture 100 Goals and Learning Objectives

    Lecture 101 Introduction to Isolation and Compartmentalization

    Lecture 102 Physical and Hardware Isolation - How to change the Mac Address

    Lecture 103 Physical and Hardware Isolation - Hardware Serials

    Lecture 104 Virtual Isolation

    Lecture 105 Dual Boot

    Lecture 106 Built-in Sandboxes and Application Isolation

    Lecture 107 Windows - Sandboxes and Application Isolation

    Lecture 108 Windows - Sandboxes and Application Isolation - Sandboxie

    Lecture 109 Linux - Sandboxes and Application Isolation

    Lecture 110 Mac - Sandboxes and Application Isolation

    Lecture 111 Virtual Machines

    Lecture 112 Virtual Machine Weaknesses

    Lecture 113 Virtual Machine Hardening

    Lecture 114 Whonix OS - Anonymous Operating system

    Lecture 115 Whonix OS - Weaknesses

    Lecture 116 Qubes OS

    Lecture 117 Security Domains, Isolation and Compartmentalization

    Section 12: Wrap Up

    Lecture 118 Congratulations

    Lecture 119 Certificate Of Completion for CPEs

    Lecture 120 Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys)

    Lecture 121 Sample from Vol 2 - Password cracking part 2

    Lecture 122 Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3

    Lecture 123 Sample from Vol 4 - Email clients, protocols and authentication

    Section 13: BONUS Section

    Lecture 124 BONUS - How to Start a Career in Cyber Security

    This course is for anyone who wants to become an expert in security, privacy, and anonymity. This volume covers the required foundation building blocks of that skillset.,For anyone who would love to gain a practical skillset in mitigating the risk from, malware, Trojans, hackers, tracker, cyber criminals and all online threats.,This course is for anyone who wants to keep their precious files, emails, accounts and personal information out of the hands of the bad guys.,For beginners and intermediate Internet users who are interested in security, safety, and privacy.,For those who want privacy and anonymity online from hackers, corporations and governments.,This course is designed for personal and home Internet security, privacy, and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal Internet security, privacy and anonymity.