Library

Course: The Complete Cyber Security Course! Volume 1 : Hackers Exposed

The Complete Cyber Security Course! Volume 1 : Hackers Exposed

  • Life Time Access
  • Certificate on Completion
  • Access on Android and iOS App
About this Course

This course covers the fundamental building blocks of your required skillset - You will understand the threat and vulnerability landscape through threat modelling and the risk assessment.

We explore the Darknet and mind-set of the cyber criminal. Covering malware, exploit kits, phishing, zero day vulnerabilities and much more.

You will learn about the global tracking and hacking infrastructures that nation states run. Covering the NSA, FBI, CIA, GCHQ, China’s MSS and other intelligence agencies capabilities.

You will understand the foundations of operating system security and privacy functionality. A close look at the new Windows 10 privacy issues and how to best mitigate them.

There is a complete easy to follow crash course on encryption, how encryption can be bypassed and what you can do to mitigate the risks.

Master defences against phishing, SMShing, vishing, identity theft, scam, cons an other social engineering threats.

Finally we cover the extremely important, but underused security control of isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS.

This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.

Basic knowledge
  • A basic understanding of using operating systems, networks, and the Internet . Be able to download and install software. A willingness to learn.
  • Please note this is Volume 1 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals , government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.
What you will learn
  • An advanced practical skillset in defeating all online threats - advanced hackers, trackers, malware and all Internet nastiness including mitigating government spying and mass surveillance
  • The very latest up-to-date information and methods
  • We cover operating system security, privacy, and patching - On Windows 7, Windows 8, Windows 10, MacOS and Linux
  • Explore the threat landscape - Darknets, dark markets, zero day vulnerabilities, exploit kits, malware, phishing and much more
  • You will master encryption in an easy to follow crash course
  • Go in-depth into security through physical and virtual isolation and compartmentalization Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS
  • You will learn about nation state secret tracking and hacking infrastructure
Curriculum
Lectures quantity: 116
Common duration: 10:58:05
Introduction
  • 1. Welcome and Introduction to the Instructor!  

    Welcome to the course and Introduction to the Instructor.

  • 2. Security Quick Win!  

    How to achieve a quick security win!

  • 3. Goals and Learning Objectives - Volume 1  

    Goals and learning objectives for Volume 1

  • 4. Target Audience  

    Who is the target audience for this course?

  • 5. Study Recommendations  

    Study recommendations

  • 6. The Forum - For Questions, Answers and Other Resources  

    The support forum - for questions, answers and other resources

  • 7. Course Updates  

    Course updates

Know Yourself - The Threat and Vulnerability Landscape
  • 8. Goals and Learning Objectives  

    Goals and learning objectives for Session 2.

  • 9. Protect What You Value  

    Protect What You Value

  • 10. What is Privacy, Anonymity and Pseudonymity  

    What is Privacy, anonymity and pseudonymity?

  • 11. Security, Vulnerabilities, Threats and Adversaries  

    Security, vulnerabilities, threats and adversaries.

  • 12. Threat Modeling and Risk Assessments  

    Threat modeling and risk assessments.

  • 13. Security vs Privacy vs Anonymity - Can we have it all?  

    Security vs privacy vs anonymity and the answer tot he question Can we have it all?

  • 14. Defense In Depth  

    What is defense in depth?

  • 15. The Zero Trust Model  

    In cyber security trust no one.

Know Your Enemy - The Current Threat and Vulnerability Landscape
  • 16. Goals and Learning Objectives  

    Goals and learning objectives for Session 3.

  • 17. Why You Need Security – The Value Of A Hack  

    What is the value of a hacked system?

  • 18. The Top 3 Things You Need To Stay Safe Online  

    Top three things we all need to stay safe online.

  • 19. Security Bugs and Vulnerabilities - The Vulnerability Landscape  

    Security bugs and vulnerabilities make the vulnerability landscape.

  • 20. Hackers, crackers and cyber criminals  

    Hackers, crackers and cyber criminals.

  • 21. Malware, Viruses, Rootkits and RATs  

    Malware, viruses, rootkits and RATs

  • 23. What is Phishing, Vishing and SMShing  

    What is phishing, vishing and SMShing?

  • 24. Spamming & Doxing  

    What is spamming & doxing?

  • 25. Social engineering - Scams, cons, tricks and fraud  

    What is social engineering - scams, cons, tricks and fraud

  • 26. Darknets, Dark Markets and Exploit kits  

    Darknets, dark markets and exploit kits.

  • 27. Governments, Spies and Secret Stuff Part I  

    Governments, spies and secret stuff part I.

  • 28. Governments, Spies and Secret Stuff Part II  

    Governments, spies and secret stuff part II.

  • 29. Regulating encryption, mandating insecurity & legalizing spying  

    Regulating encryption, mandating insecurity & legalizing spying.

  • 30. Trust & Backdoors  

    Trust & backdoors.

  • 31. Censorship  

    Censorship

  • 32. Security News and Alerts – Stay Informed  

    Security news and alerts – how to stay informed.

Encryption Crash Course
  • 33. Goals and Learning Objectives  

    Goals and learning objectives for session 4.

  • 34. Symmetric Encryption  

    What is symmetric encryption?

  • 35. Asymmetric Encryption  

    What is asymmetric encryption?

  • 36. Hash Functions  

    Hash Functions

  • 37. Digital Signatures  

    Digital signatures.

  • 38. Secure Sockets Layer (SSL) and Transport Layer Security (TLS)  

    Secure sockets layer (SSL) and transport layer security (TLS).

  • 39. SSL Stripping  

    SSL stripping.

  • 40. HTTPS (HTTP Secure)  

    HTTPS (HTTP Secure).

  • 41. Digital Certificates  

    Digital certificates.

  • 42. Certificate Authorities and HTTPS  

    Certificate authorities and HTTPS.

  • 43. End-to-End Encryption (E2EE)  

    End-to-End encryption (E2EE).

  • 44. Steganography  

    What is Steganography?

  • 45. How Security and Encryption is Really Attacked  

    How security and encryption is really attacked?

Setting up a Testing Environment Using Virtual Machines
  • 46. Goals and Learning Objectives  

    Goals and learning objectives for session 5.

  • 47. Introduction to Setting up a Testing Environment Using Virtual Machines  

    Introduction to setting up a testing environment using virtual machines.

  • 48. Vmware  

    Vmware

  • 49. Virtual box  

    Virtual box

  • 50. Kali Linux  

    Kali Linux

Operating System Security & Privacy (Windows vs Mac OS X vs Linux)
  • 51. Goals and Learning Objectives  

    Goals and learning objectives for session 6.

  • 52. Security Features and Functionality  

    Security features and functionality of operating systems.

  • 53. Security Bugs and Vulnerabilities  

    Security bugs and vulnerabilities.

  • 54. Usage Share  

    Usage share

  • 55. Windows 10 - Privacy & Tracking  

    Windows 10 - privacy & tracking.

  • 56. Windows 10 - Disable Tracking Automatically  

    Windows 10 - disable tracking automatically.

  • 57. Windows 10 - Tool : Disable Windows 10 Tracking  

    Windows 10 - Disable Windows 10 Tracking tool.

  • 58. Windows 10 – Cortana  

    Windows 10 – Cortana.

  • 59. Windows 10 – Privacy Settings  

    Windows 10 – privacy settings.

  • 60. Windows 10 - WiFi Sense  

    Windows 10 - WiFi Sense.

  • 61. Windows 7, 8 and 8.1 - Privacy & Tracking  

    Windows 7, 8 and 8.1 - privacy & tracking.

  • 62. Mac - Privacy & Tracking  

    Mac - privacy & tracking.

  • 63. Linux and Unix “like” Operating Systems  

    Linux and Unix “like” operating systems

  • 64. Linux - Debian  

    Linux - Debian.

  • 65. Linux - Debian 8 Jessie - Virtual box guest additions Issue  

    Virtual box guest additions issue with Debian 8 Jessie.

  • 66. Linux - OpenBSD and Archlinux  

    Linux - OpenBSD and Archlinux.

  • 67. Linux - Ubuntu  

    Linux - Ubuntu.

Security Bugs and Vulnerabilities
  • 68. Goals and Learning Objectives  

    Goals and learning objectives for session 7.

  • 69. The Importance of Patching  

    The importance of patching.

  • 70. Windows 7 - Auto Update  

    Windows 7 - Auto Update.

  • 71. Windows 8 & 8.1 - Auto Update  

    Windows 8 & 8.1 - Auto Update.

  • 72. Windows 10 - Auto Update  

    Windows 10 - Auto Update.

  • 73. Windows - Criticality and Patch Tuesday  

    Windows - Criticality and Patch Tuesday.

  • 74. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching  

    Windows 7, 8, 8.1 & 10 - How to automate the pain away from patching.

  • 75. Linux - Debian - Patching  

    Linux Debian - Patching.

  • 76. Mac - Patching  

    Mac - Patching.

  • 77. Firefox - Browser and Extension Updates  

    Firefox - Browser and extension updates.

  • 78. Chrome - Browser and Extension Updates  

    Chrome - Browser and extension updates.

  • 79. IE and Edge - Browser and Extension Updates  

    IE and Edge - Browser and extension updates.

  • 80. Auto updates - The Impact to Privacy and Anonymity  

    The impact of auto updates on privacy and anonymity.

Reducing Threat Privilege
  • 81. Goals and Learning Objectives + Removing Privilege  

    Goals and learning objectives for session 8 + Removing privilege.

  • 82. Windows 7 - Not using admin  

    Windows 7 - Not using admin.

  • 83. Windows 8 and 8.1 - Not using admin  

    Windows 8 and 8.1 - Not using admin.

  • 84. Windows 10 - Not using admin  

    Windows 10 - Not using admin.

Social Engineering and Social Media Offence and Defence
  • 85. Goals and Learning Objectives  

    Goals and learning objectives for session 9.

  • 86. Information Disclosure and Identity Strategies for Social Media  

    Information disclosure and identity strategies for social media.

  • 87. Identify Verification and Registration  

    Identify verification and registration.

  • 88. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1  

    Behavioural security controls against social threats (phishing, spam) - Part 1

  • 89. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2  

    Behavioural security controls against social threats (phishing, spam) - Part 2

  • 90. Technical Security Controls Against Social Threats  

    Technical security controls against social threats (phishing, spam, scam & cons).

Security Domains
  • 91. Goals and Learning Objectives  

    Goals and learning objectives for session 10.

  • 92. Security Domains  

    Security domains.

Security Through Isolation and Compartmentalization
  • 93. Goals and Learning Objectives  

    Goals and learning objectives for session 11.

  • 94. Introduction to Isolation and Compartmentalization  

    Introduction to isolation and compartmentalization.

  • 95. Physical and Hardware Isolation - How to change the Mac Address  

    Physical and hardware isolation - how to change the Mac address?

  • 96. Physical and Hardware Isolation - Hardware Serials  

    Physical and hardware isolation - hardware serials.

  • 97. Virtual Isolation  

    Virtual isolation.

  • 98. Dual Boot  

    Dual boot.

  • 99. Built-in Sandboxes and Application Isolation  

    Built-in sandboxes and application isolation.

  • 100. Windows - Sandboxes and Application Isolation  

    Windows - Sandboxes and application isolation.

  • 101. Windows - Sandboxes and Application Isolation - Sandboxie  

    Windows - Sandboxes and application isolation - Sandboxie.

  • 102. Linux - Sandboxes and Application Isolation  

    Linux - Sandboxes and application isolation.

  • 103. Mac - Sandboxes and Application Isolation  

    Mac - Sandboxes and application isolation.

  • 104. Virtual Machines  

    Virtual machines.

  • 105. Virtual Machine Weaknesses  

    Virtual machine weaknesses.

  • 106. Virtual Machine Hardening  

    Virtual machine hardening.

  • 107. Whonix OS - Anonymous Operating System  

    Whonix OS - Anonymous operating system.

  • 108. Whonix OS - Weaknesses  

    Whonix OS - Weaknesses.

  • 109. Qubes OS  

    Qubes OS.

  • 110. Security Domains, Isolation and Compartmentalization  

    Security domains, isolation and compartmentalization.

BONUS - What's next?... Volume 2, 3 and 4
  • 111. Important Information  

    Important information.

  • 112. Congratulations  

    Congratulations on completing the course.

  • 113. Certificate of Completion for CPEs  

    How to get your Certificate of Completion for CPEs

  • 114. BONUS Lecture from Volume 2 - Router Vulnerability Scanning  

    BONUS lecture from Volume 2 - Router Vulnerability scanning (Shodan, Qualys)

  • 115. BONUS Lecture from Volume 2 - Password Cracking Part 2  

    BONUS lecture from Volume 2 - Password cracking part 2.

  • 116. BONUS Lecture from Volume 3 - Bypassing Firewalls and HTTP Proxies Part 3  

    BONUS lecture from Volume 3 - Bypassing firewalls and HTTP proxies Part 3.

  • 117. BONUS Lecture from Volume 4 - Email Clients, Protocols and Authentication  

    BONUS lecture from Volume 4 - Email clients, protocols and authentication.

Reviews (0)