The Complete Cyber Security Course : Hackers Exposed!
- Description
- Curriculum
- FAQ
- Reviews
Learn a practical skill-set in defeating all online
threats, including – advanced hackers,
trackers, malware, zero days, exploit kits, cybercriminals and more.
Become a Cyber Security Specialist – Go from a beginner to advanced in this easy to
follow expert course.
Covering all major platforms – Windows 7, Windows
8, Windows 10, MacOS and Linux.
This course covers the fundamental building blocks of your
required skill set – You will understand the threat and vulnerability landscape
through threat modeling and risk assessments.
We explore the Darknet and mindset of the cyber
criminal. Covering malware, exploit kits, phishing, zero-day
vulnerabilities and much more.
You will learn about the global tracking and
hacking infrastructures that nation states run. Covering the NSA, FBI, CIA,
GCHQ, China’s MSS and other intelligence agencies capabilities.
You will understand the foundations of operating
system security and privacy functionality. A close look at the new Windows
10 privacy issues and how to best mitigate them.
There is a complete easy to follow crash course on
encryption, how encryption can be bypassed and what you can do to mitigate
the risks.
Master defenses against phishing, SMShing, vishing,
identity theft, scam, cons and other social engineering threats.
Finally we cover the extremely important, but underused
security control of isolation and compartmentalization. Covering sandboxes,
application isolation, virtual machines, Whonix and Qubes OS.
This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.
-
1Welcome and Introduction to the Instructor!Video lesson
-
2Security Quick Win!Video lesson
-
3Goals and Learning Objectives - Volume 1Video lesson
-
4Target AudienceVideo lesson
-
5Study RecommendationsVideo lesson
-
6Course updatesVideo lesson
-
7Cyber Security and Ethical Hacking CareersVideo lesson
How to start a career in cyber security and ethical hacking.
-
8Theory and PracticalVideo lesson
-
9Goals and Learning ObjectivesVideo lesson
-
10Protect What You ValueVideo lesson
-
11What is Privacy, Anonymity and PseudonymityVideo lesson
-
12Security, Vulnerabilities, Threats and AdversariesVideo lesson
-
13Asset SelectionVideo lesson
-
14Threat Modeling and Risk AssessmentsVideo lesson
-
15Security vs Privacy vs Anonymity - Can we have it all?Video lesson
-
16Confidentiality, Integrity and Availability - (Security Attributes)Video lesson
-
17Defense In DepthVideo lesson
-
18The Zero Trust ModelVideo lesson
-
19Goals and Learning ObjectivesVideo lesson
-
20Why You Need Security – The Value Of A HackVideo lesson
-
21The Top 3 Things You Need To Stay Safe OnlineVideo lesson
-
22Security Bugs and Vulnerabilities - The Vulnerability LandscapeVideo lesson
-
23Hackers, crackers and cyber criminalsVideo lesson
-
24Malware, viruses, rootkits and RATsVideo lesson
-
25Spyware, Adware, Scareware, PUPs & Browser hijackingVideo lesson
-
26What is Phishing, Vishing and SMShingVideo lesson
-
27Spamming & DoxingVideo lesson
-
28Social engineering - Scams, cons, tricks and fraudVideo lesson
-
29CPU Hijackers - Crypto Mining Malware and CryptojackersVideo lesson
-
30Darknets, Dark Markets and Exploit kitsVideo lesson
-
31Governments, spies and secret stuff part IVideo lesson
-
32Governments, spies and secret stuff part IIVideo lesson
-
33Regulating encryption, mandating insecurity & legalizing spyingVideo lesson
-
34Trust & BackdoorsVideo lesson
-
35CensorshipVideo lesson
-
36Cyber Threat Intelligence – Stay InformedVideo lesson
-
37Goals and Learning ObjectivesVideo lesson
-
38Symmetric EncryptionVideo lesson
-
39Asymmetric EncryptionVideo lesson
-
40Hash FunctionsVideo lesson
-
41Digital SignaturesVideo lesson
-
42Secure Sockets Layer (SSL) and Transport layer security (TLS)Video lesson
-
43SSL StrippingVideo lesson
-
44HTTPS (HTTP Secure)Video lesson
-
45Digital CertificatesVideo lesson
-
46Certificate Authorities and HTTPSVideo lesson
-
47End-to-End Encryption (E2EE)Video lesson
-
48SteganographyVideo lesson
-
49How Security and Encryption is Really AttackedVideo lesson
-
55Goals and Learning ObjectivesVideo lesson
-
56Security Features and FunctionalityVideo lesson
-
57Security Bugs and VulnerabilitiesVideo lesson
-
58Usage ShareVideo lesson
-
59Windows 10 - Privacy & TrackingVideo lesson
-
60Windows 10 - Disable tracking automaticallyVideo lesson
-
61Windows 10 - Tool : Disable Windows 10 TrackingVideo lesson
-
62Windows 10 – CortanaVideo lesson
-
63Windows 10 – Privacy SettingsVideo lesson
-
64Windows 10 - WiFi SenseVideo lesson
-
65Windows 7, 8 and 8.1 - Privacy & TrackingVideo lesson
-
66Mac - Privacy & TrackingVideo lesson
-
67Linux and Unix “like” Operating systemsVideo lesson
-
68General Use Operating Systems (Windows, MacOS and Linux)Video lesson
-
69General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)Video lesson
-
70Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)Video lesson
-
71Anonymity Focused Operating Systems (Tails and Whonix OS)Video lesson
-
72Penetration Testing and Ethical Hacking Focused Operating SystemsVideo lesson
-
73Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)Video lesson
-
74Linux - Debian 8 Jessie - Virtual box guest additions IssueVideo lesson
-
75Goals and Learning ObjectivesVideo lesson
-
76The Importance of PatchingVideo lesson
-
77Windows 7 - Auto UpdateVideo lesson
-
78Windows 8 & 8.1 - Auto UpdateVideo lesson
-
79Windows 10 - Auto UpdateVideo lesson
-
80Windows - Criticality and Patch TuesdayVideo lesson
-
81Windows 7, 8, 8.1 & 10 - Automate the pain away from patchingVideo lesson
-
82Linux - Debian - PatchingVideo lesson
-
83Mac - PatchingVideo lesson
-
84Firefox - Browser and extension updatesVideo lesson
-
85Chrome - Browser and extension updatesVideo lesson
-
86IE and Edge - Browser and extention updatesVideo lesson
-
87Auto updates - The Impact to privacy and anonymityVideo lesson
