The Complete Cyber Security Course : Hackers Exposed!

 Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC
 
 

What you'll learn

  • An advanced practical skillset in defeating all online threats - advanced hackers, trackers, malware and all Internet nastiness including mitigating government spying and mass surveillance
  • Become a cyber security specialist
  • The very latest up-to-date information and methods.
  • We cover operating system security, privacy, and patching - On Windows 7, Windows 8, Windows 10, Mac OS and Linux
  • Explore the threat landscape - Darknets, dark markets, zero day vulnerabilities, exploit kits, malware, phishing and much more
  • You will master encryption in an easy to follow crash course.
  • You will learn about nation state secret tracking and hacking infrastructure.
  • A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.

Course Content

  • Security Quick Win
  • Target Audinece
  • Study Recommendation

  • Theory and Practical
  • Goals and Learning Objectives
  • Protect What You Value
  • What is Privacy, Anonymity and Pseudonymity
  • Security, Vulnerabilities, Threats and Adversaries
  • Asset Selection
  • Threat Modeling and Risk Assessments
  • Security vs Privacy vs Anonymity - Can we have it all?
  • Confidentiality, Integrity and Availability - (Security Attributes)
  • Defense In Depth
  • The Zero Trust Model

  • Goals and Learning Objectives
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hash Functions
  • Digital Signatures
  • SSL Stripping
  • HTTPS (HTTP Secure)
  • Digital Certificates
  • Certificate Authorities and HTTPS
  • End-to-End Encryption (E2EE)
  • Steganography
  • How Security and Encryption is Really Attacked

  • Goals and Learning Objectives
  • Introduction to Setting up a Testing Environment Using Virtual Machines
  • Vmware
  • Virtual box
  • Kali Linux 2018

  • Goals and Learning Objectives
  • Security Features and Functionality
  • Security Bugs and Vulnerabilities
  • Usage Share
  • Windows 10 - Privacy & Tracking
  • Windows 10 - Disable tracking automatically
  • Windows 10 - Tool : Disable Windows 10 Tracking
  • Windows 10 – Cortana
  • Windows 10 – Privacy Settings
  • Windows 10 - WiFi Sense
  • Windows 7, 8 and 8.1 - Privacy & Tracking
  • Mac - Privacy & Tracking
  • Linux and Unix “like” Operating systems
  • General Use Operating Systems (Windows, MacOS and Linux)
  • General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)
  • Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)
  • Anonymity Focused Operating Systems (Tails and Whonix OS)
  • Penetration Testing and Ethical Hacking Focused Operating Systems
  • Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)
  • Linux - Debian 8 Jessie - Virtual box guest additions Issue

  • Goals and Learning Objectives
  • The Importance of Patching
  • Windows 7 - Auto Update
  • Windows 8 & 8.1 - Auto Update
  • Windows 10 - Auto Update
  • Windows - Criticality and Patch Tuesday
  • Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
  • Linux - Debian - Patching
  • Mac - Patching
  • Firefox - Browser and extension updates
  • Chrome - Browser and extension updates
  • IE and Edge - Browser and extention updates
  • Auto updates - The Impact to privacy and anonymity

  • Goals and Learning Objectives
  • Goals and Learning Objectives - Removing Privilege
  • Windows 7 - Not using admin
  • Windows 8 and 8.1 - Not using admin
  • Windows 10 - Not using admin

  • Information Disclosure and Identity Strategies for Social Media
  • Identify Verification and Registration
  • Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1
  • Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2
  • Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)

Requirement

  • A Computer that has admin privileges
  • Have 10GB of free space on your hard drive.
  • Although you can build iOS apps on a Windows computer with Flutter, if you want to test it, you will need a Mac.
  • All software we'll be using is free to download and install.