The Complete Cyber Security Course : Hackers Exposed!
Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC
What you'll learn
- An advanced practical skillset in defeating all online threats - advanced hackers, trackers, malware and all Internet nastiness including mitigating government spying and mass surveillance
- Become a cyber security specialist
- The very latest up-to-date information and methods.
- We cover operating system security, privacy, and patching - On Windows 7, Windows 8, Windows 10, Mac OS and Linux
- Explore the threat landscape - Darknets, dark markets, zero day vulnerabilities, exploit kits, malware, phishing and much more
- You will master encryption in an easy to follow crash course.
- You will learn about nation state secret tracking and hacking infrastructure.
- A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate.
Course Content
Introduction
- Security Quick Win
- Target Audinece
- Study Recommendation
Threat Vulnarability Landscape
- Theory and Practical
- Goals and Learning Objectives
- Protect What You Value
- What is Privacy, Anonymity and Pseudonymity
- Security, Vulnerabilities, Threats and Adversaries
- Asset Selection
- Threat Modeling and Risk Assessments
- Security vs Privacy vs Anonymity - Can we have it all?
- Confidentiality, Integrity and Availability - (Security Attributes)
- Defense In Depth
- The Zero Trust Model
Encryption Crash Course
- Goals and Learning Objectives
- Symmetric Encryption
- Asymmetric Encryption
- Hash Functions
- Digital Signatures
- SSL Stripping
- HTTPS (HTTP Secure)
- Digital Certificates
- Certificate Authorities and HTTPS
- End-to-End Encryption (E2EE)
- Steganography
- How Security and Encryption is Really Attacked
Setting up Testing Enviroment Using Virtual Machine
- Goals and Learning Objectives
- Introduction to Setting up a Testing Environment Using Virtual Machines
- Vmware
- Virtual box
- Kali Linux 2018
Operating System Security & Privacy
- Goals and Learning Objectives
- Security Features and Functionality
- Security Bugs and Vulnerabilities
- Usage Share
- Windows 10 - Privacy & Tracking
- Windows 10 - Disable tracking automatically
- Windows 10 - Tool : Disable Windows 10 Tracking
- Windows 10 – Cortana
- Windows 10 – Privacy Settings
- Windows 10 - WiFi Sense
- Windows 7, 8 and 8.1 - Privacy & Tracking
- Mac - Privacy & Tracking
- Linux and Unix “like” Operating systems
- General Use Operating Systems (Windows, MacOS and Linux)
- General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)
- Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)
- Anonymity Focused Operating Systems (Tails and Whonix OS)
- Penetration Testing and Ethical Hacking Focused Operating Systems
- Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)
- Linux - Debian 8 Jessie - Virtual box guest additions Issue
Security Bugs and Vulnerability
- Goals and Learning Objectives
- The Importance of Patching
- Windows 7 - Auto Update
- Windows 8 & 8.1 - Auto Update
- Windows 10 - Auto Update
- Windows - Criticality and Patch Tuesday
- Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
- Linux - Debian - Patching
- Mac - Patching
- Firefox - Browser and extension updates
- Chrome - Browser and extension updates
- IE and Edge - Browser and extention updates
- Auto updates - The Impact to privacy and anonymity
Reducing Threat Privilege
- Goals and Learning Objectives
- Goals and Learning Objectives - Removing Privilege
- Windows 7 - Not using admin
- Windows 8 and 8.1 - Not using admin
- Windows 10 - Not using admin
Security Domain
- Information Disclosure and Identity Strategies for Social Media
- Identify Verification and Registration
- Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1
- Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2
- Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)
Requirement
- A Computer that has admin privileges
- Have 10GB of free space on your hard drive.
- Although you can build iOS apps on a Windows computer with Flutter, if you want to test it, you will need a Mac.
- All software we'll be using is free to download and install.