Setup Menus in Admin Panel

  • LOGIN
  • No products in the cart.

Course Name: The Complete Cyber Security Course Hacking Exposed

Descriptions

Course Curriculum

Section 1: Introduction
Welcome and Introduction to the Instructor 00:00:00
Goals and Learning Objectives – Volume 1 00:00:00
Target Audience 00:00:00
Study Recommendations 00:00:00
Course updates 00:00:00
Section 2: know Yourself - The Threat and Vulnerability Landscape
Goals and Learning Objectives 00:00:00
Protect What You Value 00:00:00
What is Privacy Anonymity and Pseudonymity 00:00:00
Security Vulnerabilities Threats and Adversaries 00:00:00
Threat Modeling and Risk Assessments 00:00:00
Security vs Privacy vs Anonymity – Can we have it all 00:00:00
Defense In Depth 00:00:00
The Zero Trust Model 00:00:00
Section 3: Know Your Enemy - The Current Threat and Vulnerability Landscape
Goals and Learning Objectives 00:00:00
Why You Need Security The Value Of A Hack 00:00:00
The Top 3 Things You Need To Stay Safe Online 00:00:00
Security Bugs and Vulnerabilities – The Vulnerability Landscape 00:00:00
Hackers crackers and cyber criminals 00:00:00
Malware viruses rootkits and RATs 00:00:00
Spyware Adware Scareware PUPs Browser hijacking 00:00:00
What is Phishing Vishing and SMShing 00:00:00
Spamming Doxing 00:00:00
Social engineering – Scams cons tricks and fraud 00:00:00
Darknets Dark Markets and Exploit kits 00:00:00
Governments spies and secret stuff part I 00:00:00
Governments spies and secret stuff part II 00:00:00
Regulating encryption mandating insecurity legalizing spying 00:00:00
Trust Backdoors 00:00:00
Censorship 00:00:00
Security News and Alerts Stay Informed 00:00:00
Section 4: Encryption Crash Course
Goals and Learning Objectives 00:00:00
Symmetric Encryption 00:00:00
Asymmetric Encryption 00:00:00
Hash Functions 00:00:00
Digital Signatures 00:00:00
Secure Sockets Layer SSL and Transport layer security TLS 00:00:00
SSL Stripping 00:00:00
HTTPS HTTP Secure 00:00:00
Digital Certificates 00:00:00
Certificate Authorities and HTTPS 00:00:00
End-to-End Encryption E2EE 00:00:00
Steganography 00:00:00
How Security and Encryption is Really Attacked 00:00:00
Section 5: Setting up a Testing Environment Using Virtual Machines
Goals and Learning Objectives 00:00:00
Introduction to Setting up a Testing Environment Using Virtual Machines 00:00:00
Vmware 00:00:00
Virtual box 00:00:00
Kali Linux 2016 00:00:00
Section 6: Operating System Security Privacy Windows vs Mac OS X vs Linux
Goals and Learning Objectives 00:00:00
Security Features and Functionality 00:00:00
Security Bugs and Vulnerabilities 00:00:00
Usage Share 00:00:00
Windows 10 – Privacy Tracking 00:00:00
Windows 10 – Disable tracking Automatically 00:00:00
Windows 10 – Tool Disable Windows 10 Tracking 00:00:00
Windows 10 Cortana 00:00:00
Windows 10 Privacy Settings 00:00:00
Windows 10 – WiFi Sense 00:00:00
Windows 7, 8 and 8.1 – Privacy Tracking 00:00:00
Mac OS X – Privacy Tracking 00:00:00
Linux and Unix like Operating systems 00:00:00
Linux – Debian 00:00:00
Linux – Debian 8 Jessie – Virtual box guest additions Issue 00:00:00
Linux – OpenBSD and Archlinux 00:00:00
Linux – Ubuntu 00:00:00
Section 7: Security Bugs and Vulnerabilities
Goals and Learning Objectives 00:00:00
The Importance of Patching 00:00:00
Windows 7 – Auto Update 00:00:00
Windows 8 , 8.1 – Auto Update 00:00:00
Windows 10 – Auto Update 00:00:00
Windows – Criticality and Patch Tuesday 00:00:00
Windows 7, 8, 8.1, 10 – Automate the pain away from patching 00:00:00
Linux – Debian – Patching 00:00:00
Mac OS X – Patching 00:00:00
Firefox – Browser and extension updates 00:00:00
Chrome – Browser and extension updates 00:00:00
IE and Edge – Browser and extention updates 00:00:00
Auto updates – The Impact to privacy and anonymity 00:00:00
Section 8: Reducing Threat Privilege
Goals and Learning Objectives Removing Privilege 00:00:00
Windows 7 – Not using admin 00:00:00
Windows 8 and 8.1 – Not using admin 00:00:00
Windows 10 – Not using admin 00:00:00
Section 9: Social Engineering and Social Media Offence and Defence
Goals and Learning Objectives 00:00:00
Information Disclosure and Identity Strategies for Social Media 00:00:00
Identify Verification and Registration 00:00:00
Behavioural Security Controls Against Social Threats Phishing Spam Part 1 00:00:00
Behavioural Security Controls Against Social Threats Phishing Spam Part 2 00:00:00
Technical Security Controls Against Social Threats Phishing Spam Scam Cons 00:00:00
Section 10: Security Domains
Goals and Learning Objectives 00:00:00
Security Domains 00:00:00
Section 11: Security Through Isolation and Compartmentalization
Goals and Learning Objectives 00:00:00
Introduction to Isolation and Compartmentalization 00:00:00
Physical and Hardware Isolation – How to change the Mac Address 00:00:00
Physical and Hardware Isolation – Hardware Serials 00:00:00
Virtual Isolation 00:00:00
Dual Boot 00:00:00
Built-in Sandboxes and Application Isolation 00:00:00
Windows – Sandboxes and Application Isolation 00:00:00
Windows – Sandboxes and Application Isolation – Sandboxie 00:00:00
Linux – Sandboxes and Application Isolation 00:00:00
Mac OS X – Sandboxes and Application Isolation 00:00:00
Virtual Machines 00:00:00
Virtual Machine Weaknesses 00:00:00
Virtual Machine Hardening 00:00:00
Whonix OS – Anonymous Operating system 00:00:00
Whonix OS – Weaknesses 00:00:00
Qubes OS 00:00:00
Security Domains Isolation and Compartmentalization 00:00:00
Section 12: BONUS - Whats next... Volume 2 3 and 4
BONUS – Important Information 00:00:00
Congratulations 00:00:00
BONUS Lecture from Volume 1 – Router Vulnerability Scanning Shodan Qualys 00:00:00
BONUS Lecture from Volume 2 – Password cracking part 2 00:00:00
BONUS Lecture from Volume 3 – Bypassing firewalls and HTTP proxies part 3 00:00:00
BONUS Lecture from Volume 4 – Email clients protocols and authentication 00:00:00
Online Learning Thailand.
X