Autoplay
Autocomplete
Previous Lesson
Complete and Continue
The Absolute Beginners Guide to Cyber Security - Part 2
Networking 101
Section Intro (1:03)
Meet Julian Assange (1:49)
MAC Addresses & IP Addresses (7:36)
Hubs Switches and Routers (5:20)
Ethernet 101 (2:34)
HTTP, HTTPS, SSL and TLS (6:29)
The Internet Protocol Suite (6:47)
The DNS System (6:22)
Section Review & Keypoints
The Internet - Privacy & Survival of the Paranoid
Section Intro (1:22)
What is Privacy, Anonymity and Pseudonymity (4:38)
Identity Strategies (10:37)
How We Are Tracked Online (5:18)
FaceBook vs Cambridge Analytica Scandal (7:45)
Exercise - How muc data does Facebook have on me (3:18)
5 Places You are Being Tracked (4:16)
Browsing Incognito (3:55)
Introduction to DuckDuckGo (6:25)
Introduction to Brave Browser (4:20)
How to Delete Your Online Accounts (4:08)
How to Disappear Online (3:56)
Introduction to Stylometry (6:02)
Section Review & Key Points
Anonymizers, Proxies, Virtual Private Networks & Tor
Section Intro (0:55)
Anonymizer (3:52)
Introduction to Proxy Servers (7:19)
Introduction to Virutal Private Networks (4:52)
Types of VPNs (6:16)
NordVPN (7:46)
VPN Myths Debunked (6:40)
Using Tor (9:57)
Tor Weaknesses (5:03)
Attacking Tor (4:40)
The Dark Web (8:15)
Dark Nets (3:24)
Combining VPN and Tor (5:13)
Meet Eldo Kim (1:52)
Section Review & Keypoints
Malware, Viruses, Rootkits, Ransomware & Attacks
Secdtion Intro (0:46)
Introduction to Malware (4:52)
Choosing an Antivirus Software (8:34)
Rootkits (5:06)
Securing the Windows 10 Boot Process (5:27)
Using GMER - Rootkit Scanner (1:39)
Ransomware (8:00)
Using the builtin Antiramsomware Tool (2:14)
Using the CCleaner Software (7:57)
Using Bleachbit (3:50)
Malwarebytes (6:35)
Section Review & Key Points
Backups, Storage, The Cloud and Encryption
Section Intro (0:54)
How to Backup Windows 10 (4:26)
Introduction to Cloud Computing (9:39)
Encryption and Decryption (4:24)
Encryption with Veracrypt (9:22)
Encryption with Bitlocker (2:06)
MAC Encryption with Filevault (0:57)
Self Encrypting Drives (0:44)
Encryption Attacks and Mitigations (6:02)
How to Password Protect USB Drives & Folders (10:46)
Section Review & Key Points
Social engineering - Scams, cons, tricks and fraud
Section Intro (0:49)
Introduction to Social Engineering (10:30)
Reconnaissance (8:42)
Anatomy of a Social Engineering Attack (8:50)
The Way Back Machine (3:43)
Meet Kevin Mitnick (1:38)
Section Review & Key Points
The World of Electronic Mails - Dangers, Attacks & Protection
Section Intro (1:09)
Email Basics, Ports & Protocols (6:01)
How to Track Sent Emails (3:10)
How to Detect Email Tracking (2:38)
Using Guerrilla Mail (4:38)
Using Proton Mail (4:13)
Phishing Attacks (5:12)
Email Scam (7:32)
Section Review and Key Points
Windows 10 Hardening, Privacy & Security
Section Intro (0:25)
Patching and Updates (4:22)
Turning off ad tracker (2:29)
Restricting Cortana (3:22)
Turning off Location Tracking (3:12)
Turning off Peer Updates (3:43)
The Windows 10 Firewall (2:22)
The Windows 10 Smart Screen Filter (2:39)
Randomizing the MAC Address (2:07)
Conclusion
Conclusion (0:54)
Randomizing the MAC Address
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock