The Absolute Beginners Guide to Cyber Security – Part 2
Welcome to the Course
Welcome to the Course
Networking 101
Section Preview
Meet Julian Assange
MAC Addresses vs IP Addresses
Hubs Switches and Routers
Ethernet 101
HTTP, HTTPS, SSL and TLS
The Internet Protocol Suite
The DNS System
The internet privacy and survival of the paranoid
Section Preview
Privacy Anonnymity Pseudonymity
Identity Strategies
How We Are Tracked Online
FaceBook vs Cambridge Analytica Scandal
Exercise – How much data does Facebook have on me
5 Places You are Being Tracked
Browsing Incognito
Introduction to DuckDuckGo
Introduction to Brave Browser
How to Delete Your Online Accounts
How to Disappear Online
Introduction to Stylometry
Anonymizers, Proxies, Virtual Private Networks & Tor
Section Preview
Anonymizer
Introduction to Proxy Servers
Introduction to Virtual Private Networks
Types of VPNs
NordVPN
VPN Myths Debunked
Using Tor
Tor Weaknesses
Attacking Tor
The Dark Web
The Darknet
Combining VPN and Tor
Meet Eldo Kim
Malware, Viruses, Rootkits, Ransomware & Attacks
Section Preview
Introduction to Malware
Viruses and Worms
How an Antivirus Works
Choosing an Antivirus Software
Rootkits
Securing the Windows 10 Boot Process
Using GMER – Rootkit Scanner
Ransomware
Using the builtin Antiramsomware Tool
Using the CCleaner Software
Using Bleachbit
Malwarebytes
Backups, Storage, The Cloud and Encryption
Section Preview
How to Backup Windows 10
Introduction to Cloud Computing
Encryption and Decryption
Encryption with Veracrypt
Encryption with Bitlocker
MAC Encryption with Filevault
Self Encrypting Drives
Encryption Attacks and Mitigations
Social engineering - Scams, cons, tricks and fraud
Section Preview
Introduction to Social Engineering
Reconnaissance
Anatomy of a Social Engineering Attack
The Way Back Machine
Meet Kevin Mitnick
The World of Electronic Mails - Dangers, Attacks & Protection
Section Preview
Email Basics, Ports and Protocols
How to Track Sent Emails
How to Detect Email Tracking
Using Guerrilla Mail
Using Proton Mail
Phishing Attacks
Windows 10 Hardening, Privacy & Security
Section Preview
Patching and Updates
Turning off ad tracker
Restricting Cortana
Turning off Location Tracking
Turning off Peer Updates
The Windows 10 Firewall
The Windows 10 Smart Screen Filter
Randomizing the MAC Address
Conclusion
Final Exam
Conclusion
Previous Lesson
Next Lesson
Section Preview
The Absolute Beginners Guide to Cyber Security – Part 2
Section Preview
Previous Lesson
Back to Course
Next Lesson