Companies Home Search Profile

The Absolute Beginners Guide to Cyber Security - Part 2

Focused View

Alexander Oni

6:33:04

42 View
  • 001 Welcome to the Course.mp4
    05:15
  • 002 Connect with Me.mp4
    03:46
  • 003 Absolute-Beginners-Guide-to-Cyber-Security-Part-2.pdf
  • 003 Download the PDF Guide Book.html
  • 001 Section Preview.mp4
    01:03
  • 002 MAC Addresses and IP Addresses.mp4
    07:36
  • 003 Hubs, Switches and Routers.mp4
    05:20
  • 004 Ethernet 101.mp4
    02:34
  • 005 HTTP, HTTPS, SSL & TLS.mp4
    06:30
  • 006 The Internet Protocol Suite - TCPIP.mp4
    06:47
  • 007 Understanding the DNS System.mp4
    06:22
  • 008 Section Review and Key Points.html
  • 001 Section Preview.mp4
    01:22
  • 002 What is Privacy, Anonymity and Pseudonymity.mp4
    04:38
  • 003 Identity Strategies.mp4
    10:37
  • 004 How We are Tracked Online.mp4
    05:17
  • 005 The FaceBook Data Mining Scandal.mp4
    07:45
  • 006 5 Places You are Tracked Online.mp4
    04:16
  • 007 Cookies.html
  • 008 Browsing in Icognito Mode - The Shocking Truth !!!.mp4
    03:55
  • 009 The Brave Browser.mp4
    04:20
  • 010 How to Disappear Online.mp4
    03:56
  • 011 Introduction to Stylometry.mp4
    06:02
  • 012 Section Review and Key Points.html
  • external-links.txt
  • 001 Section Preview.mp4
    00:56
  • 002 Annonymizer.mp4
    03:52
  • 003 Introduction to Proxy Servers.mp4
    07:19
  • 004 Introduction to VPNs.mp4
    04:52
  • 005 Types of VPNs.mp4
    06:16
  • 006 NordVPN.mp4
    07:46
  • 007 VPN Myths Debunked.mp4
    06:40
  • 008 Introduction to Tor.mp4
    09:57
  • 009 Tor Weaknesses.mp4
    05:03
  • 010 Attacking Tor - The end to end Correlation Hack.mp4
    04:40
  • 011 Accessing the Dark Web with Tor.mp4
    08:15
  • 012 Darknets.mp4
    03:25
  • 013 VPN + Tor.mp4
    05:14
  • 014 Meet Eldo Kim.mp4
    01:52
  • 015 Section Review and Key Points.html
  • external-links.txt
  • 001 Section Preview.mp4
    00:47
  • 002 Introduction to Malware.mp4
    04:52
  • 003 Viruses & Worms.mp4
    04:51
  • 004 Antivirus.mp4
    04:34
  • 005 Choosing the Right Antivirus Software.mp4
    08:35
  • 006 Rootkits.mp4
    05:06
  • 007 Securing the Windows 10 Boot Process.mp4
    05:28
  • 008 Using GMER - Rootkit Scanner.mp4
    01:39
  • 009 Ransomware - Cryptolocker, WannaCry, Bad Rabbit.mp4
    08:00
  • 010 Using the inbuilt AntiRansomware Tool.mp4
    02:14
  • 011 CC Cleaner.mp4
    07:57
  • 012 Bleachit.mp4
    03:50
  • 013 Malwarebytes.mp4
    06:35
  • 014 Section Review and Key Points.html
  • external-links.txt
  • 001 Section Preview.mp4
    00:54
  • 002 How to Backup Your Computer.mp4
    04:26
  • 003 What is the Cloud.mp4
    09:39
  • 004 Disk Encyrption.mp4
    04:24
  • 005 Encrypting with Veracrypt.mp4
    09:22
  • 006 Encrypting Windows 10 with Bitlocker.mp4
    02:06
  • 007 Encrypting Mac OS with FileVault.mp4
    00:57
  • 008 Self Encrypting Drives.mp4
    00:44
  • 009 Attacks Against Encryption.mp4
    06:09
  • 010 How to Password Protect USB Drives, Files & Folders.mp4
    10:46
  • 011 Section Review and Key Points.html
  • external-links.txt
  • 001 Section Preview.mp4
    00:50
  • 002 What is Social Engineering.mp4
    10:30
  • 003 Reconnaissance Methods.mp4
    08:42
  • 004 Anatomy of a Social Engineering Attack.mp4
    08:50
  • 005 The Way Back Machine.mp4
    03:43
  • 006 Meet Kevin Mitnick.mp4
    01:38
  • 007 Section Review and Key Points.html
  • external-links.txt
  • 001 Section Preview.mp4
    01:09
  • 002 Email Basics, Protocols & Ports.mp4
    06:01
  • 003 How to Track Sent Emails.mp4
    03:10
  • 004 How to Detect Email Tracking.mp4
    02:38
  • 005 Guerrilla Mail.mp4
    04:38
  • 006 Introducing Proton Email.mp4
    04:13
  • 007 Review Update.mp4
    02:42
  • 008 Phishing Attacks.mp4
    05:12
  • 009 Scam Email Live Example.mp4
    07:32
  • 010 Section Review and Key Points.html
  • 001 Section Preview.mp4
    00:39
  • 002 Patching and Updates.mp4
    04:22
  • 003 Windows 10 Privacy - Turning off Ad Tracking.mp4
    02:29
  • 004 Windows 10 Privacy - Restricting Cortana.mp4
    03:22
  • 005 Windows 10 Privacy - Turning off Location Tracking.mp4
    03:12
  • 006 Windows 10 Privacy - Turning off Peer Updates.mp4
    03:43
  • 007 Windows 10 Hardening - The Windows 10 Firewall.mp4
    02:22
  • 008 Windows 10 Hardening - Enabling the Smart Screen Filter.mp4
    02:39
  • 009 Windows 10 Hardening - Randomizing the MAC Address.mp4
    02:07
  • 001 Exam Preview.mp4
    00:38
  • 002 Other Cyber Security Courses.mp4
    04:46
  • 003 Getting your Certificate.mp4
    03:00
  • 004 Conclusion.mp4
    00:54
  • Description


    Learn about Networking, Malware, Encryption, VPNs, Privacy, Email Security, Social Engineering, Backups and so much more

    What You'll Learn?


    • Take up entry roles for IT and Cyber security jobs
    • Configure and setup a VPN
    • How to completely harden the Windows 10 operating system
    • Use Tor to browse the internet anonymously
    • Learn how backup and encrypt their hard drive
    • Understand the basics of networking
    • How to choose the right Anti Virus software
    • How to encrypt and track emails
    • How to set up a firewall

    Who is this for?


  • Anyone who wants to begin a career as a cyber security professional
  • Students who want to learn practical techniques on how to protect their privacy online
  • Students who want to have a deeper understanding of many of the major topics in cyber security
  • What You Need to Know?


  • You should have an intermediate knowledge on how to use a computer and the internet
  • You should have a basic knowledge of cyber and computer security
  • More details


    Description

    ** PART 2 OF THE CYBER SECURITY GUIDE FOR BEGINNERS SERIES **

    Take your basic knowledge of cyber security to a whole new level with this exciting course that promises to be educational, informative and fun filled. 

    Build upon a basic foundation in Cyber Security with a strong focus on the following core topics.

    • Networking

    • Privacy & Anonymity

    • Malware

    • Email Security

    • Backups & Encryption

    • Windows 10 Hardening

    What are the main benefits of taking this course?

    I am glad you asked. This course has been designed to provide you with the knowledge and tools to not only better protect yourself against malware but to also prepare you for a career in the cyber security field if you so wish. 

    You will learn all the latest techniques used in the world of cyber security today and understand how a lot security technologies work behind the scenes.

    In this course you will learn the following practical skills

    • How to use a proxy server

    • How to setup and use a virtual private network

    • How to use Tor to access the dark web anonymously

    • Best practices to browse the internet securely and privately

    • How to set up a firewall

    • How to use a rootkit scanner

    • How to encrypt your emails

    • How to track emails you have sent and also how to detect if you are being tracked

    • How to use 3 major anti-malware software products

    • How to completely harden the Windows 10 operating system

    • How to backup and encrypt your hard drive

    • How to choose the right anti virus

    • and much much much more

    You will also learn how to use a wide variety of software to improve your security game and these include:

    • Virtual Private Networks

    • Kaspersky Antivirus

    • Bitlocker

    • Proxy servers

    • Bleachbit

    • Tor

    • CCleaner

    • Protonmail

    • Duckduck go

    • Brave Browser

    • Ugly Email

    • Mail Tracker

    • Nord VPN

    • GMER Rootkit scanner

    • Secure Boot

    • Veracrypt

    • Filevault

    • Guerrilla Mail

    • Comodo Firewall

    • Lastpass

     Jobs in Cyber security are plentiful and this course will help prepare you for entry level roles by providing you with a solid set of skills to build up on.

    * PERFECT FOR BEGINNERS *

    You don't need to have a background in cyber security though any sort of prior knowledge would be beneficial. This course is designed in such a manner that as long as you know how to use a computer and the internet, you will be able to understand and apply everything you are taught.

    Content and Overview   Suitable for non professionals and students with a basic understanding of cyber security. In this course of nearly 100 lectures and almost 7 hours of content, you’ll learn all of the core cyber security fundamentals and develop a strong understanding of how security and privacy can either be maintained or deprived from a user. Each chapter closes with a section review highlighting the core points raised in the section.

    Starting with Networking 101, you will learn the basics of networking including what the TCP/IP protocol suite is and how the domain name system works.

    With the basics of networking mastered, you will be ready to jump into the course proper with the following section where you will begin to learn about privacy and anonymity. You will learn how advertisers and websites are able to track you online and what you can do about it.

    You will then move on to a more advanced section where you will be introduced to Anonymizers. You will learn how to work with proxy servers and how to setup and configure a Virtual Private Network. We will also explore how to use Tor to access the dark web as well as the pros and cons of using anonymizers. By the end of this section, you would have learned techniques and skills that you can use to secure your privacy online.

    Section 5 covers malware with a special focus on viruses, rootkits and ransomware. You will learn how these various forms of malware can affect you plus you will also be introduced to a variety of anti-malware software that you can use to fight against malware.

    We will then move to discuss about backups and encryption. You will learn about cloud backups as well the advantages and disadvantages of using this type of technology. I will then show you how you can back up and encrypt your hard drive and sensitive files.

    Section 7 covers one of the most interesting aspects of cyber security - Social Engineering. You will learn about the different tactics employed by social engineers to extract important information without using any technical skills. We will explore how hackers exploit human psychology and fool their targets.

    Email security will be covered in the very next section. Emails are a fundamental component of our daily lives and you will learn exactly how emails are sent and received behind the scenes. You will learn how to track emails and how to use mail services like guerrilla mail and proton mail.

    In the final section of the course, you will learn how to harden the Windows 10 operating system against malware. Windows 10 by default is vulnerable to malware but with a few adjustments, you can make it far more secure and you will learn this tricks in this section.

    Complete with resources and section reviews, you’ll be able to apply what you have learnt in this course either at home or at your place of work and will receive a verifiable certificate of completion upon finishing the course.

    Take control of your privacy and security - Enroll Today in one of the very best cyber security courses you will find online.

    Who this course is for:

    • Anyone who wants to begin a career as a cyber security professional
    • Students who want to learn practical techniques on how to protect their privacy online
    • Students who want to have a deeper understanding of many of the major topics in cyber security

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Alexander Oni
    Alexander Oni
    Instructor's Courses
    My passion is teaching people through online courses in a fun and entertaining manner.  I have been teaching online for about 5 years now and during this period, I have created over 25 different courses with more than 132,000 students registered worldwide.What would you like to learn? Would you like to learn how to build and manage your WordPress website?Would you like to learn advanced skills that will make you a true WordPress developer?Would you like to learn how you can establish a successful career as a web developer?Would you like to learn the basics of information and cyber security? If you want to do any of these things, just enroll in the  course and  I'm always improving my courses so that they stay up to date and the  best that they can be. Check them out, and enroll today!MORE ABOUT ALEX:We all have one shot at life and as such, I believe in living life to the fullest. This means constantly stepping out of my comfort zone by visiting new places and trying out new things. My relative success on Udemy has given me both financial freedom and the ability to be location independent. I am currently travelling around the world spending about a month in one city (current location is Chiang Mai, Thailand) before moving on to the next. My hobbies include watching movies, sports and playing chess. I am also a huge Dead by Daylight gamer.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 84
    • duration 6:33:04
    • English subtitles has
    • Release Date 2023/11/22

    Courses related to Cyber Security

    Subtitle
    File Analysis with TruffleHog
    Pluralsight Tim Coakley
    Tim Coakley
    File Analysis with TruffleHog
    23:56
    English subtitles
    04/18/2023
    Subtitle
    PCI DSS: The Big Picture
    Pluralsight John Elliott
    John Elliott
    PCI DSS: The Big Picture
    1:22:53
    English subtitles
    02/25/2023

    Courses related to Cyber Security Awareness