Cademy logoCademy Marketplace

Course Images

Cyber Security for Absolute Beginners - 2022 Edition - Part 02

Cyber Security for Absolute Beginners - 2022 Edition - Part 02

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • On-Demand course

  • 5 hours 56 minutes

  • All levels

Description

Take your basic cyber security knowledge to a new level with this exciting course that promises to be educational, informative, and fun-filled. Build upon a basic foundation in cyber security with a strong focus on networking, privacy and anonymity, malware, email security, backups and encryption, and Windows 10 Hardening.

Let's build a foundation in cyber security with a strong focus on networking, privacy and anonymity, malware, email security, backups and encryption, and Windows 10 Hardening. The course begins with an overview of the networking basics, including TCP/IP and DNS. With the networking basics mastered, you will learn about privacy and anonymity, how advertisers and websites track you online, and how to prevent it. You will then move on to more advanced topics such as anonymizers, working with proxy servers, and setting up/configuring a VPN. Explore Tor to access the dark web and learn about malware, viruses, rootkits, and ransomware and how this malware affects you and various anti-malware software. Then, learn about backups and encryption, cloud backups, and use this to back up and encrypt your hard drive and sensitive files. Look at exciting aspects of cybersecurity, social engineering, the tactics used to extract vital information, and how hackers exploit human psychology to dupe their targets. Explore email security and track emails and use mail services such as Guerrilla and Proton. Finally, learn to harden the Windows 10 OS against malware and make it secure. Upon completion, you will have acquired vast knowledge about cyber security and how to implement it in your daily work and lives for better cyber safety. All resources are available at: https://github.com/PacktPublishing/Cyber-Security-For-Absolute-Beginners---2022-Edition---Part-02

What You Will Learn

Use a proxy server and set up and use a virtual private network
Learn to use Tor to access the dark web anonymously
Set up a firewall and learn to use a rootkit scanner
Encrypt emails and track emails sent and check for being tracked
Learn to back up and encrypt your hard drive
Completely harden the Windows 10 operating system

Audience

This course is suitable for non-professionals and students with a basic understanding of cyber security. Individuals who want to learn practical techniques to protect their privacy online want a deeper understanding of the crucial topics in cyber security. You don't need to have a background in cyber security, though any prior knowledge would be beneficial.

Approach

This engaging and interactive intermediate-level course is delivered over well-structured lectures that advance step-wise with topics relevant to cyber security. The course includes articles and quizzes to help you acquire knowledge in the cyber security field. This course is designed such that if you know how to use a computer and the Internet, you can understand and apply everything practically.

Key Features

Acquire extensive information about cyber security with this educational and informative course * Secure your Windows 10 OS with anonymous internet browsing and back up and encrypt your systems * Learn the latest cyber security techniques and knowledge/tools to protect yourself against malware

Github Repo

https://github.com/PacktPublishing/Cyber-Security-For-Absolute-Beginners---2022-Edition---Part-02

About the Author

Alexander Oni

Alexander Oni is a bestselling instructor, with 70,000 students enrolled in his courses. His passion includes teaching through online courses in an entertaining way. Alex has been teaching online for more than five years and has created over 25 courses with numerous students registered worldwide. Alex believes we all have one shot at life and should live life to the fullest, constantly stepping out of our comfort zone, visiting places, and trying new things. His online success has given him financial freedom and the ability to travel and settle anywhere. The author is currently avidly traveling, spending a month in every city, and moving to the next. His hobbies include watching movies, sports, and chess.

Course Outline

1. Introduction

This section provides an introduction to the course outline in general and what you will learn as the course progresses, section by section.

1. Welcome to the Course

This video outlines an introduction about the author as he explains what you will learn as the course advances and the topics covered in general.


2. Networking 101

This section focuses on networking and explains MAC addresses, IP addresses, networking devices, TCP-IP, and the DNS system.

1. Section Preview

This brief outline of the section introduces networking and what you will learn from this section.

2. MAC Addresses and IP Addresses

In this video, we will understand machine access control and Internet Protocol addresses.

3. Hubs, Switches, and Routers

This video will look at hubs, switches, and routers, how they connect to network devices, and how they establish network connections.

4. Ethernet 101

This lesson will look at the ethernet protocol, referred to as the IEEE 802.3 protocol.

5. HTTP, HTTPS, SSL, and TLS

Here, you will learn about the hypertext transfer protocol, hypertext transfer protocol secure, secure sockets layer, and transport layer security, and how each one works.

6. The Internet Protocol Suite - TCP/IP

In this lesson, we will understand the two foundational protocols, TCP and IP, used on the Internet.

7. Understanding the DNS System

In the lesson, you will learn about the domain name system responsible for translating domain names into IP addresses.


3. The Internet - Privacy and Survival of the Paranoid

This section focuses on internet privacy, addresses the concerns of those looking for security and privacy, and covers deeply how to cope with trackers and secure your privacy.

1. Section Preview

This brief introductory video outlines how to address trackers and secure system privacy.

2. What are Privacy, Anonymity, and Pseudonymity

In this video, you will learn more about privacy, anonymity, and pseudonymity concepts.

3. Identity Strategies

Here, we will understand identities used online, an essential aspect of security and privacy. We will look at the different identifying strategies.

4. How We Are Tracked Online

This video demonstrates online examples of how we are tracked and how our preferences are monitored and recorded online.

5. The Facebook Data Mining Scandal

This video discusses the Cambridge Analytica case that illegally collected user information from Facebook.

6. Five Places You Are Tracked Online

In this video, we will look at the different places for tracking you online, like social media such as Facebook, Twitter, Instagram, Google search history, Yahoo, and Bing.

7. Browsing in Incognito Mode - The Shocking Truth!

In this video, we will understand what going "incognito" is and how we can browse incognito on the Internet.

8. The Brave Browser

In this video, we will look at the Brave browser, how to install it, and how it is a better browser, faster than other browsers, and more secure.

9. How to Disappear Online

This video demonstrates the use of the imdur website to disappear online.

10. Introduction to Stylometry

This video illustrates an application called Stylometry, which can determine if an anonymous document may or may not have been written by us.


4. Anonymizers, Proxies, Virtual Private Networks, and Tor

This section illustrates about anonymizers, what proxies are, what virtual private networks are, and also explains about Tor.

1. Section Preview

This section focuses deeper on the aspects of privacy and anonymity. We will understand VPNs, the darknet, and the dark web.

2. Anonymizer

In this video, we will look at the tools and software used to make activity on the Internet untraceable.

3. Introduction to Proxy Servers

Let's discuss the first anonymizer, the proxy server, and how it can provide a proxy IP address to hide your activity.

4. Introduction to VPNs

In this lesson, we will examine the most famous anonymous tool, the virtual private network.

5. Types of VPNs

In this video, the author discusses the various kinds of VPNs used and the benefits and disadvantages of the VPNs

6. NordVPN

In this video, the author illustrates more about NordVPN and the benefits and cons of the VPN.

7. VPN Myths Debunked

In this video, the author debunks the significant myths about VPN use and several reasons for using a paid VPN.

8. Introduction to Tor

In this video, the author talks about a popular anonymity tool called Tor, the most powerful tool available to provide anonymity on the Internet.

9. Tor Weaknesses

Here, the author elaborates on the disadvantages of using Tor to browse the Internet.

10. Attacking Tor - The End-to-End Correlation Hack

This video will discuss a significant attack on Tor, the end-to-end correlation attack.

11. Accessing the Dark Web with Tor

This video talks about the dark web that conducts illegal activities with Tor. The author illustrates how to use the dark web.

12. Darknets

In this video, we will look at some of the websites classified on the dark web that allows you to browse websites or post questions anonymously.

13. VPN + Tor

In this video, the author addresses the question of using VPN and Tor to provide more anonymity.

14. Meet Eldo Kim

This video talks about Eldo Kim and his devious plans.


5. Malware, Viruses, Rootkits, Ransomware, and Attacks

This section focuses on malware, the different viruses, what a rootkit is, and how ransomware attacks happen.

1. Section Preview

In this video, we will understand what malware is, the different kinds of malware, and how to tackle them.

2. Introduction to Malware

This video introduces the malicious software and programs that harm our computer systems and networks.

3. Choosing the Right Antivirus Software

This video explains the various kinds of antiviruses available with examples available in the market and lets you decide what is best for your system.

4. Rootkits

In this video, we will try to understand rootkits, one of the most dangerous forms of malware.

5. Securing the Windows 10 Boot Process

In this video, we will look at how a rootkit can infect a system with the boot process and how this can be eliminated.

6. Using GMER - Rootkit Scanner

This video demonstrates the GMER rootkit scanner and how it helps eliminate the rootkit from infesting a system.

7. Ransomware - Cryptolocker, WannaCry, Bad Rabbit

In this video, we will look at the most effective form of malware today globally, ransomware, a form of malware where the attacker prevents the victim from accessing the computer or the files.

8. Using the Inbuilt AntiRansomware Tool

In this video, you will learn about the built-in anti-ransomware tools available in the Windows operating system.

9. CC Cleaner

This video illustrates the CC Cleaner software, how to use it, and the benefits of using it to protect the systems.

10. BleachBit

In this lesson, we will look at a trendy yet controversial tool called BleachBit to clear files.

11. Malwarebytes

This video elaborates on another antimalware product called Malwarebytes.


6. Backups, Storage, the Cloud, and Encryption

This section focuses on backing up a system, storage, what the cloud is, and encryption.

1. Section Preview

This video briefly outlines the cloud, backups and how to save them, storage and how to manage it, and what encryption means.

2. How to Back Up Your Computer

In this video, we will look at a backup, the advantages of having a backup system in place, and how to back up your computer.

3. What Is the Cloud?

In this lesson, we will understand more about cloud computing, storing data online than on a local hard drive.

4. Disk Encryption

Here, you will learn about encryption and decryption, the two technologies applied to a hard drive.

5. Encrypting with Veracrypt

After learning about encryption, we will look at encrypting a computer using Veracrypt software.

6. Encrypting Windows 10 with Bitlocker

Another encryption tool available for the Windows 10 Operating system, Bitlocker, is explored here.

7. Encrypting Mac OS with FileVault

In this video, you will learn about encrypting a Mac OS system with an encryption tool, FileVault.

8. Self-Encrypting Drives

In this lesson, you will learn about Self-encrypting Drives (SEDs), which can encrypt the drive on their own automatically.

9. Attacks Against Encryption

In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.


7. Social Engineering - Scams, Cons, Tricks, and Fraud

This section focuses on how the human psyche is manipulated to gather vital information for causing scams and frauds.

1. Section Preview

In this video, we will look at understanding social engineering, how the human psyche plays a vital role in the hackers' minds, and how they use emotions to hack.

2. What Is Social Engineering?

Here, you will learn more about gaining unauthorized access to buildings, systems, and networks by exploiting the human psyche.

3. Reconnaissance Methods

In this lesson, you will learn about footprinting, or the art of collecting information about a person or object of interest, called reconnaissance.

4. Anatomy of a Social Engineering Attack

This video will examine hackers' process of creating an attack using the social engineering technique.

5. The Way Back Machine

This service serves as a database or archive of snapshots of webpages from the past or even just before changing the current website as a reference.

6. Meet Kevin Mitnick

This video is an overview of a famous hacker, Kevin Mitnick, that highlights his hacking techniques.


8. The World of Electronic Mails - Dangers, Attacks, and Protection

This section focuses on what emails are, what are the dangers of using emails, how emails become carriers of system/network attacks, and what are the protection options available to prevent the dangers of emails.

1. The World of Electronic Mails - Dangers, Attacks, and Protection

This section focuses on emails, the dangers of not protecting the emails or opening dangerous emails, how hackers attack using emails, and how to protect yourself from being hacked by emails.

2. Email Basics, Protocols and Ports

In this lesson, you will learn about emails, what protocols and ports they use to communicate, the IMAP port 143 and POP port 110, IMAP port 993 and POP port 995, encrypted and unencrypted.

3. How to Track Sent Emails

In this video, we will look at an email tracker software that allows you to track the status of the sent mail or if the emails have been read or not, the email tracker.

4. How to Detect Email Tracking

In this lesson, we will understand how to detect if someone is tracking your email and how to prevent that from happening.

5. Guerrilla Mail

This video illustrates Guerrilla mail and its features and advantages, safety, and disadvantages.

6. Introducing Proton Email

This video illustrates the Proton email and its features and advantages, safety, and disadvantages.

7. Phishing Attacks

Here, we will understand the concepts of phishing, how the attack is performed, the dangers of opening phishing emails, and how to prevent them.

8. Scam Email Live Example

In this video, we will look at the various examples of scam emails that bombard your inbox from time to time and how they can be dangerous if the information is passed on to unknown people.


9. Windows 10 Hardening, Privacy, and Security

This section focuses on how to protect the Windows 10 operating system, things that can be incorporated to protect the system, and add levels of privacy, tracking, and enabling filters.

1. Section Preview

This video briefly outlines the section's objectives, including protecting the Windows 10 operating system from being hacked as much as possible and increasing levels of privacy and safety.

2. Patching and Updates

This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.

3. Windows 10 Privacy - Turning Off Ad Tracking

This video illustrates a few tricks and tips to improve the privacy of the Windows 10 operating system. You will learn how to turn off ad tracking and prevent being tracked.

4. Windows 10 Privacy - Restricting Cortana

In this video, we will understand how Cortana works and how to limit the amount of information it collects, to prevent the data from being shared through trackers.

5. Windows 10 Privacy - Turning Off Location Tracking

Here, we will look at how location tracking works on our systems and networks and how we can prevent systems from knowing our location to prevent being hacked.

6. Windows 10 Privacy - Turning Off Peer Updates

This video illustrates how the privacy of Windows 10 OS can be improved by turning off the peer updates features from other computers, especially where the internet is unreliable.

7. Windows 10 Hardening - The Windows 10 Firewall

Here, we will understand a firewall, how it works, and how it can protect the Windows 10 OS.

8. Windows 10 Hardening - Enabling the Smart Screen Filter

Here, we will look at the next step in hardening the Windows 10 OS using smart screen filtering to enhance the protection of your OS.

9. Windows 10 Hardening - Randomizing the MAC Address

Another step of hardening the Windows 10 OS is randomizing the MAC address, which is usually a unique number for each PC.


10. Conclusion

This section concludes the course with an overview of what you have learned through the course.

1. Conclusion

Here, we will hear from the author about his thoughts on completing this course and a cursory outline of what you have learned.

Course Content

  1. Cyber Security for Absolute Beginners - 2022 Edition - Part 02

About The Provider

Packt
Packt
Birmingham
Founded in 2004 in Birmingham, UK, Packt’s mission is to help the world put software to work in new ways, through the delivery of effective learning and i...
Read more about Packt

Tags

Reviews