Introduction
  • Udemy Rating System - Very Important !!!
  • Connect with Me
Networking 101
  • Section Preview
  • Meet Julian Assange
  • MAC Addresses and IP Addresses
  • Hubs, Switches and Routers
  • Ethernet 101
  • HTTP, HTTPS, SSL & TLS
  • The Internet Protocol Suite - TCP/IP
  • Understanding the DNS System
  • Section Review and Key Points
The Internet - Privacy & Survival of the Paranoid
  • Section Preview
  • What is Privacy, Anonymity and Pseudonymity
  • Identity Strategies
  • How We are Tracked Online
  • The FaceBook Data Mining Scandal
  • Lab - How Much Does Facebook Know about You
  • 5 Places You are Tracked Online
  • Cookies
  • Browsing in Icognito Mode - The Shocking Truth !!!
  • DuckDuckGo
  • The Brave Browser
  • How to Disappear Online
  • Introduction to Stylometry
  • Section Review and Key Points
Anonymizers, Proxies, Virtual Private Networks & Tor
  • Section Preview
  • Annonymizer
  • Introduction to Proxy Servers
  • Introduction to VPNs
  • Types of VPNs
  • NordVPN
  • VPN Myths Debunked
  • Introduction to Tor
  • Tor Weaknesses
  • Attacking Tor - The end to end Correlation Hack
  • Accessing the Dark Web with Tor
  • Darknets
  • VPN + Tor
  • Meet Eldo Kim
  • Section Review and Key Points
Malware, Viruses, Rootkits, Ransomware & Attacks
  • Section Preview
  • Introduction to Malware
  • Viruses & Worms
  • Antivirus
  • Choosing the Right Antivirus Software
  • Rootkits
  • Securing the Windows 10 Boot Process
  • Using GMER - Rootkit Scanner
  • Ransomware - Cryptolocker, WannaCry, Bad Rabbit
  • Using the inbuilt AntiRansomware Tool
  • CC Cleaner
  • Bleachit
  • Malwarebytes
  • Section Review and Key Points
Backups, Storage, The Cloud and Encryption
  • Section Preview
  • How to Backup Your Computer
  • What is the Cloud?
  • Disk Encyrption
  • Encrypting with Veracrypt
  • Encrypting Windows 10 with Bitlocker
  • Encrypting Mac OS with FileVault
  • Self Encrypting Drives
  • Attacks Against Encryption
  • How to Password Protect USB Drives, Files & Folders
  • Section Review and Key Points
Social engineering - Scams, cons, tricks and fraud
  • Section Preview
  • What is Social Engineering?
  • Reconnaissance Methods
  • Anatomy of a Social Engineering Attack
  • The Way Back Machine
  • Meet Kevin Mitnick
  • Section Review and Key Points
The World of Electronic Mails - Dangers, Attacks & Protection
  • Section Preview
  • Email Basics, Protocols & Ports
  • How to Track Sent Emails
  • How to Detect Email Tracking
  • Guerrilla Mail
  • Introducing Proton Email
  • Review Update
  • Phishing Attacks
  • Scam Email Live Example
  • Section Review and Key Points
Windows 10 Hardening, Privacy & Security
  • Section Preview
  • Patching and Updates
  • Windows 10 Privacy - Turning off Ad Tracking
  • Windows 10 Privacy - Restricting Cortana
  • Windows 10 Privacy - Turning off Location Tracking
  • Windows 10 Privacy - Turning off Peer Updates
  • Windows 10 Hardening - The Windows 10 Firewall
  • Windows 10 Hardening - Enabling the Smart Screen Filter
  • Windows 10 Hardening - Randomizing the MAC Address