- Welcome and Introduction to the Instructor!
- Security Quick Win!
- Goals and Learning Objectives - Volume 1
- Target Audience
- Study Recommendations
- Course updates
- Cyber Security and Ethical Hacking Careers
- Theory and Practical
- Goals and Learning Objectives
- Protect What You Value
- What is Privacy, Anonymity and Pseudonymity
- Security, Vulnerabilities, Threats and Adversaries
- Asset Selection
- Threat Modeling and Risk Assessments
- Security vs Privacy vs Anonymity - Can we have it all?
- Confidentiality, Integrity and Availability - (Security Attributes)
- Defense In Depth
- The Zero Trust Model
- Goals and Learning Objectives
- Why You Need Security – The Value Of A Hack
- The Top 3 Things You Need To Stay Safe Online
- Security Bugs and Vulnerabilities - The Vulnerability Landscape
- Hackers, crackers and cyber criminals
- Malware, viruses, rootkits and RATs
- Spyware, Adware, Scareware, PUPs & Browser hijacking
- What is Phishing, Vishing and SMShing
- Spamming & Doxing
- Social engineering - Scams, cons, tricks and fraud
- CPU Hijackers - Crypto Mining Malware and Cryptojackers
- Darknets, Dark Markets and Exploit kits
- Governments, spies and secret stuff part I
- Governments, spies and secret stuff part II
- Regulating encryption, mandating insecurity & legalizing spying
- Trust & Backdoors
- Censorship
- Cyber Threat Intelligence – Stay Informed
- Goals and Learning Objectives
- Symmetric Encryption
- Asymmetric Encryption
- Hash Functions
- Digital Signatures
- Secure Sockets Layer (SSL) and Transport layer security (TLS)
- SSL Stripping
- HTTPS (HTTP Secure)
- Digital Certificates
- Certificate Authorities and HTTPS
- End-to-End Encryption (E2EE)
- Steganography
- How Security and Encryption is Really Attacked
- Goals and Learning Objectives
- Introduction to Setting up a Testing Environment Using Virtual Machines
- Vmware
- Virtual box
- Kali Linux 2018
- Goals and Learning Objectives
- Security Features and Functionality
- Security Bugs and Vulnerabilities
- Usage Share
- Windows 10 - Privacy & Tracking
- Windows 10 - Disable tracking automatically
- Windows 10 - Tool : Disable Windows 10 Tracking
- Windows 10 – Cortana
- Windows 10 – Privacy Settings
- Windows 10 - WiFi Sense
- Windows 7, 8 and 8.1 - Privacy & Tracking
- Mac - Privacy & Tracking
- Linux and Unix “like” Operating systems
- General Use Operating Systems (Windows, MacOS and Linux)
- General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)
- Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)
- Anonymity Focused Operating Systems (Tails and Whonix OS)
- Penetration Testing and Ethical Hacking Focused Operating Systems
- Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)
- Linux - Debian 8 Jessie - Virtual box guest additions Issue
- Goals and Learning Objectives
- The Importance of Patching
- Windows 7 - Auto Update
- Windows 8 & 8.1 - Auto Update
- Windows 10 - Auto Update
- Windows - Criticality and Patch Tuesday
- Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
- Linux - Debian - Patching
- Mac - Patching
- Firefox - Browser and extension updates
- Chrome - Browser and extension updates
- IE and Edge - Browser and extention updates
- Auto updates - The Impact to privacy and anonymity
- Goals and Learning Objectives - Removing Privilege
- Windows 7 - Not using admin
- Windows 8 and 8.1 - Not using admin
- Windows 10 - Not using admin