- Welcome and Introduction to the Instructor!
 - Security Quick Win!
 - Goals and Learning Objectives - Volume 1
 - Target Audience
 - Study Recommendations
 - Course updates
 - Cyber Security and Ethical Hacking Careers
 
- Theory and Practical
 - Goals and Learning Objectives
 - Protect What You Value
 - What is Privacy, Anonymity and Pseudonymity
 - Security, Vulnerabilities, Threats and Adversaries
 - Asset Selection
 - Threat Modeling and Risk Assessments
 - Security vs Privacy vs Anonymity - Can we have it all?
 - Confidentiality, Integrity and Availability - (Security Attributes)
 - Defense In Depth
 - The Zero Trust Model
 
- Goals and Learning Objectives
 - Why You Need Security – The Value Of A Hack
 - The Top 3 Things You Need To Stay Safe Online
 - Security Bugs and Vulnerabilities - The Vulnerability Landscape
 - Hackers, crackers and cyber criminals
 - Malware, viruses, rootkits and RATs
 - Spyware, Adware, Scareware, PUPs & Browser hijacking
 - What is Phishing, Vishing and SMShing
 - Spamming & Doxing
 - Social engineering - Scams, cons, tricks and fraud
 - CPU Hijackers - Crypto Mining Malware and Cryptojackers
 - Darknets, Dark Markets and Exploit kits
 - Governments, spies and secret stuff part I
 - Governments, spies and secret stuff part II
 - Regulating encryption, mandating insecurity & legalizing spying
 - Trust & Backdoors
 - Censorship
 - Cyber Threat Intelligence – Stay Informed
 
- Goals and Learning Objectives
 - Symmetric Encryption
 - Asymmetric Encryption
 - Hash Functions
 - Digital Signatures
 - Secure Sockets Layer (SSL) and Transport layer security (TLS)
 - SSL Stripping
 - HTTPS (HTTP Secure)
 - Digital Certificates
 - Certificate Authorities and HTTPS
 - End-to-End Encryption (E2EE)
 - Steganography
 - How Security and Encryption is Really Attacked
 
- Goals and Learning Objectives
 - Introduction to Setting up a Testing Environment Using Virtual Machines
 - Vmware
 - Virtual box
 - Kali Linux 2018
 
- Goals and Learning Objectives
 - Security Features and Functionality
 - Security Bugs and Vulnerabilities
 - Usage Share
 - Windows 10 - Privacy & Tracking
 - Windows 10 - Disable tracking automatically
 - Windows 10 - Tool : Disable Windows 10 Tracking
 - Windows 10 – Cortana
 - Windows 10 – Privacy Settings
 - Windows 10 - WiFi Sense
 - Windows 7, 8 and 8.1 - Privacy & Tracking
 - Mac - Privacy & Tracking
 - Linux and Unix “like” Operating systems
 - General Use Operating Systems (Windows, MacOS and Linux)
 - General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)
 - Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)
 - Anonymity Focused Operating Systems (Tails and Whonix OS)
 - Penetration Testing and Ethical Hacking Focused Operating Systems
 - Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)
 - Linux - Debian 8 Jessie - Virtual box guest additions Issue
 
- Goals and Learning Objectives
 - The Importance of Patching
 - Windows 7 - Auto Update
 - Windows 8 & 8.1 - Auto Update
 - Windows 10 - Auto Update
 - Windows - Criticality and Patch Tuesday
 - Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
 - Linux - Debian - Patching
 - Mac - Patching
 - Firefox - Browser and extension updates
 - Chrome - Browser and extension updates
 - IE and Edge - Browser and extention updates
 - Auto updates - The Impact to privacy and anonymity
 
- Goals and Learning Objectives - Removing Privilege
 - Windows 7 - Not using admin
 - Windows 8 and 8.1 - Not using admin
 - Windows 10 - Not using admin
 




					
					
						









