Introduction
  • Welcome and Introduction to the Instructor!
  • Security Quick Win!
  • Goals and Learning Objectives - Volume 1
  • Target Audience
  • Study Recommendations
  • Course updates
  • Cyber Security and Ethical Hacking Careers
know Yourself - The Threat and Vulnerability Landscape
  • Theory and Practical
  • Goals and Learning Objectives
  • Protect What You Value
  • What is Privacy, Anonymity and Pseudonymity
  • Security, Vulnerabilities, Threats and Adversaries
  • Asset Selection
  • Threat Modeling and Risk Assessments
  • Security vs Privacy vs Anonymity - Can we have it all?
  • Confidentiality, Integrity and Availability - (Security Attributes)
  • Defense In Depth
  • The Zero Trust Model
Know Your Enemy - The Current Threat and Vulnerability Landscape
  • Goals and Learning Objectives
  • Why You Need Security – The Value Of A Hack
  • The Top 3 Things You Need To Stay Safe Online
  • Security Bugs and Vulnerabilities - The Vulnerability Landscape
  • Hackers, crackers and cyber criminals
  • Malware, viruses, rootkits and RATs
  • Spyware, Adware, Scareware, PUPs & Browser hijacking
  • What is Phishing, Vishing and SMShing
  • Spamming & Doxing
  • Social engineering - Scams, cons, tricks and fraud
  • CPU Hijackers - Crypto Mining Malware and Cryptojackers
  • Darknets, Dark Markets and Exploit kits
  • Governments, spies and secret stuff part I
  • Governments, spies and secret stuff part II
  • Regulating encryption, mandating insecurity & legalizing spying
  • Trust & Backdoors
  • Censorship
  • Cyber Threat Intelligence – Stay Informed
Encryption Crash Course
  • Goals and Learning Objectives
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hash Functions
  • Digital Signatures
  • Secure Sockets Layer (SSL) and Transport layer security (TLS)
  • SSL Stripping
  • HTTPS (HTTP Secure)
  • Digital Certificates
  • Certificate Authorities and HTTPS
  • End-to-End Encryption (E2EE)
  • Steganography
  • How Security and Encryption is Really Attacked
Setting up a Testing Environment Using Virtual Machines (Lab)
  • Goals and Learning Objectives
  • Introduction to Setting up a Testing Environment Using Virtual Machines
  • Vmware
  • Virtual box
  • Kali Linux 2018
Operating System Security & Privacy (Windows vs Mac OS X vs Linux)
  • Goals and Learning Objectives
  • Security Features and Functionality
  • Security Bugs and Vulnerabilities
  • Usage Share
  • Windows 10 - Privacy & Tracking
  • Windows 10 - Disable tracking automatically
  • Windows 10 - Tool : Disable Windows 10 Tracking
  • Windows 10 – Cortana
  • Windows 10 – Privacy Settings
  • Windows 10 - WiFi Sense
  • Windows 7, 8 and 8.1 - Privacy & Tracking
  • Mac - Privacy & Tracking
  • Linux and Unix “like” Operating systems
  • General Use Operating Systems (Windows, MacOS and Linux)
  • General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)
  • Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)
  • Anonymity Focused Operating Systems (Tails and Whonix OS)
  • Penetration Testing and Ethical Hacking Focused Operating Systems
  • Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)
  • Linux - Debian 8 Jessie - Virtual box guest additions Issue
Security Bugs and Vulnerabilities
  • Goals and Learning Objectives
  • The Importance of Patching
  • Windows 7 - Auto Update
  • Windows 8 & 8.1 - Auto Update
  • Windows 10 - Auto Update
  • Windows - Criticality and Patch Tuesday
  • Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
  • Linux - Debian - Patching
  • Mac - Patching
  • Firefox - Browser and extension updates
  • Chrome - Browser and extension updates
  • IE and Edge - Browser and extention updates
  • Auto updates - The Impact to privacy and anonymity
Reducing Threat Privilege
  • Goals and Learning Objectives - Removing Privilege
  • Windows 7 - Not using admin
  • Windows 8 and 8.1 - Not using admin
  • Windows 10 - Not using admin
Social Engineering and Social Media Offence and Defence