The Complete Cyber Security Course - Hackers Exposed
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size9.7 GB
- Uploaded Bysumi1
- Downloads2232
- Last checkedJun. 14th '18
- Date uploadedJun. 20th '17
- Seeders 10
- Leechers2
The Complete Cyber Security Course : Hackers Exposed!
Volume 1 : Learn how to stop hackers, prevent tracking, advanced anonymous browsing and counter government surveillance
Requirements
A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
Please note this is Volume 1 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.
Description
Learn a practical skill-set in defeating all online threats, including - advanced hackers, trackers, malware, zero days, exploit kits, cybercriminals and more.
Go from a beginner to advanced in this easy to follow expert course.
Covering all major platforms - Windows 7, Windows 8, Windows 10, MacOS and Linux.
This course covers the fundamental building blocks of your required skill set - You will understand the threat and vulnerability landscape through threat modeling and risk assessments.
We explore the Darknet and mindset of the cyber criminal. Covering malware, exploit kits, phishing, zero-day vulnerabilities and much more.
You will learn about the global tracking and hacking infrastructures that nation states run. Covering the NSA, FBI, CIA, GCHQ, China’s MSS and other intelligence agencies capabilities.
You will understand the foundations of operating system security and privacy functionality. A close look at the new Windows 10 privacy issues and how to best mitigate them.
There is a complete easy to follow crash course on encryption, how encryption can be bypassed and what you can do to mitigate the risks.
Master defenses against phishing, SMShing, vishing, identity theft, scam, cons and other social engineering threats.
Finally we cover the extremely important, but underused security control of isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS.
This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.
Files:
The Complete Cyber Security Course - Hackers Exposed 01 Introduction- 001 Welcome and Introduction to the Instructor.mp4 (59.1 MB)
- 002 Goals and Learning Objectives - Volume 1.mp4 (70.4 MB)
- 003 Target Audience.mp4 (49.7 MB)
- 004 Study Recommendations.mp4 (95.8 MB)
- 005 Course updates.mp4 (18.8 MB)
- 006 Goals and Learning Objectives.mp4 (19.4 MB)
- 007 Protect What You Value.mp4 (21.5 MB)
- 008 What is Privacy Anonymity and Pseudonymity.mp4 (107.7 MB)
- 009 Security Vulnerabilities Threats and Adversaries.mp4 (88.0 MB)
- 010 Threat Modeling and Risk Assessments.mp4 (147.7 MB)
- 011 Security vs Privacy vs Anonymity - Can we have it all.mp4 (41.2 MB)
- 012 Defense In Depth.mp4 (6.9 MB)
- 013 The Zero Trust Model.mp4 (76.7 MB)
- The-Cyber-Security-Landscape-Diagram.jpg (777.2 KB)
- 014 Goals and Learning Objectives.mp4 (20.7 MB)
- 015 Why You Need Security The Value Of A Hack.mp4 (114.6 MB)
- 016 The Top 3 Things You Need To Stay Safe Online.mp4 (10.7 MB)
- 017 Security Bugs and Vulnerabilities.mp4 (124.6 MB)
- 018 Hackers crackers and cyber criminals.mp4 (61.2 MB)
- 019 Malware viruses rootkits and RATs.mp4 (81.3 MB)
- 020 Spyware Adware Scareware PUPs Browser hijacking.mp4 (71.9 MB)
- 021 What is Phishing Vishing and SMShing.mp4 (54.9 MB)
- 022 Spamming Doxing.mp4 (34.3 MB)
- 023 Social engineering - Scams cons tricks and fraud.mp4 (93.4 MB)
- 024 Darknets Dark Markets and Exploit kits.mp4 (204.2 MB)
- 025 Governments spies and secret stuff part I.mp4 (136.3 MB)
- 026 Governments spies and secret stuff part II.mp4 (164.0 MB)
- 027 Encryption mandating insecurity legalizing spying.mp4 (330.2 MB)
- 028 Trust Backdoors.mp4 (166.8 MB)
- 029 Censorship.mp4 (41.6 MB)
- 030 Security News and Alerts Stay Informed.mp4 (10.0 MB)
- 031 Goals and Learning Objectives.mp4 (11.5 MB)
- 032 Symmetric Encryption.mp4 (158.7 MB)
- 033 Asymmetric Encryption.mp4 (79.3 MB)
- 034 Hash Functions.mp4 (123.9 MB)
- 035 Digital Signatures.mp4 (49.7 MB)
- 036 Secure Sockets Layer SSL and Transport layer security TLS.mp4 (194.7 MB)
- 037 SSL Stripping.mp4 (150.1 MB)
- 038 HTTPS HTTP Secure.mp4 (132.8 MB)
- 039 Digital Certificates.mp4 (118.5 MB)
- 040 Certificate Authorities and HTTPS.mp4 (255.1 MB)
- 041 End-to-End Encryption E2EE.mp4 (8.5 MB)
- 042 Steganography.mp4 (172.7 MB)
- 043 How Security and Encryption is Really Attacked.mp4 (24.5 MB)
- 044 Goals and Learning Objectives.mp4 (13.1 MB)
- 045 Setting up a Testing Environment Using Virtual Machines.mp4 (193.3 MB)
- 046 Vmware.mp4 (163.5 MB)
- 047 Virtual box.mp4 (197.7 MB)
- 048 Kali Linux 2016.mp4 (64.7 MB)
- 049 Goals and Learning Objectives.mp4 (17.5 MB)
- 050 Security Features and Functionality.mp4 (41.1 MB)
- 051 Security Bugs and Vulnerabilities.mp4 (63.2 MB)
- 052 Usage Share.mp4 (45.4 MB)
- 053 Windows 10 - Privacy Tracking.mp4 (108.0 MB)
- 054 Windows 10 - Disable tracking automatically.mp4 (99.0 MB)
- 055 Windows 10 - Tool Disable Windows 10 Tracking.mp4 (164.7 MB)
- 056 Windows 10 Cortana.mp4 (49.0 MB)
- 057 Windows 10 Privacy Settings.mp4 (86.9 MB)
- 058 Windows 10 - WiFi Sense.mp4 (75.0 MB)
- 059 Windows 7 8 and 8.1 - Privacy Tracking.mp4 (134.3 MB)
- 060 Mac OS X - Privacy Tracking.mp4 (84.1 MB)
- 061 Linux and Unix like Operating systems.mp4 (80.9 MB)
- 062 Linux - Debian.mp4 (7.8 MB)
- 063 Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 (83.5 MB)
- 064 Linux - OpenBSD and Archlinux.mp4 (40.8 MB)
- 065 Linux - Ubuntu.mp4 (10.0 MB)
- 066 Goals and Learning Objectives.mp4 (11.7 MB)
- 067 The Importance of Patching.mp4 (41.7 MB)
- 068 Windows 7 - Auto Update.mp4 (26.8 MB)
- 069 Windows 8 8.1 - Auto Update.mp4 (12.9 MB)
- 070 Windows 10 - Auto Update.mp4 (22.5 MB)
- 071 Windows - Criticality and Patch Tuesday.mp4 (78.2 MB)
- 072 Windows 7 8 8.1 10 - Automate the pain away from patching.mp4 (130.1 MB)
- 073 Linux - Debian - Patching.mp4 (133.8 MB)
- 074 Mac OS X - Patching.mp4 (108.0 MB)
- 075 Firefox - Browser and extension updates.mp4 (71.4 MB)
- 076 Chrome - Browser and extension updates.mp4 (13.8 MB)
- 077 IE and Edge - Browser and extention updates.mp4 (14.9 MB)
- 078 Auto updates - The Impact to privacy and anonymity.mp4 (15.6 MB)
- 079 Goals and Learning Objectives Removing Privilege.mp4 (81.0 MB)
- 080 Windows 7 - Not using admin.mp4 (55.5 MB)
- 081 Windows 8 and 8.1 - Not using admin.mp4 (53.1 MB)
- 082 Windows 10 - Not using admin.mp4 (37.8 MB)
- 083 Goals and Learning Objectives.mp4 (12.6 MB)
- 084 Information Disclosure and Identity Strategies for Social Media.mp4 (201.4 MB)
- 085 Identify Verification and Registration.mp4 (56.1 MB)
- 086 Security Controls Against Social Threats Phishing Spam Part 1.mp4 (54.6 MB)
- 087 Security Controls Against Social Threats Phishing Spam Part 2.mp4 (136.3 MB)
- 088 Security Controls Against Social Threats Phishing Spam Scam Cons.mp4 (52.4 MB)
- 089 Goals and Learning Objectives.mp4 (9.8 MB)
- 090 Security Domains.mp4 (95.3 MB)
- 091 Goals and Learning Objectives.mp4 (17.9 MB)
- 092 Introduction to Isolation and Compartmentalization.mp4 (23.6 MB)
- 093 Physical and
Code:
- udp://tracker.grepler.com:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://tracker.leechers-paradise.org:6969/announce
- udp://shadowshq.yi.org:6969/announce
- http://tracker.grepler.com:6969/announce
- http://tracker.filetracker.pl:8089/announce
- udp://p4p.arenabg.com:1337/announce
- udp://p4p.arenabg.ch:1337/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://tracker.coppersurfer.tk:6969/announce
- http://p4p.arenabg.ch:1337/announce
- udp://inferno.demonoid.pw:3395/announce