The Four Volume Cyber Security Bundle
285 Enrolled
4 Courses & 53.5 Hours
$35.00$555.00
You save 93%
What's Included
$120.00 Value
Cyber Security Volume I: Hackers Exposed
Nathan House
117 Lessons (11h)
Lifetime
- Certification included
- Experience level required: All levels
- Access 117 lectures & 11 hours of content 24/7
- Length of time users can access this course: Lifetime
Course Curriculum
117 Lessons (11h)
- Section 1. Introduction1. Welcome and Introduction to the Instructor! Preview2:062. Security Quick Win!11:403. Goals and Learning Objectives - Volume 12:304. Target Audience Preview1:545. Study Recommendations5:16The Forum - For Questions, Answers and Other Resources1:346. Course updates0:40
- Section 2. Know Yourself - The Threat and Vulnerability Landscape7. Goals and Learning Objectives0:418. Protect What You Value2:049. What is Privacy, Anonymity and Pseudonymity4:3510. Security, Vulnerabilities, Threats and Adversaries4:3711. Threat Modeling and Risk Assessments7:5112. Security vs Privacy vs Anonymity - Can we have it all?1:5613. Defense In Depth1:3514. The Zero Trust Model3:40
- Section 3. Know Your Enemy - The Current Threat and Vulnerability Landscape15. Goals and Learning Objectives0:4316. Why You Need Security – The Value Of A Hack5:1417. The Top 3 Things You Need To Stay Safe Online1:2318. Security Bugs and Vulnerabilities - The Vulnerability Landscape5:4819. Hackers, crackers and cyber criminals2:3220. Malware, viruses, rootkits and RATs6:5621. Spyware, Adware, Scareware, PUPs & Browser hijacking4:4422. What is Phishing, Vishing and SMShing14:5323. Spamming & Doxing3:1524. Social engineering - Scams, cons, tricks and fraud5:3125. Darknets, Dark Markets and Exploit kits8:0426. Governments, spies and secret stuff part I5:1227. Governments, spies and secret stuff part II9:4328. Regulating encryption, mandating insecurity & legalizing spying14:3629. Trust & Backdoors10:1430. Censorship2:2431. Security News and Alerts – Stay Informed0:49
- Section 4. Encryption Crash Course32. Goals and Learning Objectives0:2433. Symmetric Encryption9:5434. Asymmetric Encryption10:1735. Hash Functions6:3236. Digital Signatures4:4537. Secure Sockets Layer (SSL) and Transport layer security (TLS)13:2638. SSL Stripping12:0239. HTTPS (HTTP Secure)7:4940. Digital Certificates6:1941. Certificate Authorities and HTTPS12:5642. End-to-End Encryption (E2EE)1:5743. Steganography8:1244. How Security and Encryption is Really Attacked2:42
- Section 5. Setting up a Testing Environment Using Virtual Machines45. Goals and Learning Objectives0:2746. Introduction to Setting up a Testing Environment Using Virtual Machines10:0876. Vmware10:5548. Virtual box12:0349. Kali Linux2:50
- Section 6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)50. Goals and Learning Objectives0:3751. Security Features and Functionality2:4852. Security Bugs and Vulnerabilities4:0053. Usage Share3:5654. Windows 10 - Privacy & Tracking6:0855. Windows 10 - Disable tracking automatically4:4256. Windows 10 - Tool : Disable Windows 10 Tracking8:3257. Windows 10 – Cortana2:2058. Windows 10 – Privacy Settings8:1559. Windows 10 - WiFi Sense3:3860. Windows 7, 8 and 8.1 - Privacy & Tracking7:1961. Mac - Privacy & Tracking4:3362. Linux and Unix “like” Operating systems3:2763. Linux - Debian1:0264. Linux - Debian 8 Jessie - Virtual box guest additions Issue6:1565. Linux - OpenBSD and Archlinux1:3866. Linux - Ubuntu0:58
- Section 7. Security Bugs and Vulnerabilities67. Goals and Learning Objectives0:2568. The Importance of Patching3:4769. Windows 7 - Auto Update1:1570. Windows 8 & 8.1 - Auto Update1:2571. Windows 10 - Auto Update1:2572. Windows - Criticality and Patch Tuesday3:4673. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching8:3474. Linux - Debian - Patching10:5875. Mac - Patching6:5876. Firefox - Browser and extension updates4:2377. Chrome - Browser and extension updates1:1378. IE and Edge - Browser and extention updates0:4679. Auto updates - The Impact to privacy and anonymity1:41
- Section. 8 Reducing Threat Privilege80. Goals and Learning Objectives + Removing Privilege2:5381. Windows 7 - Not using admin3:3282. Windows 8 and 8.1 - Not using admin4:1483. Windows 10 - Not using admin3:25
- Section 9. Social Engineering and Social Media Offence and Defence84. Goals and Learning Objectives0:2685. Information Disclosure and Identity Strategies for Social Media12:3486. Identify Verification and Registration5:0587. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 17:5088. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 210:2289. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)5:02
- Section 10. Security Domains90. Goals and Learning Objectives0:2191. Security Domains10:00
- Section 11. Security Through Isolation and Compartmentalization92. Goals and Learning Objectives0:3793. Introduction to Isolation and Compartmentalization2:1094. Physical and Hardware Isolation - How to change the Mac Address7:1095. Physical and Hardware Isolation - Hardware Serials11:1896. Virtual Isolation8:3697. Dual Boot2:4198. Built-in Sandboxes and Application Isolation3:0799. Windows - Sandboxes and Application Isolation5:57100. Windows - Sandboxes and Application Isolation - Sandboxie11:29101. Linux - Sandboxes and Application Isolation3:04102. Mac - Sandboxes and Application Isolation6:33103. Virtual Machines10:51104. Virtual Machine Weaknesses10:31105. Virtual Machine Hardening9:15106. Whonix OS - Anonymous Operating system20:51107. Whonix OS - Weaknesses4:18108. Qubes OS19:07109. Security Domains, Isolation and Compartmentalization4:42
- Section 12. BONUS - What's next?... Volume 2, 3 and 4110. BONUS - Important Information0:46111. Congratulations - Video to be redone112. BONUS Lecture from Volume 2 - Router Vulnerability Scanning (Shodan, Qualys)16:23113. BONUS Lecture from Volume 2 - Password cracking part 27:09114. BONUS Lecture from Volume 3 - Bypassing firewalls and HTTP proxies part 315:21115. BONUS Lecture from Volume 4 - Email clients, protocols and authentication13:17
Cyber Security Volume I: Hackers Exposed
NH
Nathan HouseNathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.
His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.
Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:
- BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
- SCF : SABSA Charted Architect Foundation
- CISSP : Certified Information Systems Security Professional
- CISA : Certified Information Systems Auditor
- CISM : Certified Information Security Manager
- ISO 27001 Certified ISMS Lead Auditor
- CEH : Certified Ethical Hacker
- OSCP : Offensive Security Certified Professional
Description
Internet security has never been as important as it is today with more information than ever being handled digitally around the globe. In the first course of this four volume bundle, you'll get an introduction to hacking and how to protect yourself and others. You'll develop an understanding of the threat and vulnerability landscape through threat modeling and risk assessments, and build a foundation for which to expand your security knowledge.
- Access 117 lectures & 11 hours of content 24/7
- Explore the Darknet, malware, exploit kits, phishing, zero day vulnerabilities, & more
- Learn about global tracking & hacking infrastructures that nation states run
- Understand the foundations of operating system security & privacy functionality
- Get a crash course on encryption, how it can be bypassed, & what you can do to mitigate risks
- Discover defenses against phishing, SMShing, vishing, identity theft, & other cons
Specs
Details & Requirements
- Length of time users can access this course: lifetime
- Access options: web streaming, mobile streaming
- Certification of completion not included
- Redemption deadline: redeem your code within 30 days of purchase
- Experience level required: all levels
Compatibility
- Internet required
$120.00 Value
Cyber Security Volume II: Network Security
Nathan House
106 Lessons (12.5h)
Lifetime
$120.00 Value
Cyber Security Volume III: Anonymous Browsing
Nathan House
120 Lessons (13.5h)
Lifetime
$195.00 Value
Cyber Security Volume IV: End Point Protection
Nathan House
178 Lessons (16.5h)
Lifetime
Terms
- Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
3 Reviews
5/ 5
All reviews are from verified purchasers collected after purchase.
GP
George Portell
Verified Buyer
(*required) (*required) (*required) (*required) (*required) (*required) (*required) (*required) (*required)
Feb 23, 2021
JG
Jerome Gatlin
Verified Buyer
This course offers concise and valuable information from an expert! I recommend for anyone who wants to expand their knowledgebase without a hefty tuition expense. Thanks House
Feb 21, 2021
jh
jeffrey hansen
Verified Buyer
Nov 6, 2019
Your Cart
Your cart is empty. Continue Shopping!
Processing order...