Udemy - The Complete Cyber Security Course: Hacking Exposed

seeders: 6
leechers: 0
updated:
Added by pinkihacks in Other > Tutorials

Download Fast Safe Anonymous
movies, software, shows...

Files

Hacking Exposed 01 Introduction
  • 004 Study Recommendations.mp4 (95.8 MB)
  • 002 Goals and Learning Objectives - Volume 1.mp4 (70.4 MB)
  • 001 Welcome and Introduction to the Instructor.mp4 (60.8 MB)
  • 003 Target Audience.mp4 (49.7 MB)
  • 005 Course updates.mp4 (18.8 MB)
02 know Yourself - The Threat and Vulnerability Landscape attached_files 009 Security Vulnerabilities Threats and Adversaries
  • The-Cyber-Security-Landscape-Diagram.jpg (777.2 KB)
  • 010 Threat Modeling and Risk Assessments.mp4 (147.7 MB)
  • 008 What is Privacy Anonymity and Pseudonymity.mp4 (107.7 MB)
  • 009 Security Vulnerabilities Threats and Adversaries.mp4 (88.0 MB)
  • 013 The Zero Trust Model.mp4 (76.7 MB)
  • 011 Security vs Privacy vs Anonymity - Can we have it all.mp4 (41.2 MB)
  • 007 Protect What You Value.mp4 (21.5 MB)
  • 006 Goals and Learning Objectives.mp4 (19.4 MB)
  • 012 Defense In Depth.mp4 (6.9 MB)
  • 03 Know Your Enemy - The Current Threat and Vulnerability Landscape
    • 027 Regulating encryption mandating insecurity legalizing spying.mp4 (330.2 MB)
    • 024 Darknets Dark Markets and Exploit kits.mp4 (204.2 MB)
    • 028 Trust Backdoors.mp4 (166.8 MB)
    • 026 Governments spies and secret stuff part II.mp4 (164.0 MB)
    • 025 Governments spies and secret stuff part I.mp4 (136.3 MB)
    • 017 Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 (124.6 MB)
    • 015 Why You Need Security The Value Of A Hack.mp4 (114.6 MB)
    • 023 Social engineering - Scams cons tricks and fraud.mp4 (93.4 MB)
    • 019 Malware viruses rootkits and RATs.mp4 (81.3 MB)
    • 020 Spyware Adware Scareware PUPs Browser hijacking.mp4 (71.9 MB)
    • 018 Hackers crackers and cyber criminals.mp4 (61.2 MB)
    • 021 What is Phishing Vishing and SMShing.mp4 (54.5 MB)
    • 029 Censorship.mp4 (41.6 MB)
    • 022 Spamming Doxing.mp4 (34.3 MB)
    • 014 Goals and Learning Objectives.mp4 (20.7 MB)
    • 016 The Top 3 Things You Need To Stay Safe Online.mp4 (10.7 MB)
    • 030 Security News and Alerts Stay Informed.mp4 (10.0 MB)
    04 Encryption Crash Course
    • 040 Certificate Authorities and HTTPS.mp4 (255.1 MB)
    • 036 Secure Sockets Layer SSL and Transport layer security TLS.mp4 (194.7 MB)
    • 042 Steganography.mp4 (172.7 MB)
    • 032 Symmetric Encryption.mp4 (158.7 MB)
    • 037 SSL Stripping.mp4 (150.1 MB)
    • 038 HTTPS HTTP Secure.mp4 (132.8 MB)
    • 034 Hash Functions.mp4 (123.9 MB)
    • 039 Digital Certificates.mp4 (118.5 MB)
    • 033 Asymmetric Encryption.mp4 (79.3 MB)
    • 035 Digital Signatures.mp4 (49.7 MB)
    • 043 How Security and Encryption is Really Attacked.mp4 (24.5 MB)
    • 031 Goals and Learning Objectives.mp4 (11.5 MB)
    • 041 End-to-End Encryption E2EE.mp4 (8.5 MB)
    05 Setting up a Testing Environment Using Virtual Machines
    • 047 Virtual box.mp4 (197.7 MB)
    • 045 Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 (193.3 MB)
    • 046 Vmware.mp4 (163.5 MB)
    • 048 Kali Linux 2016.mp4 (64.7 MB)
    • 044 Goals and Learning Objectives.mp4 (13.1 MB)
    06 Operating System Security Privacy Windows vs Mac OS X vs Linux
    • 055 Windows 10 - Tool Disable Windows 10 Tracking.mp4 (164.7 MB)
    • 059 Windows 7 8 and 8.1 - Privacy Tracking.mp4 (134.3 MB)
    • 053 Windows 10 - Privacy Tracking.mp4 (108.0 MB)
    • 054 Windows 10 - Disable tracking automatically.mp4 (99.0 MB)
    • 057 Windows 10 Privacy Settings.mp4 (86.9 MB)
    • 060 Mac OS X - Privacy Tracking.mp4 (84.1 MB)
    • 063 Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 (83.5 MB)
    • 061 Linux and Unix like Operating systems.mp4 (80.9 MB)
    • 058 Windows 10 - WiFi Sense.mp4 (75.0 MB)
    • 051 Security Bugs and Vulnerabilities.mp4 (63.2 MB)
    • 056 Windows 10 Cortana.mp4 (49.0 MB)
    • 052 Usage Share.mp4 (45.4 MB)
    • 050 Security Features and Functionality.mp4 (41.1 MB)
    • 064 Linux - OpenBSD and Archlinux.mp4 (40.8 MB)
    • 049 Goals and Learning Objectives.mp4 (17.5 MB)
    • 065 Linux - Ubuntu.mp4 (10.0 MB)
    • 062 Linux - Debian.mp4 (7.8 MB)
    07 Security Bugs and Vulnerabilities
    • 073 Linux - Debian - Patching.mp4 (133.8 MB)
    • 072 Windows 7 8 8.1 10 - Automate the pain away from patching.mp4 (130.1 MB)
    • 074 Mac OS X - Patching.mp4 (108.0 MB)
    • 071 Windows - Criticality and Patch Tuesday.mp4 (78.2 MB)
    • 075 Firefox - Browser and extension updates.mp4 (71.4 MB)
    • 067 The Importance of Patching.mp4 (41.7 MB)
    • 068 Windows 7 - Auto Update.mp4 (26.8 MB)
    • 070 Windows 10 - Auto Update.mp4 (22.5 MB)
    • 078 Auto updates - The Impact to privacy and anonymity.mp4 (15.6 MB)
    • 077 IE and Edge - Browser and extention updates.mp4 (14.9 MB)
    • 076 Chrome - Browser and extension updates.mp4 (13.8 MB)
    • 069 Windows 8 8.1 - Auto Update.mp4 (12.9 MB)
    • 066 Goals and Learning Objectives.mp4 (11.7 MB)
    08 Reducing Threat Privilege
    • 079 Goals and Learning Objectives Removing Privilege.mp4 (81.0 MB)
    • 080 Windows 7 - Not using admin.mp4 (55.5 MB)
    • 081 Windows 8 and 8.1 - Not using admin.mp4 (53.1 MB)
    • 082 Windows 10 - Not using admin.mp4 (37.8 MB)
    09 Social Engineering and Social Media Offence and Defence
    • 084 Information Disclosure and Identity Strategies for Social Media.mp4 (201.4 MB)
    • 087 Behavioural Security Controls Against Social Threats Phishing Spam Part 2.mp4 (136.3 MB)
    • 085 Identify Verification and Registration.mp4 (56.1 MB)
    • 086 Behavioural Security Controls Against Social Threats Phishing Spam Part 1.mp4 (54.6 MB)
    • 088 Technical Security Controls Against Social Threats Phishing Spam Scam Cons.mp4 (52.4 MB)
    • 083 Goals and Learning Objectives.mp4 (12.6 MB)
    10 Security Domains
    • 090 Security Domains.mp4 (95.3 MB)
    • 089 Goals and Learning Objectives.mp4 (9.8 MB)
    11 Security Through Isolation and Compartmentalization

Description

Udemy - The Complete Cyber Security Course: Hacking Exposed
.................................................................................................................................................................................................................................................................

Volume 1: Learn how to stop hackers, prevent tracking, advanced anonymous browsing and counter government surveillance

Instructed by Nathan House

Published 6/2016


About This Course

Course Description

Learn a practical skill-set in defeating all online threats, including - advanced hackers, trackers, malware, zero days, exploit kits, cyber criminals and more.

Go from a beginner to advanced in this easy to follow expert course.

Covering all major platforms - Windows 7, Windows 8, Windows 10, MacOS and Linux.

This course covers the fundamental building blocks of your required skillset - You will understand the threat and vulnerability landscape through threat modelling and the risk assessment.

We explore the Darknet and mind-set of the cyber criminal. Covering malware, exploit kits, phishing, zero day vulnerabilities and much more.

You will learn about the global tracking and hacking infrastructures that nation states run. Covering the NSA, FBI, CIA, GCHQ, China's MSS and other intelligence agencies capabilities.

You will understand the foundations of operating system security and privacy functionality. A close look at the new Windows 10 privacy issues and how to best mitigate them.

There is a complete easy to follow crash course on encryption, how encryption can be bypassed and what you can do to mitigate the risks.

Master defences against phishing, SMShing, vishing, identity theft, scam, cons an other social engineering threats.

Finally we cover the extremely important, but underused security control of isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS.

This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.
- Volume 4 release data November 2016

What are the requirements?
A basic understanding of using operating systems, networks and the Internet. Be able to download and install software. A willingness to learn.
Most items referenced in this course are free. But you may elect to purchase additional software, hardware and services discussed in the course. Although It is absolutely not necessary to buy anything to understand and follow the course.
Please note this is Volume 1 of 4 of the complete course. After the completion of all 4 volumes you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy and anonymity.

What am I going to get from this course?
An advanced practical skillset in defeating all online threats - advanced hackers, trackers, malware and all Internet nastiness including mitigating government spying and mass surveillance.
In this volume we explore the threat landscape - The Darknets, dark markets, zero day vulnerabilities, exploit kits, malware, phishing and much more.
You will master encryption in an easy to follow crash course.
We cover operating system security, privacy and patching - On Windows 7, Windows 8, Windows 10, MacOS and Linux.
Go in-depth into security through physical and virtual isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS.
You will learn about nation state secret tracking and hacking infrastructure

What is the target audience?
This course is for anyone who wants to become an expert in security, privacy and anonymity. This volume covers the required foundation building blocks of that skillset.
For anyone who would love to gain a practical skillset in mitigating the risk from, malware, Trojans, hackers, tracker, cyber criminals and all online threats.
This course is for anyone who wants to keep their precious files, emails, accounts and personal information out of the hands of the bad guys.
For beginners and intermediate Internet users who are interested in security, safety and privacy.
For those who want privacy and anonymity online from hackers, corporations and governments.
This course is designed for personal and home Internet security, privacy and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal Internet security, privacy and anonymity.
.................................................................................................................................................................................................................................................................



Download torrent
9.7 GB
seeders:6
leechers:0
Udemy - The Complete Cyber Security Course: Hacking Exposed


Trackers

tracker name
udp://tracker.opentrackr.org:1337/announce
udp://tracker.openbittorrent.com:80/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://9.rarbg.me:2710/announce
µTorrent compatible trackers list

Download torrent
9.7 GB
seeders:6
leechers:0
Udemy - The Complete Cyber Security Course: Hacking Exposed


Torrent hash: AE6935A6E9D85C69AE573BA592D03D0BCA415C07