» » The Complete Cyber Security Course - Hackers Exposed

Download The Complete Cyber Security Course - Hackers Exposed

Download The Complete Cyber Security Course - Hackers Exposed
9.7 GB
Tutorials
Language: English
Category: Tutorials
Title: The Complete Cyber Security Course - Hackers Exposed
Rating: 4.7
Votes: 751
Downloads: 31
Size:
9.7 GB

Files

The Complete Cyber Security Course - Hackers Exposed 01 Introduction
  • 001 Welcome and Introduction to the Instructor.mp4 (59.1 MB)
  • 002 Goals and Learning Objectives - Volume 1.mp4 (70.4 MB)
  • 003 Target Audience.mp4 (49.7 MB)
  • 004 Study Recommendations.mp4 (95.8 MB)
  • 005 Course updates.mp4 (18.8 MB)
02 know Yourself - The Threat and Vulnerability Landscape
  • 006 Goals and Learning Objectives.mp4 (19.4 MB)
  • 007 Protect What You Value.mp4 (21.5 MB)
  • 008 What is Privacy Anonymity and Pseudonymity.mp4 (107.7 MB)
  • 009 Security Vulnerabilities Threats and Adversaries.mp4 (88.0 MB)
  • 010 Threat Modeling and Risk Assessments.mp4 (147.7 MB)
  • 011 Security vs Privacy vs Anonymity - Can we have it all.mp4 (41.2 MB)
  • 012 Defense In Depth.mp4 (6.9 MB)
  • 013 The Zero Trust Model.mp4 (76.7 MB)
  • The-Cyber-Security-Landscape-Diagram.jpg (777.2 KB)
03 Know Your Enemy - The Current Threat and Vulnerability Landscape
  • 014 Goals and Learning Objectives.mp4 (20.7 MB)
  • 015 Why You Need Security The Value Of A Hack.mp4 (114.6 MB)
  • 016 The Top 3 Things You Need To Stay Safe Online.mp4 (10.7 MB)
  • 017 Security Bugs and Vulnerabilities.mp4 (124.6 MB)
  • 018 Hackers crackers and cyber criminals.mp4 (61.2 MB)
  • 019 Malware viruses rootkits and RATs.mp4 (81.3 MB)
  • 020 Spyware Adware Scareware PUPs Browser hijacking.mp4 (71.9 MB)
  • 021 What is Phishing Vishing and SMShing.mp4 (54.9 MB)
  • 022 Spamming Doxing.mp4 (34.3 MB)
  • 023 Social engineering - Scams cons tricks and fraud.mp4 (93.4 MB)
  • 024 Darknets Dark Markets and Exploit kits.mp4 (204.2 MB)
  • 025 Governments spies and secret stuff part I.mp4 (136.3 MB)
  • 026 Governments spies and secret stuff part II.mp4 (164.0 MB)
  • 027 Encryption mandating insecurity legalizing spying.mp4 (330.2 MB)
  • 028 Trust Backdoors.mp4 (166.8 MB)
  • 029 Censorship.mp4 (41.6 MB)
  • 030 Security News and Alerts Stay Informed.mp4 (10.0 MB)
04 Encryption Crash Course
  • 031 Goals and Learning Objectives.mp4 (11.5 MB)
  • 032 Symmetric Encryption.mp4 (158.7 MB)
  • 033 Asymmetric Encryption.mp4 (79.3 MB)
  • 034 Hash Functions.mp4 (123.9 MB)
  • 035 Digital Signatures.mp4 (49.7 MB)
  • 036 Secure Sockets Layer SSL and Transport layer security TLS.mp4 (194.7 MB)
  • 037 SSL Stripping.mp4 (150.1 MB)
  • 038 HTTPS HTTP Secure.mp4 (132.8 MB)
  • 039 Digital Certificates.mp4 (118.5 MB)
  • 040 Certificate Authorities and HTTPS.mp4 (255.1 MB)
  • 041 End-to-End Encryption E2EE.mp4 (8.5 MB)
  • 042 Steganography.mp4 (172.7 MB)
  • 043 How Security and Encryption is Really Attacked.mp4 (24.5 MB)
05 Setting up a Testing Environment Using Virtual Machines
  • 044 Goals and Learning Objectives.mp4 (13.1 MB)
  • 045 Setting up a Testing Environment Using Virtual Machines.mp4 (193.3 MB)
  • 046 Vmware.mp4 (163.5 MB)
  • 047 Virtual box.mp4 (197.7 MB)
  • 048 Kali Linux 2016.mp4 (64.7 MB)
06 Operating System Security Privacy Windows vs Mac OS X vs Linux
  • 049 Goals and Learning Objectives.mp4 (17.5 MB)
  • 050 Security Features and Functionality.mp4 (41.1 MB)
  • 051 Security Bugs and Vulnerabilities.mp4 (63.2 MB)
  • 052 Usage Share.mp4 (45.4 MB)
  • 053 Windows 10 - Privacy Tracking.mp4 (108.0 MB)
  • 054 Windows 10 - Disable tracking automatically.mp4 (99.0 MB)
  • 055 Windows 10 - Tool Disable Windows 10 Tracking.mp4 (164.7 MB)
  • 056 Windows 10 Cortana.mp4 (49.0 MB)
  • 057 Windows 10 Privacy Settings.mp4 (86.9 MB)
  • 058 Windows 10 - WiFi Sense.mp4 (75.0 MB)
  • 059 Windows 7 8 and 8.1 - Privacy Tracking.mp4 (134.3 MB)
  • 060 Mac OS X - Privacy Tracking.mp4 (84.1 MB)
  • 061 Linux and Unix like Operating systems.mp4 (80.9 MB)
  • 062 Linux - Debian.mp4 (7.8 MB)
  • 063 Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 (83.5 MB)
  • 064 Linux - OpenBSD and Archlinux.mp4 (40.8 MB)
  • 065 Linux - Ubuntu.mp4 (10.0 MB)
07 Security Bugs and Vulnerabilities
  • 066 Goals and Learning Objectives.mp4 (11.7 MB)
  • 067 The Importance of Patching.mp4 (41.7 MB)
  • 068 Windows 7 - Auto Update.mp4 (26.8 MB)
  • 069 Windows 8 8.1 - Auto Update.mp4 (12.9 MB)
  • 070 Windows 10 - Auto Update.mp4 (22.5 MB)
  • 071 Windows - Criticality and Patch Tuesday.mp4 (78.2 MB)
  • 072 Windows 7 8 8.1 10 - Automate the pain away from patching.mp4 (130.1 MB)
  • 073 Linux - Debian - Patching.mp4 (133.8 MB)
  • 074 Mac OS X - Patching.mp4 (108.0 MB)
  • 075 Firefox - Browser and extension updates.mp4 (71.4 MB)
  • 076 Chrome - Browser and extension updates.mp4 (13.8 MB)
  • 077 IE and Edge - Browser and extention updates.mp4 (14.9 MB)
  • 078 Auto updates - The Impact to privacy and anonymity.mp4 (15.6 MB)
08 Reducing Threat Privilege
  • 079 Goals and Learning Objectives Removing Privilege.mp4 (81.0 MB)
  • 080 Windows 7 - Not using admin.mp4 (55.5 MB)
  • 081 Windows 8 and 8.1 - Not using admin.mp4 (53.1 MB)
  • 082 Windows 10 - Not using admin.mp4 (37.8 MB)
09 Social Engineering and Social Media Offence and Defence
  • 083 Goals and Learning Objectives.mp4 (12.6 MB)
  • 084 Information Disclosure and Identity Strategies for Social Media.mp4 (201.4 MB)
  • 085 Identify Verification and Registration.mp4 (56.1 MB)
  • 086 Security Controls Against Social Threats Phishing Spam Part 1.mp4 (54.6 MB)
  • 087 Security Controls Against Social Threats Phishing Spam Part 2.mp4 (136.3 MB)
  • 088 Security Controls Against Social Threats Phishing Spam Scam Cons.mp4 (52.4 MB)
10 Security Domains
  • 089 Goals and Learning Objectives.mp4 (9.8 MB)
  • 090 Security Domains.mp4 (95.3 MB)
11 Security Through Isolation and Compartmentalization
  • 091 Goals and Learning Objectives.mp4 (17.9 MB)
  • 092 Introduction to Isolation and Compartmentalization.mp4 (23.6 MB)
  • 093 Physical and Hardware Isolation - How to change the Mac Address.mp4 (64.9 MB)
  • 094 Physical and Hardware Isolation - Hardware Serials.mp4 (138.0 MB)
  • 095 Virtual Isolation.mp4 (115.0 MB)
  • 096 Dual Boot.mp4 (27.5 MB)
  • 097 Built-in Sandboxes and Application Isolation.mp4 (38.2 MB)
  • 098 Windows - Sandboxes and Application Isolation.mp4 (92.2 MB)
  • 099 Windows - Sandboxes and Application Isolation - Sandboxie.mp4 (173.9 MB)
  • 100 Linux - Sandboxes and Application Isolation.mp4 (37.8 MB)
  • 101 Mac OS X - Sandboxes and Application Isolation.mp4 (58.6 MB)
  • 102 Virtual Machines.mp4 (157.2 MB)
  • 103 Virtual Machine Weaknesses.mp4 (106.6 MB)
  • 104 Virtual Machine Hardening.mp4 (107.4 MB)
  • 105 Whonix OS - Anonymous Operating system.mp4 (285.2 MB)
  • 106 Whonix OS - Weaknesses.mp4 (78.0 MB)
  • 107 Qubes OS.mp4 (263.3 MB)
  • 108 Security Domains Isolation and Compartmentalization.mp4 (55.6 MB)
12 BONUS - Whats next... Volume 2 3 and 4
  • 109 BONUS - Important Information.mp4 (20.2 MB)
  • 110 Congratulations.mp4 (26.8 MB)
  • 111 BONUS Lecture from Volume 2 - Router Vulnerability Scanning Shodan Qualys.mp4 (204.0 MB)
  • 112 BONUS Lecture from Volume 2 - Password cracking part 2.mp4 (143.0 MB)
  • 113 BONUS Lecture from Volume 3 - Bypassing firewalls and HTTP proxies part 3.mp4 (122.2 MB)
  • 114 BONUS Lecture from Volume 4 - Email clients protocols and authentication.mp4 (181.1 MB)
  • 115 BONUS DISCOUNT COUPONS.html (5.4 KB)
  • Torrent Downloaded From Katcr.co - Kickasstorrents.txt (0.1 KB)

  • Info

    Volume 1 : Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security . Please note this is Volume 1 of 4 of the complete course

    Volume 1 : Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC. Please note this is Volume 1 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity. Learn a practical skill-set in defeating all online threats, including - advanced hackers, trackers, malware, zero days, exploit kits, cybercriminals and more. Become a Cyber Security Specialist - Go from a beginner to advanced in this easy to follow expert course.

    The complete cyber security course : hackers exposed. This course covers the fundamental building blocks of your required skill set – You will understand the threat and vulnerability landscape through threat modeling and risk assessments. The complete cyber security course : hackers exposed. 101 Cyber, Cyber Security, Exploits, Hackers, hacking, Linux, penetration, Vulnerabilities. We explore the Darknet and mindset of the cyber criminal. Covering malware, exploit kits, phishing, zero-day vulnerabilities and much more.

    July 11, 2018 ·. The Complete Cyber Security Course : Hackers Exposed! Volume 1 : Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC TAKE THIS.

    This course is amazing for anyone looking to understand the basic fundamentals of information security and become familiar with security tools and platforms. I will highly recommend this course for students having good academic experience in this field. Nathan is very effective instructor when you are going to start. His technical details is very much clear and in concise manner. Below is Course Summary:- Nathan House(Top Udemy Instructor) has created this course. Course is 12 hours long. It has one downloadable resource.

    ark:/13960/t04z07557. Internet Archive HTML5 Uploader .

    Cyber Security Course Volume 2 : Network Security, WiFi Security & Hackers, Firewalls, Wireshark and Best .

    course/?couponCode OCT1202. What are the necessities for The Complete Cyber Security Course : Hacking Exposed Udemy Course? An essential comprehension of utilizing working frameworks, systems and the Internet. Have the capacity to download and introduce programming.

    November 17, 2017 Video. This course covers the fundamental building blocks of your required skill set - You will understand the threat and vulnerability landscape through threat modeling and risk assessments. The Complete Cyber Security Course : Hackers Exposed! English MP4 AVC 1280 720 AAC 48KHz 2ch 11 Hours . 3 GB. Volume 1 : Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC.

    The Complete Cyber Security Course! Volume 1 : Hackers Exposed. Welcome to Volume 1 of 4 of the Complete Cyber Security Course! This course covers the fundamental building blocks of your required skill-set and will help you develop an understanding of the threat and vulnerability landscape through threat modelling and risk assessments. The course explores the Darknet and mind-set of the cyber criminal, covering malware, exploit kits, phishing, zero day vulnerabilities and much more. You will learn about the global tracking and hacking infrastructures that nation states run.

    The Complete Cyber Security Course : Hackers Exposed!
    Volume 1 : Learn how to stop hackers, prevent tracking, advanced anonymous browsing and counter government surveillance
    Requirements
    A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
    Please note this is Volume 1 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.
    Description
    Learn a practical skill-set in defeating all online threats, including - advanced hackers, trackers, malware, zero days, exploit kits, cybercriminals and more.
    Go from a beginner to advanced in this easy to follow expert course.
    Covering all major platforms - Windows 7, Windows 8, Windows 10, MacOS and Linux.
    This course covers the fundamental building blocks of your required skill set - You will understand the threat and vulnerability landscape through threat modeling and risk assessments.
    We explore the Darknet and mindset of the cyber criminal. Covering malware, exploit kits, phishing, zero-day vulnerabilities and much more.
    You will learn about the global tracking and hacking infrastructures that nation states run. Covering the NSA, FBI, CIA, GCHQ, China’s MSS and other intelligence agencies capabilities.
    You will understand the foundations of operating system security and privacy functionality. A close look at the new Windows 10 privacy issues and how to best mitigate them.
    There is a complete easy to follow crash course on encryption, how encryption can be bypassed and what you can do to mitigate the risks.
    Master defenses against phishing, SMShing, vishing, identity theft, scam, cons and other social engineering threats.
    Finally we cover the extremely important, but underused security control of isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS.
    This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.

The Complete Cyber Security Course - Hackers Exposed

Comments
Alister
#1 Alister
thanks