Applied Cyber Security for Professionals
3.6 (26 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
3,065 students enrolled

Applied Cyber Security for Professionals

Cyber Security for Windows 10. Beginners Level.
3.6 (26 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
3,065 students enrolled
Last updated 6/2019
English [Auto]
Current price: $44.99 Original price: $64.99 Discount: 31% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 1 hour on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Learn from a Cyber Security professional who has actually fought against Hackers and Cyber Criminals.
  • Learn Cyber Security from a professional perspective.
  • Learn how Cyber Security is applied when individuals and companies depend on you and the job you have done.
  • Learn how Hackers actually hack into systems and companies when they have been paid for doing so.
  • Learn how to begin protecting Windows 10 against remote attacks used by Hackers for reliably hack into system and companies.
  • Learn the core concepts and main goals of Cyber Security.
  • Learn which Cyber Security solutions are most likely to help protecting your company and take the right decisions.
  • Windows 10 Home or Professional is needed to take this course.
  • Basic knowledge of Windows 10 and Computing systems in general.

Are you ready to defend your system or company against real Hackers and advanced Cyber Attacks?

While Pen Testing may propose a theoretical scenario, Hackers attacking a company or a given system have been hired to do so; they are highly motivated and relentless!

They study their target, crafting new exploits and malware accordingly. They won’t stop at your brand new Firewall or latest trendy Antimalware.

But how can you be prepared to defend against this type of pervasive attacks, unless you already understand how these are performed.

Beyond Phishing emails and malicious websites and other tactics that may be surpassed by the user’s common sense, you need to know how Hackers actually hack into systems and companies when they have been paid to do so.

What should you prioritize as a Cyber Security Officer for ensuring the safety of your users, integrity of the systems and that day-to-day businesses operations don't get hindered?

Nowadays Cyber Security solutions pileup by the score. Which solutions actually work? What should the company invest into? What’s the right choice to make?

This course will help you to answer all these questions, by teaching not just how Cyber Attacks actually occur in the real world, but what techniques are used by real Hackers (not only Pen Testers) to reliably hack into system and companies. And most importantly, what can you do to start protecting your system against such type of attacks.

Moreover, this course was developed from experience of protecting companies under this type of circumstances.

As such this course wasn’t developed from performing Penetration Tests against these companies, but form actively defining them against real Hackers!

For this reason, this course observes Cyber Security from a professional point of view, or from an environment in which budgeting, use of resources and implementation at big scale actually matters.

And thus, is not the intention of this course to lead the user into install multiple third party applications, that cannot be realistically implemented in business environments and across multiple users.

Nevertheless, and due how extensive and complex Cyber Security could be, as more than one single set of steps, is a series of different engineering disciplines put together under this term, this introductory course address the most simple elements of the matter, and hence focuses on Windows 10; versions Home and Professional.

And for this same reason, and as a beginners level course, this doesn’t pretend to cover every aspect of security present in Windows 10. But the core aspects that will allow you to protect your system against the type of Cyber Attacks described during this course. And which as a matter of fact are the most effective ones.

Finally another very important aspect of this course, and that will allow you to further develop your skills, by putting you in the right track, is that it will teach you the core aspect of Cyber Security; what are we trying to protect exactly within a system and what could be the ideal scenario in which hacking is no longer possible!


1. Is this a complete course about Cyber Security?

No, this is an introductory course to the matter. But it’s aimed to those wanting to or being in the position of protecting systems or companies against real Cyber Attacks.

What’s your experience regarding Cyber Security?

As of now I have 10 years of experience working in Cyber Security, being the most significant highlight of my career to intervene when companies are being persistently attacked by hackers or Cyber Criminals.

Although and while these are extreme cases, most of the time I help companies to perform security audits and train IT personnel.

2. What do you mean “not from Pen Testing” only?

There are many Cyber Security books and courses that are created from the assumption of what a Cyber Attack could be. And which mostly use commercial Pen-Testing tools as reference.

However this will never prepare a Cyber Security officer for facing an actual Cyber Attack, as hackers  (often times a team of 6 or more people), will most likely develop their own exploits and malware for attacking a given target.

Nevertheless all these share a common goal. And by understanding what this is, you will begin taking the first steps for presenting an effective defense.

3. I am a Network / System Administration with some experience in this subject. Is this course still useful for me?

Yes, although this is an introductory course, you may have never faced an actual Cyber Attack or have whatever you have implemented in terms of protection, contested by real Cyber-criminals. And thus this course should at least give you a new insight regarding Cyber Security.

4. Can you elaborate more into the subjects covered in this course?

Sure, just please let me know what do you need me to cover in further detail and I’ll be happy to add new lectures accordingly.

Who this course is for:
  • Individuals or companies who are concern about Cyber Security and protecting against Cyber Threats in general.
  • Windows 10 users who are concern about Cyber Security and protecting against Cyber Cyber Threats in general.
  • Those planning on investing on Cyber Security solutions for their company or business.
  • Companies or Individuals which have or are currently facing a persistent Cyber Attack to their systems.
  • System or Network administrators may find this course to be somehow useful.
Course content
Expand all 11 lectures 01:12:50
+ Introduction. Understanding most common Cyber Security solutions for bussines.
2 lectures 13:02

We all have heard about VPNs and how this may protect us against hackers and so forth. But what’s the protection they actually offer? And is this an actually reliable way of protecting our system?

Should we use it across all systems in a company?

Take a look at this lesson and find out!

Preview 07:41

Along with Next Generation Firewalls, Intrusion Prevention Systems are one of the most prevalent Cyber Security Solutions for Businesses. Quite commonly companies and business everywhere will acquire a NGFW (Next Generation Firewall) appliance at some at some point.

But are these an actual protection against highly motivated (paid) Hackers who need to affect our systems?

Preview 05:21
Quiz for Section 1
2 questions
+ Understanding Cyber Attacks and Modern Hacking techniques.
1 lecture 07:01

The most effective way to begin protecting against any sort of attack, is understanding how this take place. As from there, you can actually start coming with a solution.

While there are many things that could be classified as a Cyber Attack, only a limited number of techniques can be reliably used by hackers.

Learn what Hackers actually do when they have the job of accessing a system and disturb day to day business operations.

How modern Cyber Attacks are performed.
Quiz for Section 2
1 question
+ First Solutions for protecting Windows 10.
5 lectures 31:53

Unlike what one may think, you don’t need to look for any third party application for protecting your Operating System, as it happens Windows already provide some interesting tools for defining our system.

First solutions. Understanding Processes.

Now that we start having a more clear understanding of both the tactics used by Hackers and the available mitigation methods, let’s get deeper into the matter and take a look at a more modern mitigation technique.

Control Flow Guard.

As we have seen Hackers are relentless and adaptable. Luckily we have just get started with the wide range of mitigation techniques available within Windows.

Processes, Memory, 32 or 64 bits?! Everything matters! Take a look at this lecture and get a deeper knowledge of your system.

Processes and High Entropy.

As mitigation techniques become address more and more issues and vulnerabilities, hackers need to become more creative when developing exploitation techniques.

Although this tend to overlap with some tactics which are pretty common, such as a Buffer Overflow.

But what’s a buffer overflow and why is so prevalent when we talk about Cyber Attacks?

Take a look at this lesson and find out!

More advanced Exploitation Techniques and Buffer Overflows!

We are almost done with the basic mitigation techniques available in Windows 10, but this is just the beginning as there are many more we can do to protect our system, against the ever evolving hacking and exploitation techniques.

More into the basic structure of a process and how to protect it!
Quiz for Section 3
4 questions
+ Files Protection.
1 lecture 06:27
Protecting Files & Folders.
Quiz for Section 4
1 question
+ Virtual Machines and Sandbox Applications.
2 lectures 14:27

Virtual Machines and Virtualization have become as staple in Cyber Security solutions. However most people, due the lack of understanding about how modern Cyber Attacks are performed, don’t make a proper use of these solutions.

Leaving their systems open and sometimes more vulnerable than otherwise.

Take a look at this lesson and learn some important guidelines.

A note on Virtual Machines and Cyber Security.

Sandbox applications are also another staple in Cyber Security, or at least some people consider this to be a staple.

Nevertheless and instead of just following the trend, is better to understating what’s the purpose, goals and limitation of these type of applications.

Take a look at this lecture and decide for yourself!

Last but not least, let’s take a look at the subject of encryption using Windows 10 tools.

A note on Sandbox Applications & Encryption.
Quiz for Section 5
3 questions