The Absolute Beginners Guide to Cyber Security 2020 - Part 2
4.6 (2,342 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
9,468 students enrolled

The Absolute Beginners Guide to Cyber Security 2020 - Part 2

Learn about Networking, Malware, Encryption, VPNs, Privacy, Email Security, Social Engineering, Backups and so much more
4.6 (2,342 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
9,468 students enrolled
Created by Alexander Oni
Last updated 5/2020
English
English [Auto]
Current price: $139.99 Original price: $199.99 Discount: 30% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 6.5 hours on-demand video
  • 8 articles
  • 1 Practice Test
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Take up entry roles for IT and Cyber security jobs
  • Configure and setup a VPN
  • How to completely harden the Windows 10 operating system
  • Use Tor to browse the internet anonymously
  • Learn how backup and encrypt their hard drive
  • Understand the basics of networking
  • How to choose the right Anti Virus software
  • How to encrypt and track emails
  • How to set up a firewall
Requirements
  • You should have an intermediate knowledge on how to use a computer and the internet
  • You should have a basic knowledge of cyber and computer security
Description

** PART 2 OF THE BEST SELLING CYBER SECURITY GUIDE FOR BEGINNERS SERIES **

Take your basic knowledge of cyber security to a whole new level with this exciting course that promises to be educational, informative and fun filled. 

Build upon a basic foundation in Cyber Security with a strong focus on the following core topics.

  • Networking

  • Privacy & Anonymity

  • Malware

  • Email Security

  • Backups & Encryption

  • Windows 10 Hardening

What are the main benefits of taking this course?

I am glad you asked. This course has been designed to provide you with the knowledge and tools to not only better protect yourself against malware but to also prepare you for a career in the cyber security field if you so wish. 

You will learn all the latest techniques used in the world of cyber security today and understand how a lot security technologies work behind the scenes.

In this course you will learn the following practical skills

  • How to use a proxy server

  • How to setup and use a virtual private network

  • How to use Tor to access the dark web anonymously

  • Best practices to browse the internet securely and privately

  • How to set up a firewall

  • How to use a rootkit scanner

  • How to encrypt your emails

  • How to track emails you have sent and also how to detect if you are being tracked

  • How to use 3 major anti-malware software products

  • How to completely harden the Windows 10 operating system

  • How to backup and encrypt your hard drive

  • How to choose the right anti virus

  • and much much much more

You will also learn how to use a wide variety of software to improve your security game and these include:

  • Virtual Private Networks

  • Kaspersky Antivirus

  • Bitlocker

  • Proxy servers

  • Bleachbit

  • Tor

  • CCleaner

  • Protonmail

  • Duckduck go

  • Brave Browser

  • Ugly Email

  • Mail Tracker

  • Nord VPN

  • GMER Rootkit scanner

  • Secure Boot

  • Veracrypt

  • Filevault

  • Guerrilla Mail

  • Comodo Firewall

  • Lastpass

 Jobs in Cyber security are plentiful and this course will help prepare you for entry level roles by providing you with a solid set of skills to build up on.

* PERFECT FOR BEGINNERS *

You don't need to have a background in cyber security though any sort of prior knowledge would be beneficial. This course is designed in such a manner that as long as you know how to use a computer and the internet, you will be able to understand and apply everything you are taught.

Content and Overview   Suitable for non professionals and students with a basic understanding of cyber security. In this course of nearly 100 lectures and almost 7 hours of content, you’ll learn all of the core cyber security fundamentals and develop a strong understanding of how security and privacy can either be maintained or deprived from a user. Each chapter closes with a section review highlighting the core points raised in the section.

Starting with Networking 101, you will learn the basics of networking including what the TCP/IP protocol suite is and how the domain name system works.

With the basics of networking mastered, you will be ready to jump into the course proper with the following section where you will begin to learn about privacy and anonymity. You will learn how advertisers and websites are able to track you online and what you can do about it.

You will then move on to a more advanced section where you will be introduced to Anonymizers. You will learn how to work with proxy servers and how to setup and configure a Virtual Private Network. We will also explore how to use Tor to access the dark web as well as the pros and cons of using anonymizers. By the end of this section, you would have learned techniques and skills that you can use to secure your privacy online.

Section 5 covers malware with a special focus on viruses, rootkits and ransomware. You will learn how these various forms of malware can affect you plus you will also be introduced to a variety of anti-malware software that you can use to fight against malware.

We will then move to discuss about backups and encryption. You will learn about cloud backups as well the advantages and disadvantages of using this type of technology. I will then show you how you can back up and encrypt your hard drive and sensitive files.

Section 7 covers one of the most interesting aspects of cyber security - Social Engineering. You will learn about the different tactics employed by social engineers to extract important information without using any technical skills. We will explore how hackers exploit human psychology and fool their targets.

Email security will be covered in the very next section. Emails are a fundamental component of our daily lives and you will learn exactly how emails are sent and received behind the scenes. You will learn how to track emails and how to use mail services like guerrilla mail and proton mail.

In the final section of the course, you will learn how to harden the Windows 10 operating system against malware. Windows 10 by default is vulnerable to malware but with a few adjustments, you can make it far more secure and you will learn this tricks in this section.

Complete with resources and section reviews, you’ll be able to apply what you have learnt in this course either at home or at your place of work and will receive a verifiable certificate of completion upon finishing the course.

Take control of your privacy and security - Enroll Today in one of the very best cyber security courses you will find online.

Who this course is for:
  • Anyone who wants to begin a career as a cyber security professional
  • Students who want to learn practical techniques on how to protect their privacy online
  • Students who want to have a deeper understanding of many of the major topics in cyber security
Course content
Expand all 95 lectures 06:45:42
+ Networking 101
9 lectures 38:36
Hubs, Switches and Routers
05:20
Ethernet 101
02:34
HTTP, HTTPS, SSL & TLS
06:29
The Internet Protocol Suite - TCP/IP
06:47
Understanding the DNS System
06:22
Section Review and Key Points
00:36
+ The Internet - Privacy & Survival of the Paranoid
14 lectures 01:03:46
Section Preview
01:22
What is Privacy, Anonymity and Pseudonymity
04:38
Identity Strategies
10:37
The FaceBook Data Mining Scandal
07:45
Lab - How Much Does Facebook Know about You
03:18
5 Places You are Tracked Online
04:16
Cookies
01:33
Browsing in Icognito Mode - The Shocking Truth !!!
03:55
The Brave Browser
04:20
How to Disappear Online
03:56
Introduction to Stylometry
06:02
Section Review and Key Points
00:21
+ Anonymizers, Proxies, Virtual Private Networks & Tor
15 lectures 01:16:42
Section Preview
00:56
Annonymizer
03:52
Introduction to Proxy Servers
07:19
Introduction to VPNs
04:52
Types of VPNs
06:16
NordVPN
07:46
VPN Myths Debunked
06:40
Introduction to Tor
09:57
Tor Weaknesses
05:03
Attacking Tor - The end to end Correlation Hack
04:40
Accessing the Dark Web with Tor
08:15
Darknets
03:24
VPN + Tor
05:13
Meet Eldo Kim
01:52
Section Review and Key Points
00:37
+ Malware, Viruses, Rootkits, Ransomware & Attacks
14 lectures 01:04:52
Section Preview
00:46
Introduction to Malware
04:52
Viruses & Worms
04:51
Antivirus
04:34
Choosing the Right Antivirus Software
08:34
Rootkits
05:06
Securing the Windows 10 Boot Process
05:27
Using GMER - Rootkit Scanner
01:39
Ransomware - Cryptolocker, WannaCry, Bad Rabbit
08:00
Using the inbuilt AntiRansomware Tool
02:14
CC Cleaner
07:57
Bleachit
03:50
Malwarebytes
06:35
Section Review and Key Points
00:27
+ Backups, Storage, The Cloud and Encryption
11 lectures 49:52
Section Preview
00:54
How to Backup Your Computer
04:26
What is the Cloud?
09:39
Disk Encyrption
04:24
Encrypting with Veracrypt
09:22
Encrypting Windows 10 with Bitlocker
02:06
Encrypting Mac OS with FileVault
00:57
Self Encrypting Drives
00:44
Attacks Against Encryption
06:09
How to Password Protect USB Drives, Files & Folders
10:46
Section Review and Key Points
00:25
+ Social engineering - Scams, cons, tricks and fraud
7 lectures 34:52
Section Preview
00:49
What is Social Engineering?
10:30
Reconnaissance Methods
08:42
Anatomy of a Social Engineering Attack
08:50
The Way Back Machine
03:43
Meet Kevin Mitnick
01:38
Section Review and Key Points
00:40
+ The World of Electronic Mails - Dangers, Attacks & Protection
10 lectures 37:38
Section Preview
01:09
Email Basics, Protocols & Ports
06:01
How to Track Sent Emails
03:10
How to Detect Email Tracking
02:38
Guerrilla Mail
04:38
Introducing Proton Email
04:13
Review Update
02:42
Phishing Attacks
05:12
Scam Email Live Example
07:32
Section Review and Key Points
00:23
+ Windows 10 Hardening, Privacy & Security
9 lectures 24:55
Section Preview
00:39
Patching and Updates
04:22
Windows 10 Privacy - Turning off Ad Tracking
02:29
Windows 10 Privacy - Restricting Cortana
03:22
Windows 10 Privacy - Turning off Location Tracking
03:12
Windows 10 Privacy - Turning off Peer Updates
03:43
Windows 10 Hardening - The Windows 10 Firewall
02:22
Windows 10 Hardening - Enabling the Smart Screen Filter
02:39
Windows 10 Hardening - Randomizing the MAC Address
02:07
+ Final Exam & Conclusion
4 lectures 09:18
Exam Preview
00:38

Its time to test your knowledge on all that you have learned in this course.

FINAL EXAM
25 questions
Other Cyber Security Courses
04:46
Getting your Certificate
03:00
Conclusion
00:54