Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Mindfulness Personal Development Personal Transformation Meditation Life Purpose Emotional Intelligence Neuroscience
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Marketing Strategy Google Ads (AdWords) Certification Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Modeling Data Analysis Big Data
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Blogging Freelancing Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee
IT & Software Network & Security Ethical Hacking

Windows 8: Hacking & Securing - Complete Course

Learn how to secure your Windows 8 machine. This is a 100% practical, ethical hacking course.
Rating: 4.3 out of 54.3 (24 ratings)
552 students
Created by IT Security Academy, Hacking School
Last updated 11/2020
English
English [Auto]
30-Day Money-Back Guarantee

What you'll learn

  • Secure Windows 8
  • Prevent data leaks and loss
  • Secure networks
  • Use built-in security mechanisms
  • Know Windows 8 like an expert

Requirements

  • Basic IT knowledge

Description

LAST UPDATED: 11/2020

Windows 8 is an operating system which introduced many changes compared to the previous versions. The differences are not only in the appearance of your colorful desktop and icons, but also a lot of new security solutions. 

Does your computer actually belong to you? Are you sure that there's no suspicious traffic in your network? Hackers attack using automated techniques at the same time, hundreds of thousands of computers, often for fun and "blindly". 

Most Windows users do not use the built-in security mechanisms, which are provided by the system itself. For this reason, the client's machines often become "zombies" that remotely (and without the user's knowledge), are used by hackers. Meanwhile, the correct configuration can prevent the majority of currently used attacks.

Windows 8: Hacking & Securing is recommended to people who benefit from this system either for personal or professional purposes. After the training, you will be able to effectively protect your system from most threats. 

Who this course is for:

  • Windows 8 users and administrators
  • IT Students
  • Future System Administrators

Course content

8 sections • 83 lectures • 4h 27m total length

  • Welcome to the course
    00:05
  • Preview03:43
  • Preview03:41
  • Preview02:48
  • Dangerous software
    04:16
  • Adware and malware
    02:42
  • Rogue antiviruses
    01:24
  • Windows 8 Security Features
    04:34
  • Windows 8 Security improvements
    03:18
  • Protection from network threats
    01:44
  • System protection features
    04:09

  • Secure boot
    03:03
  • What is the UEFI?
    03:23
  • UEFI advantages
    04:30
  • UEFI booting vs BIOS booting
    02:06
  • Windows 7 booting vs Windows 8 booting
    03:59
  • WIM - practice
    03:20
  • Booting from USB - practice
    02:51
  • Booting from USB - part 2
    02:36
  • Benefits of USB booting
    03:36
  • Account types
    04:29
  • LiveID
    03:38
  • Security of LiveID
    02:45
  • Sign in options
    03:15
  • Picture password
    01:50
  • Automatic sign in
    02:50
  • Easy system updates
    04:48
  • Preinstalling drivers
    03:18
  • Device Manager
    01:37
  • Perventing installation of selected devices
    05:19

  • Software RAID
    03:01
  • MBR <==> GPT - theory
    04:41
  • MBR <==> GPT - practice
    02:55
  • MBR <==> GPT - practice part 2
    03:52
  • Disk redundancy
    02:47
  • Configuring drives
    04:14
  • Creating VHDX
    03:19
  • Using VHDX
    01:56
  • Data encryption
    02:12
  • BitLocker
    03:26
  • BitLocker tips
    02:04
  • File history
    02:11
  • NTFS permissions
    04:55
  • EFS encryption
    01:10
  • Dynamic access control
    05:26
  • Skydrive
    02:43
  • Files in cloud
    03:39

  • IP protocols
    02:43
  • Network connections
    01:52
  • Network and Sharing Center
    04:17
  • Private/public host address
    01:35
  • IPv6 Protocol
    03:32
  • IPv6 addresses
    03:10
  • Remote access
    02:24
  • Diagnostic and troubleshooting
    01:44
  • Windows Firewall
    02:56
  • Groups
    01:21
  • Configuring firewall
    02:02
  • Rules
    02:47
  • Smartscreen
    04:34
  • Internet options
    02:28
  • ALSR protection
    01:44
  • Windows defender
    05:06
  • Built-in security software
    01:11
  • VPN protocols
    03:20

  • Action Center
    03:07
  • Automatic maintaince
    04:22
  • User account control
    02:24
  • UAC default configuration
    03:02
  • UAC permissions
    02:32
  • Multiple local group policy
    01:35
  • Use of GP
    04:10
  • GP enforcement
    00:43
  • Windows Store
    04:03
  • WS Configuration
    02:38
  • Classic Apps
    03:17
  • Troubleshooting apps
    02:15
  • AppLocker
    03:51

  • New and improved system features
    05:50
  • System refreshing
    06:07

  • Writing a shellcode
    17:35

  • BONUS LECTURE: Learn more and get to know our other courses
    00:40
  • Thank you for joining the training
    00:05

Instructors

IT Security Academy
IT Security Certified Professional
IT Security Academy
  • 4.0 Instructor Rating
  • 8,965 Reviews
  • 173,083 Students
  • 17 Courses

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Hacking School
IT Security Experts - We turn beginners into professionals.
Hacking School
  • 4.0 Instructor Rating
  • 8,965 Reviews
  • 173,083 Students
  • 17 Courses

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Impressum Kontakt
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.