Windows 8: Hacking & Securing
3.8 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
451 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Windows 8: Hacking & Securing to your Wishlist.

Add to Wishlist

Windows 8: Hacking & Securing

Learn how to secure Windows 8. New operating system which is gaining popularity.
3.8 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
451 students enrolled
Last updated 10/2014
English
Current price: $10 Original price: $100 Discount: 90% off
6 days left at this price!
30-Day Money-Back Guarantee
Includes:
  • 4 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Have a coupon?
What Will I Learn?
Secure Windows 8
Prevent data leaks and loss
Secure networks
Use built-in security mechanisms
Know Windows 8 like an expert
View Curriculum
Requirements
  • Basic IT knowledge
Description

LAST UPDATED: FEBRUARY 2017

Windows 8 is operating system, which introduced many changes compared to the previous versions. The differences are not only in the appearance of your colorful desktop and icons, but also a lot of new security solutions.

Just think whether your computer actually belongs to you? Are you sure that in your network doesn't appear suspicious traffic? Hackers attack using automated techniques at the same time, hundreds of thousands of computers, often for fun and "blindly". So it is not a matter of IF you will be a victim of the attack, but WHEN it will happen.

Most Windows users do not use the built-in security mechanisms, which are provided by the system itself. For this reason, the client's machines very often become a zombie machines that remotely (without the user's knowledge), are used by hackers. Meanwhile, the correct configuration can prevent the majority of currently used attacks!

Windows 8: Hacking & Securing is recommended to people who benefit from this system either for personal or professional purposes. After the training, you will be able to effectively protect your system from most threats.

Who is the target audience?
  • Windows 8 users and administrators
  • IT Students
  • Future System Administrators
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 79 Lectures Collapse All 79 Lectures 04:08:45
+
Introduction
10 Lectures 32:19



Dangerous software
04:16

Adware and malware
02:42

Rogue antiviruses
01:24

Windows 8 Security Features
04:34

Windows 8 Security improvements
03:18

Protection from network threats
01:44

System protection features
04:09
+
Integral Security
19 Lectures 01:03:13
Secure boot
03:03

What is the UEFI?
03:23

UEFI advantages
04:30

UEFI booting vs BIOS booting
02:06

Windows 7 booting vs Windows 8 booting
03:59

WIM - practice
03:20

Booting from USB - practice
02:51

Booting from USB - part 2
02:36

Benefits of USB booting
03:36

Account types
04:29

LiveID
03:38

Security of LiveID
02:45

Sign in options
03:15

Picture password
01:50

Automatic sign in
02:50

Easy system updates
04:48

Preinstalling drivers
03:18

Device Manager
01:37

Perventing installation of selected devices
05:19
+
Protecting User Data
17 Lectures 54:31
Software RAID
03:01

MBR <==> GPT - theory
04:41

MBR <==> GPT - practice
02:55

MBR <==> GPT - practice part 2
03:52

Disk redundancy
02:47

Configuring drives
04:14

Creating VHDX
03:19

Using VHDX
01:56

Data encryption
02:12

BitLocker
03:26

BitLocker tips
02:04

File history
02:11

NTFS permissions
04:55

EFS encryption
01:10

Dynamic access control
05:26

Skydrive
02:43

Files in cloud
03:39
+
Internet Security
18 Lectures 48:46
IP protocols
02:43

Network connections
01:52

Network and Sharing Center
04:17

Private/public host address
01:35

IPv6 Protocol
03:32

IPv6 addresses
03:10

Remote access
02:24

Diagnostic and troubleshooting
01:44

Windows Firewall
02:56

Groups
01:21

Configuring firewall
02:02

Rules
02:47

Smartscreen
04:34

Internet options
02:28

ALSR protection
01:44

Windows defender
05:06

Built-in security software
01:11

VPN protocols
03:20
+
OS Protection
15 Lectures 49:56
Action Center
03:07

Automatic maintaince
04:22

User account control
02:24

UAC default configuration
03:02

UAC permissions
02:32

Multiple local group policy
01:35

Use of GP
04:10

GP enforcement
00:43

Windows Store
04:03

WS Configuration
02:38

Classic Apps
03:17

Troubleshooting apps
02:15

AppLocker
03:51

New and improved system features
05:50

System refreshing
06:07
About the Instructor
IT Security Academy
4.1 Average rating
1,971 Reviews
68,160 Students
24 Courses
IT Security Certified Professional

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Hacking School
4.0 Average rating
1,695 Reviews
62,303 Students
13 Courses
IT Security Experts - We turn beginners into professionals.

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.