Windows 8: Hacking & Securing

Learn how to secure Windows 8. New operating system which is gaining popularity.
3.8 (4 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
419 students enrolled
$100
Take This Course
  • Lectures 79
  • Contents Video: 4 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 12/2014 English

Course Description

Windows 8 is operating system, which introduced many changes compared to the previous versions. The differences are not only in the appearance of your colorful desktop and icons, but also a lot of new security solutions.

Just think whether your computer actually belongs to you? Are you sure that in your network doesn't appear suspicious traffic? Hackers attack using automated techniques at the same time, hundreds of thousands of computers, often for fun and "blindly". So it is not a matter of IF you will be a victim of the attack, but WHEN it will happen.

Most Windows users do not use the built-in security mechanisms, which are provided by the system itself. For this reason, the client's machines very often become a zombie machines that remotely (without the user's knowledge), are used by hackers. Meanwhile, the correct configuration can prevent the majority of currently used attacks!

Windows 8: Hacking & Securing is recommended to people who benefit from this system either for personal or professional purposes. After the training, you will be able to effectively protect your system from most threats.

What are the requirements?

  • Basic IT knowledge

What am I going to get from this course?

  • Secure Windows 8
  • Prevent data leaks and loss
  • Secure networks
  • Use built-in security mechanisms
  • Know Windows 8 like an expert

What is the target audience?

  • Windows 8 users and administrators
  • IT Students
  • Future System Administrators

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Introduction
Introduction - Let's begin
Preview
03:43
Popular threats and vulnerability distribution
Preview
03:41
Computer infection rate
Preview
02:48
Dangerous software
04:16
Adware and malware
02:42
Rogue antiviruses
01:24
Windows 8 Security Features
04:34
Windows 8 Security improvements
03:18
Protection from network threats
01:44
System protection features
04:09
Section 2: Integral Security
Secure boot
03:03
What is the UEFI?
03:23
UEFI advantages
04:30
UEFI booting vs BIOS booting
02:06
Windows 7 booting vs Windows 8 booting
03:59
WIM - practice
03:20
Booting from USB - practice
02:51
Booting from USB - part 2
02:36
Benefits of USB booting
03:36
Account types
04:29
LiveID
03:38
Security of LiveID
02:45
Sign in options
03:15
Picture password
01:50
Automatic sign in
02:50
Easy system updates
04:48
Preinstalling drivers
03:18
Device Manager
01:37
Perventing installation of selected devices
05:19
Section 3: Protecting User Data
Software RAID
03:01
MBR <==> GPT - theory
04:41
MBR <==> GPT - practice
02:55
MBR <==> GPT - practice part 2
03:52
Disk redundancy
02:47
Configuring drives
04:14
Creating VHDX
03:19
Using VHDX
01:56
Data encryption
02:12
BitLocker
03:26
BitLocker tips
02:04
File history
02:11
NTFS permissions
04:55
EFS encryption
01:10
Dynamic access control
05:26
Skydrive
02:43
Files in cloud
03:39
Section 4: Internet Security
IP protocols
02:43
Network connections
01:52
Network and Sharing Center
04:17
Private/public host address
01:35
IPv6 Protocol
03:32
IPv6 addresses
03:10
Remote access
02:24
Diagnostic and troubleshooting
01:44
Windows Firewall
02:56
Groups
01:21
Configuring firewall
02:02
Rules
02:47
Smartscreen
04:34
Internet options
02:28
ALSR protection
01:44
Windows defender
05:06
Built-in security software
01:11
VPN protocols
03:20
Section 5: OS Protection
Action Center
03:07
Automatic maintaince
04:22
User account control
02:24
UAC default configuration
03:02
UAC permissions
02:32
Multiple local group policy
01:35
Use of GP
04:10
GP enforcement
00:43
Windows Store
04:03
WS Configuration
02:38
Classic Apps
03:17
Troubleshooting apps
02:15
AppLocker
03:51
New and improved system features
05:50
System refreshing
06:07

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

IT Security Academy, IT Security Certified Professional

IT Security Academy is a company that associates IT Security Professionals. Now we are proud to share our knowledge online. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. Our goal is to provide the highest quality materials you’ve ever seen online and prepare you not only for passing certification exams, but teach you pratical skills.

Instructor Biography

Hacking School, IT Security Experts - We turn beginners into professionals.

The Hacking School courses are prepared by people who are professionals in what they do. Authors of our courses are well known in the world of computer systems' security. Some of them took part in prominent international IT contests with great results.

We always provide you with up-to-date knowledge on IT security and ethical hacking. By joining us, you become part of a great international community, willing to help you and discuss.

Ready to start learning?
Take This Course