YoVDO

The Absolute Beginners Guide to Information Security - Part 2

Offered By: Skillshare

Tags

Information Security (InfoSec) Courses Encryption Courses Privacy Courses Malware Courses Anonymity Courses Virtual Private Networks Courses

Course Description

Overview

Take your basic knowledge of information security to a whole new level with this exciting course that promises to be educational, informative and fun filled. 

Build upon a basic foundation in Information Security with a strong focus on the following core topics.

  • Networking

  • Privacy & Anonymity

  • Malware

  • Email Security

  • Backups & Encryption

  • Windows 10 Hardening

What are the main benefits of taking this course?

I am glad you asked. This course has been designed to provide you with the knowledge and tools to not only better protect yourself against malware but to also prepare you for a career in the information security field if you so wish. 

In this course you will learn the following practical skills

  • How to use a proxy server

  • How to setup and use a virtual private network

  • How to use Tor to access the dark web anonymously

  • Best practices to browse the internet securely and privately

  • How to set up a firewall

  • How to use a rootkit scanner

  • How to encrypt your emails

  • How to track emails you have sent and also how to detect if you are being tracked

  • How to use 3 major anti-malware software products

  • How to completely harden the Windows 10 operating system

  • How to backup and encrypt your hard drive

  • How to choose the right anti virus

  • and much much much more

You will also learn how to use a wide variety of software to improve your security game and these include:

  • Virtual Private Networks

  • Kaspersky Antivirus

  • Bitlocker

  • Proxy servers

  • Bleachbit

  • Tor

  • CCleaner

  • Protonmail

  • Duckduck go

  • Brave Browser

  • Ugly Email

  • Mail Tracker

  • Nord VPN

  • GMER Rootkit scanner

  • Secure Boot

  • Veracrypt

  • Filevault

  • Guerrilla Mail

  • Comodo Firewall

  • Lastpass

* PERFECT FOR BEGINNERS *

You don't need to have a background in information security though any sort of prior knowledge would be beneficial. This course is designed in such a manner that as long as you know how to use a computer and the internet, you will be able to understand and apply everything you are taught.

Take control of your privacy and security - Enroll Today in one of the very information security courses you will find online.


Syllabus

  • Course Promo
  • Welcome to the Course
  • Networking 101 Section Preview
  • Meet Julian Assange
  • IP and MAC Addresses
  • Hubs Switches and Routers
  • Ethernet 101
  • HTTP, HTTPS, SSL and TLS
  • The Internet Protocol Suite
  • The DNS System
  • The Internet and Survival of the Paranoid Section Preview
  • Privacy Anonnymity Pseudonymity
  • Identity Strategies
  • How We Are Tracked Online
  • FaceBook vs Cambridge Analytica Scandal
  • Exercise How muc data does Facebook have on me
  • 5 Places You are Being Tracked
  • Browsing Incognito
  • Introduction to DuckDuckGo
  • Introduction to Brave Browser
  • How to Disappear Online
  • Introduction to Stylometry
  • Annonymizers Section Preview
  • Anonymizer
  • Introduction to Proxy Servers
  • Introduction to Virutal Private Networks
  • Types of VPNs
  • NordVPN
  • VPN Myths Debunked
  • Using Tor
  • Tor Weaknesses
  • Attacking Tor
  • The Dark Web
  • The Darknet
  • Combining VPN and Tor
  • Meet Eldo Kim
  • Malware Section Preview
  • Introduction to Malware
  • Viruses and Worms
  • How an Antivirus Works
  • Choosing an Antivirus Software
  • Rootkits
  • Securing the Windows 10 Boot Process
  • Using GMER Rootkit Scanner
  • Ransomware
  • Using the builtin Antiramsomware Tool
  • Using the CCleaner Software
  • Using Bleachbit
  • Malwarebytes
  • Backups and Encryption Section Preview
  • How to Backup Windows 10
  • Introduction to Cloud Computing
  • Encryption and Decryption
  • Encryption with Veracrypt
  • Encryption with Bitlocker
  • MAC Encryption with Filevault
  • Self Encrypting Drives
  • Encryption Attacks and Mitigations
  • How to Password Protect USB Drives and Folders
  • Social Engineering Section Preview
  • Introduction to Social Engineering
  • Reconnaissance
  • Anatomy of a Social Engineering Attack
  • The Way Back Machine
  • Meet Kevin Mitnick
  • Emails Section Preview
  • Email Basics, Ports and Protocols
  • How to Track Sent Emails
  • How to Detect Email Tracking
  • Using Guerrilla Mail
  • Using Proton Mail
  • Phishing Attacks
  • Windows 10 Hardening Section Preview
  • Patching and Updates
  • Turning off ad tracker
  • Restricting Cortana
  • Turning off Location Tracking
  • Turning off Peer Updates
  • The Windows 10 Firewall
  • The Windows 10 Smart Screen Filter
  • Randomizing the MAC Address
  • Connect with Me - Cyber Platforms
  • Conclusion

Taught by

Alexander Oni

Related Courses

Information Security and Risk Management: An Overview
University of Washington via Canvas Network
Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX
Information Security Policy and Management
Coventry University via FutureLearn
Information Security - Advanced topics
New York University (NYU) via edX
Information Security - Authentication and Access Control
New York University (NYU) via edX