The Absolute Beginners Guide to Information Security - Part 2
Offered By: Skillshare
Course Description
Overview
Take your basic knowledge of information security to a whole new level with this exciting course that promises to be educational, informative and fun filled.
Build upon a basic foundation in Information Security with a strong focus on the following core topics.
-
Networking
-
Privacy & Anonymity
-
Malware
-
Email Security
-
Backups & Encryption
-
Windows 10 Hardening
What are the main benefits of taking this course?
I am glad you asked. This course has been designed to provide you with the knowledge and tools to not only better protect yourself against malware but to also prepare you for a career in the information security field if you so wish.
In this course you will learn the following practical skills
-
How to use a proxy server
-
How to setup and use a virtual private network
-
How to use Tor to access the dark web anonymously
-
Best practices to browse the internet securely and privately
-
How to set up a firewall
-
How to use a rootkit scanner
-
How to encrypt your emails
-
How to track emails you have sent and also how to detect if you are being tracked
-
How to use 3 major anti-malware software products
-
How to completely harden the Windows 10 operating system
-
How to backup and encrypt your hard drive
-
How to choose the right anti virus
-
and much much much more
You will also learn how to use a wide variety of software to improve your security game and these include:
-
Virtual Private Networks
-
Kaspersky Antivirus
-
Bitlocker
-
Proxy servers
-
Bleachbit
-
Tor
-
CCleaner
-
Protonmail
-
Duckduck go
-
Brave Browser
-
Ugly Email
-
Mail Tracker
-
Nord VPN
-
GMER Rootkit scanner
-
Secure Boot
-
Veracrypt
-
Filevault
-
Guerrilla Mail
-
Comodo Firewall
-
Lastpass
* PERFECT FOR BEGINNERS *
You don't need to have a background in information security though any sort of prior knowledge would be beneficial. This course is designed in such a manner that as long as you know how to use a computer and the internet, you will be able to understand and apply everything you are taught.
Take control of your privacy and security - Enroll Today in one of the very information security courses you will find online.
Syllabus
- Course Promo
- Welcome to the Course
- Networking 101 Section Preview
- Meet Julian Assange
- IP and MAC Addresses
- Hubs Switches and Routers
- Ethernet 101
- HTTP, HTTPS, SSL and TLS
- The Internet Protocol Suite
- The DNS System
- The Internet and Survival of the Paranoid Section Preview
- Privacy Anonnymity Pseudonymity
- Identity Strategies
- How We Are Tracked Online
- FaceBook vs Cambridge Analytica Scandal
- Exercise How muc data does Facebook have on me
- 5 Places You are Being Tracked
- Browsing Incognito
- Introduction to DuckDuckGo
- Introduction to Brave Browser
- How to Disappear Online
- Introduction to Stylometry
- Annonymizers Section Preview
- Anonymizer
- Introduction to Proxy Servers
- Introduction to Virutal Private Networks
- Types of VPNs
- NordVPN
- VPN Myths Debunked
- Using Tor
- Tor Weaknesses
- Attacking Tor
- The Dark Web
- The Darknet
- Combining VPN and Tor
- Meet Eldo Kim
- Malware Section Preview
- Introduction to Malware
- Viruses and Worms
- How an Antivirus Works
- Choosing an Antivirus Software
- Rootkits
- Securing the Windows 10 Boot Process
- Using GMER Rootkit Scanner
- Ransomware
- Using the builtin Antiramsomware Tool
- Using the CCleaner Software
- Using Bleachbit
- Malwarebytes
- Backups and Encryption Section Preview
- How to Backup Windows 10
- Introduction to Cloud Computing
- Encryption and Decryption
- Encryption with Veracrypt
- Encryption with Bitlocker
- MAC Encryption with Filevault
- Self Encrypting Drives
- Encryption Attacks and Mitigations
- How to Password Protect USB Drives and Folders
- Social Engineering Section Preview
- Introduction to Social Engineering
- Reconnaissance
- Anatomy of a Social Engineering Attack
- The Way Back Machine
- Meet Kevin Mitnick
- Emails Section Preview
- Email Basics, Ports and Protocols
- How to Track Sent Emails
- How to Detect Email Tracking
- Using Guerrilla Mail
- Using Proton Mail
- Phishing Attacks
- Windows 10 Hardening Section Preview
- Patching and Updates
- Turning off ad tracker
- Restricting Cortana
- Turning off Location Tracking
- Turning off Peer Updates
- The Windows 10 Firewall
- The Windows 10 Smart Screen Filter
- Randomizing the MAC Address
- Connect with Me - Cyber Platforms
- Conclusion
Taught by
Alexander Oni
Related Courses
Information Security and Risk Management: An OverviewUniversity of Washington via Canvas Network Unlocking Information Security II: An Internet Perspective
Tel Aviv University via edX Information Security Policy and Management
Coventry University via FutureLearn Information Security - Advanced topics
New York University (NYU) via edX Information Security - Authentication and Access Control
New York University (NYU) via edX