Module 1: Introduction

Welcome and Introduction to the Instructor!

Security Quick Win!

Goals and Learning Objectives – Volume 1

Target Audience

Study Recommendations

The Forum – For Questions, Answers and Other Resources

Course Updates

 

Module 2: Know Yourself – The Threat and Vulnerability Landscape

 

Goals and Learning Objectives

Protect What You Value

What is Privacy, Anonymity and Pseudonymity

Security, Vulnerabilities, Threats and Adversaries

Threat Modeling and Risk Assessments

Security vs Privacy vs Anonymity – Can we have it all?

Defense In Depth

The Zero Trust Model

 

Module 3: Know Your Enemy – The Current Threat and Vulnerability Landscape

Goals and Learning Objectives

Why You Need Security – The Value Of A Hack

The Top 3 Things You Need To Stay Safe Online

Security Bugs and Vulnerabilities – The Vulnerability Landscape

Hackers, crackers and cyber criminals

Malware, viruses, rootkits and RATs

Spyware, Adware, Scareware, PUPs & Browser hijacking

What is Phishing, Vishing and SMShing

Spamming & Doxing

Social engineering – Scams, cons, tricks and fraud

Darknets, Dark Markets and Exploit kits

Governments, spies and secret stuff – part I

Governments, spies and secret stuff – part II

Regulating encryption, mandating insecurity and legalizing spying

Trust & Backdoors

Censorship

Security News and Alerts – Stay Informed

 

Module 4: Encryption Crash Course

Goals and Learning

Symmetric Encryption

Asymmetric Encryption

Hash Functions

Digital Signitures

Secure Sockets Layer (SSL) and Transport layer security (TLS)

SSL Stripping

HTTPS (HTTP Secure)

Digital Certificates

Certificate Authorities and HTTPS

End-to-End Encryption (E2EE)

Steganography

How Security and Encryption is Really Attacked

 

Module 5 :Setting up a Testing Environment using Virtual Machines

Goals and Learning Objectives

Introduction to Setting up a Testing Environment Using Virtual Machines

Vmware

Virtualbox

Kali Linux 2016

 

Module 6: Operating System Security & Privacy (Windows vs Mac OS X vs Linux)

Goals and Learning Objectives

Security Features and Functionality

Security Bugs and Vulnerabilities

Usage Share

Windows 10 – Privacy & Tracking

Windows 10 – Disable tracking automatically 57. Windows 10 – Tool Disable Windows 10 Tracking

Windows 10 – Cortana

Windows 10 – Privacy Settings

Windows 10 – WiFi Sense

Windows 7, 8 and 8.1 – Privacy & Tracking

Mac – Privacy & Tracking

Linux and Unix “like” Operating systems 64. Linux – Debian

Linux – Debian 8 Jessie – Virtual box guest additions Issue

Linux – OpenBSD and Archlinux

Linux – Ubuntu

 

Module 7: Security Bugs and Vulnerabilities

Goals and Learning Objectives

The Importance of Patching

Windows 7 – Auto Update

Windows 8 & 8.1 – Auto Update.

Windows 10 – Auto Update

Windows – Criticality and Patch Tuesday

Windows 7, 8, 8.1 & 10 – Automate the pain away from patching

Linux – Debian – Patching

Mac – Patching

Firefox – Browser and extension updates

Chrome – Browser and extension updates

IE and Edge – Browser and extention updates

Auto updates – The Impact to privacy and anonymity

 

Module 8: Reducing Threat Privilege

Goals and Learning Objectives + Removing Privilege

Windows 7 – Not using admin

Windows 8 and 8.1 – Not using admin 84. Windows 10 – Not using admin

 

Module 9: Social Engineering and Social Media Offence and Defence

Goals and Learning Objectives

Information Disclosure and Identity Strategies for Social Media

Identity, Verification and Registration

Behavioral Security Controls Against Social Threats

(Phishing, Spam) Part 1

Behavioral Security Controls Against Social Threats

(Phishing, Spam) Part 2

Technical Security Controls Against Social Threats

(Phishing, Spam, Scam & Cons)

 

Module 10: Security Domains

Goals and Learning Objectives

Security Domains

 

Module 11: Security Through Isolation and Compartmentalization

Goals and Learning Objectives

Introduction to Isolation and Compartmentalization – Copy

Physical and Hardware Isolation – How to change the Mac Address

Physical and Hardware Isolation – Hardware Serials

Virtual Isolation

Dual Boot

Built-in Sandboxes and Application Isolation.

Windows – Sandboxes and Application Isolation

Windows – Sandboxes and Application Isolation – Sandboxie

Linux – Sandboxes and Appication Isolation

Mac – Sandboxes and Application Isolation

Virtual Machines

Virtual Machine Weaknesses

Virtual Machine Hardening

Whonix OS – Anonymous Operating system.

Whonix OS – Weaknesses

Qubes OS

Security Domains, Isolation and Compartmentalization

Hi, How Can We Help You?