We may earn an affiliate commission when you visit our partners.
Course image
Nathan House

Learn a practical skill-set in defeating all onlinethreats, including - advanced hackers,trackers, malware, zero days, exploit kits, cybercriminals and more.

Become a Cyber Security Specialist - Go from a beginner to advanced in this easy tofollow expert course.

Covering all major platforms - Windows 7, Windows8, Windows 10, MacOS and Linux.

This course covers the fundamental building blocks of yourrequired skill set - You will understand the threat and vulnerability landscapethrough threat modeling and risk assessments.

Read more

Learn a practical skill-set in defeating all onlinethreats, including - advanced hackers,trackers, malware, zero days, exploit kits, cybercriminals and more.

Become a Cyber Security Specialist - Go from a beginner to advanced in this easy tofollow expert course.

Covering all major platforms - Windows 7, Windows8, Windows 10, MacOS and Linux.

This course covers the fundamental building blocks of yourrequired skill set - You will understand the threat and vulnerability landscapethrough threat modeling and risk assessments.

We explore the Darknet and mindset of the cybercriminal. Covering malware, exploit kits, phishing, zero-dayvulnerabilities and much more.

You will learn about the global tracking andhacking infrastructures that nation states run. Covering the

You will understand the foundations of operatingsystem security and privacy functionality. A close look at the new Windows10 privacy issues and how to best mitigate them.

There is a complete easy to follow crash course onencryption, how encryption can be bypassed and what you can do to mitigatethe risks.

Master defenses against phishing, SMShing, vishing,identity theft, scam, cons and other social engineering threats.

Finally we cover the extremely important, but underusedsecurity control of isolation and compartmentalization. Covering sandboxes,application isolation, virtual machines, Whonix and Qubes OS.

This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Learning objectives

  • An advanced practical skillset in defeating all online threats - advanced hackers, trackers, malware and all internet nastiness & govenment mass surveillance.
  • Start a career in cyber security. become a cyber security specialist.
  • The very latest up-to-date information and methods.
  • We cover operating system security, privacy, and patching - on windows, macos and linux.
  • Explore the threat landscape - darknets, dark markets, zero day vulnerabilities, exploit kits, malware, phishing and much more.
  • You will master encryption in an easy to follow crash course.
  • Go in-depth into security through physical and virtual isolation and compartmentalization. covering sandboxes, isolation, virtual machines, whonix and qubes os.
  • You will learn about nation state secret tracking and hacking infrastructure.
  • A certificate of completion is available signed by the instructor nathan house so cpe credits can be claimed.

Syllabus

An introduction to the Instructor. Understand the goals, learning objectives, target audience and study recommendations.
Welcome and Introduction to the Instructor!
Read more
Security Quick Win!
Goals and Learning Objectives - Volume 1
Target Audience
Study Recommendations
Course updates

How to start a career in cyber security and ethical hacking.

know Yourself - The Threat and Vulnerability Landscape
Theory and Practical
Goals and Learning Objectives
Protect What You Value
What is Privacy, Anonymity and Pseudonymity
Security, Vulnerabilities, Threats and Adversaries
Asset Selection
Threat Modeling and Risk Assessments
Security vs Privacy vs Anonymity - Can we have it all?
Confidentiality, Integrity and Availability - (Security Attributes)
Defense In Depth
The Zero Trust Model
Learn all about the threats, vulnerabilities and adversaries you face on the Internet. From hackers to encryption regulation. From exploit kits to PUPs and browser hijacking.
Why You Need Security – The Value Of A Hack
The Top 3 Things You Need To Stay Safe Online
Security Bugs and Vulnerabilities - The Vulnerability Landscape
Hackers, crackers and cyber criminals
Malware, viruses, rootkits and RATs
Spyware, Adware, Scareware, PUPs & Browser hijacking
What is Phishing, Vishing and SMShing
Spamming & Doxing
Social engineering - Scams, cons, tricks and fraud
CPU Hijackers - Crypto Mining Malware and Cryptojackers
Darknets, Dark Markets and Exploit kits
Governments, spies and secret stuff part I
Governments, spies and secret stuff part II
Regulating encryption, mandating insecurity & legalizing spying
Trust & Backdoors
Censorship
Cyber Threat Intelligence – Stay Informed
Learn the fundamentals of encryption. Symmetric, Asymmetric, Hashes, SSL, TLS, Certificates, SSL stripping and so on. Plus the weaknesses inherent in encrpytion and how to protect yourself..
Symmetric Encryption
Asymmetric Encryption
Hash Functions
Digital Signatures
Secure Sockets Layer (SSL) and Transport layer security (TLS)
SSL Stripping
HTTPS (HTTP Secure)
Digital Certificates
Certificate Authorities and HTTPS
End-to-End Encryption (E2EE)
Steganography
How Security and Encryption is Really Attacked
Here we setup a testing environment using vmware or virtualbox. This environment is used throughout the course.
Introduction to Setting up a Testing Environment Using Virtual Machines
Vmware
Virtual box
Kali Linux 2018
Learn which operating systems present the most security risk and why. How to choose an operating system based on risk and usability.
Security Features and Functionality
Security Bugs and Vulnerabilities
Usage Share
Windows 10 - Privacy & Tracking
Windows 10 - Disable tracking automatically
Windows 10 - Tool : Disable Windows 10 Tracking
Windows 10 – Cortana
Windows 10 – Privacy Settings
Windows 10 - WiFi Sense
Windows 7, 8 and 8.1 - Privacy & Tracking
Mac - Privacy & Tracking
Linux and Unix “like” Operating systems
General Use Operating Systems (Windows, MacOS and Linux)
General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)
Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)
Anonymity Focused Operating Systems (Tails and Whonix OS)
Penetration Testing and Ethical Hacking Focused Operating Systems
Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)
Linux - Debian 8 Jessie - Virtual box guest additions Issue
Understand security bugs and vulnerabilities, then apply the most effective methods of patching Windows, Mac OS X, Linux, applications and so on.
The Importance of Patching
Windows 7 - Auto Update
Windows 8 & 8.1 - Auto Update
Windows 10 - Auto Update
Windows - Criticality and Patch Tuesday
Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
Linux - Debian - Patching
Mac - Patching
Firefox - Browser and extension updates
Chrome - Browser and extension updates
IE and Edge - Browser and extention updates
Auto updates - The Impact to privacy and anonymity
A very simple but extremely effective method to contain malware or a hacker is to reduce the privileges they have. In this section we show how to do this.
Goals and Learning Objectives - Removing Privilege
Windows 7 - Not using admin
Windows 8 and 8.1 - Not using admin
Windows 10 - Not using admin
Learn defences against identity theft, phishing attacks, spam, con men, social engineering, hackers and nation-state surveillance.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
May be a great choice for beginners who want to understand the basics of cybersecurity, but it may not provide enough depth for experienced professionals
Provides a comprehensive overview of cybersecurity concepts and threats, making it a good starting point for those new to the field
Covers a wide range of topics, from threat modeling to encryption, providing a well-rounded foundation in cybersecurity
May be too basic for experienced cybersecurity professionals seeking advanced training
Offers a practical approach to cybersecurity, with a focus on real-world threats and solutions
Includes hands-on exercises and labs, providing learners with the opportunity to apply their knowledge

Save this course

Save The Complete Cyber Security Course : Hackers Exposed! to your list so you can find it easily later:
Save

Reviews summary

Excellent cyber security course

According to students, this course's first volume, "Goals and Learning Objectives - Volume 1," provides a lot of material to learn and has an excellent, knowledgeable instructor. Students are excited to enroll in Volume 2 of this course.

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in The Complete Cyber Security Course : Hackers Exposed! with these activities:
Review Network Security Concepts
Strengthen your foundational understanding of network security to enhance your learning in this course.
Browse courses on network security
Show steps
  • Review notes or previous coursework on network security
  • Complete practice problems or exercises related to network security
  • Attend a workshop or tutorial on network security fundamentals
Review Course Materials
Establish a strong foundation in the course's material to better prepare for engagement and assessments.
Browse courses on Cyber Security
Show steps
  • Carefully evaluate the course's syllabus
  • Read through the assigned course textbook
  • Review any provided video materials
Read 'The Art of Deception' by Kevin Mitnick
Gain insights into social engineering techniques and deception strategies used by hackers.
Show steps
  • Read the assigned chapters of the book
  • Take notes or highlight important concepts
  • Discuss the book's content with peers or mentors
One other activity
Expand to see all activities and additional details
Show all four activities
Conduct Vulnerability Assessments
Develop practical skills in identifying and assessing vulnerabilities in computer systems.
Browse courses on Vulnerability Assessment
Show steps
  • Choose a practice environment, such as a virtual machine or online platform
  • Use vulnerability scanning tools to identify potential weaknesses
  • Analyze the scan results and prioritize vulnerabilities based on risk
  • Document the findings and recommendations for remediation

Career center

Learners who complete The Complete Cyber Security Course : Hackers Exposed! will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
This course will help you build a foundation for a career as an Information Security Analyst. You will learn about the different types of cybersecurity threats, how to protect against them, and how to investigate cyberattacks. The course also covers topics such as security management, risk assessment, and compliance.
Cybersecurity Analyst
This course will help you take the first step towards becoming an entry-level Cybersecurity Analyst. The course will provide a broad overview of cybersecurity threats and how to counter them. This includes understanding hacker techniques, phishing, malware, and other types of cyberattacks. It is designed for beginners, but it may also be useful to those with some experience in the field.
Penetration Tester
This course will provide you with the knowledge and skills needed to become a Penetration Tester. You will learn how to identify and exploit vulnerabilities in computer systems, networks, and applications. This course is designed for both beginners and experienced security professionals.
Ethical Hacker
This course will provide you with the knowledge and skills needed to become an Ethical Hacker. You will learn how to identify and exploit vulnerabilities in computer systems, networks, and applications in order to help organizations improve their security posture.
Security Consultant
This course will provide you with the knowledge and skills needed to become a Security Consultant. You will learn how to assess and mitigate cybersecurity risks, develop and implement security plans, and provide security advice to clients.
Security Engineer
This course is a good starting point for those looking to become a cybersecurity engineer. The course will help you build a foundation in cybersecurity and provide you with the skills needed to protect computer systems from cyberattacks.
Network Security Engineer
This course will help you prepare for a career as a Network Security Engineer. The course will provide you with the knowledge and skills needed to secure computer networks from cyberattacks. Topics covered include network security principles, network security protocols, and network security devices.
Cybersecurity Auditor
This course may be helpful if you are interested in a career as a Cybersecurity Auditor. The course will provide you with the knowledge and skills needed to assess an organization's cybersecurity posture and compliance with regulations.
Information Security Manager
This course may be helpful if you are interested in a role as an Information Security Manager. The course will provide you with the knowledge and skills needed to manage an information security program and protect an organization's information assets.
Chief Information Security Officer (CISO)
This course may be helpful if you are interested in a CISO position. The course will provide you with the knowledge and skills needed to lead an organization's cybersecurity program and protect the organization from cyberattacks.
Computer Crime Investigator
This course may be helpful if you are interested in a career as a Computer Crime Investigator. The course will provide you with the knowledge and skills needed to investigate computer crimes and help bring cybercriminals to justice.
Cybersecurity Manager
This course may be helpful if you are interested in a Cybersecurity Manager position. The course will provide you with the knowledge and skills needed to manage a cybersecurity program and protect an organization from cyberattacks.
Cybersecurity Architect
This course may be helpful if you are interested in becoming a Cybersecurity Architect. The course will provide you with the knowledge and skills needed to design and implement cybersecurity solutions for an organization.
Cyber Threat Intelligence Analyst
This course may be helpful if you are interested in a Cyber Threat Intelligence Analyst role. The course will provide you with the knowledge and skills needed to collect and analyze cyber threat intelligence and provide this intelligence to stakeholders.
Incident Responder
This course may be helpful if you are interested in a role as an Incident Responder. The course will provide you with the knowledge and skills needed to respond to and investigate cyberattacks.

Reading list

We've selected six books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in The Complete Cyber Security Course : Hackers Exposed!.
Provides a comprehensive overview of cybersecurity, covering topics such as network security, cryptography, malware analysis, and incident response. It valuable resource for anyone who wants to learn more about cybersecurity.
Tells the story of the early days of hacking, and how hackers have shaped the development of the Internet and modern computing. It fascinating read for anyone who is interested in the history of technology.
Provides insights into the psychology of hackers and how they use social engineering to gain access to systems and data. It valuable resource for anyone who wants to learn more about how to protect themselves from hackers.
Classic in the field of cybersecurity. It tells the true story of how Clifford Stoll tracked down a hacker who was spying on the US military. It thrilling read that provides a behind-the-scenes look at the world of cyber espionage.
Provides a fascinating look at the history of cryptography, from the ancient Egyptians to the present day. It great resource for anyone who wants to learn more about how cryptography works.
Classic in the field of cyberpunk literature. It tells the story of a group of hackers who are targeted by the FBI. It thought-provoking read that explores the ethical and legal issues surrounding hacking.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to The Complete Cyber Security Course : Hackers Exposed!.
The Complete Cyber Security Course : End Point Protection!
Most relevant
The Complete Cyber Security Course : Network Security!
Most relevant
The Absolute Beginners Guide to Cyber Security 2024 -...
Most relevant
Initial Access with King Phisher
Most relevant
Cyber Security: Common Attacks
Most relevant
Introduction to Cybersecurity Essentials
Most relevant
The Complete Cyber Security Course : Anonymous Browsing!
Most relevant
Securing Applications with AWS
Most relevant
Web Connectivity and Security in Embedded Systems
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser