UFIKE
Menu
Home
Courses
Buy Projects
login/sign up
0
IT & Software
New course
The Complete Cyber Security Course
Instructor
admin
33
Students
enrolled
0
0 reviews
Description
Curriculum
Reviews
What you’ll learn
Security Governance, Network Security, Cyber Attacks, Web Application Security, Malware
Practical Cyber Security skills through hands on labs
Prepare for Cyber Security interviews by learning common interview questions and how to respond
Prepare for in-demand Cyber Security certifications such as CompTIA Security+ and CEH
Who this course is for:
Absolute Beginners
01 Introduction
1
001 Welcome to Volume III
Preview
Video lesson
2
002 Introduction to the Instructor
Video lesson
3
003 Security Quick Win
Video lesson
4
004 Target Audience
Video lesson
5
005 Study Recommendations
Video lesson
6
006 Course updates
Video lesson
02 Goals and Objectives for Volume III
7
007 Goals and Learning Objectives
Video lesson
03 OPSEC Operational Security
8
008 Goals and Learning Objectives
Video lesson
9
009 Introduction to OPSEC
Video lesson
10
010 Identities pseudonyms and aliases Identity Strategies
Video lesson
11
011 Establishing Cover
Video lesson
12
012 Identify Cross Contamination
Video lesson
13
013 10 Rules of OPSEC
Video lesson
14
014 Authorship Recognition and Evasion Methods
Video lesson
15
015 The knock
Video lesson
16
016 Case Studies of OPSEC Failures
Video lesson
04 Live Operating Systems Tails Knoppix Puppy linux Jondo live Tiny core linu
17
017 Goals and Learning Objectives
Video lesson
18
018 Introduction to live operating systems
Video lesson
19
019 Knoppix Puppy linux Jondo live Tiny core linux Window To Go
Video lesson
20
020 Tails
Video lesson
21
021 Tails Demo
Video lesson
05 Virtual Private Networks VPNs
22
022 Goals and Learning Objectives
Video lesson
23
023 Introduction to VPNs
Video lesson
24
024 Which VPN protocol is best to use and why
Video lesson
25
025 VPN Weaknesses
Video lesson
26
026 Can you trust VPN providers
Video lesson
27
027 VPNs and Domain Name System DNS Leaks
Video lesson
28
028 Setting up an OpenVPN client in Windows Mac iPhone and Android
Video lesson
29
029 Setting up an OpenVPN client on Linux
Video lesson
30
030 Preventing VPN Leaks - Firewalls and kill switches
Video lesson
31
031 Choosing the right VPN provider
Video lesson
32
032 Setting up an OpenVPN server Part 1 - The fast and easy way
Video lesson
33
033 Setting up an OpenVPN server Part 2 - Debian client
Video lesson
34
034 Setting up an OpenVPN server Part 3 - Home VPN
Video lesson
06 Tor
35
035 Goals and Learning Objectives
Video lesson
36
036 What is Tor
Video lesson
37
037 The Tor Network and Browser
Video lesson
38
038 What should Tor be used for
Video lesson
39
039 Directory Authorities and Relays
Video lesson
40
040 Tor Bridges
Video lesson
41
041 Tor Pluggable Transports and Traffic Obfuscation
Video lesson
42
042 Torrc Configuration File
Video lesson
43
043 Running other applications through Tor
Video lesson
44
044 Tor Weaknesses Part 1
Video lesson
45
045 Tor Weaknesses Part 2
Video lesson
46
046 Conclusions on Tor and mitigation to reduce risk
Video lesson
47
047 Attacking Tor how the NSA targets users online anonymity
Video lesson
48
048 Hidden services The Tor darknet
Video lesson
49
049 Finding Tor hidden services
Video lesson
50
050 Other Tor Apps
Video lesson
07 VPN and Tor Routers
51
051 Goals and Learning Objectives
Video lesson
52
052 Introduction to VPN and Tor Routers
Video lesson
53
053 Custom Router Firmware for VPN TOR Tunneling
Video lesson
54
054 Off the shelf VPN and TOR Routers
Video lesson
55
055 DIY Hardware TOR Routers
Video lesson
56
056 TOR and VPN Gateway Virtual Machines
Video lesson
08 Proxies HTTP HTTPS SOCKs and Web
57
057 Goals and Learning Objectives
Video lesson
58
058 Proxies HTTP HTTPS and SOCKS Part 1
Video lesson
59
059 Proxies HTTP HTTPS and SOCKS Part 2
Video lesson
60
060 CGI proxies - Web proxy or web form proxy
Video lesson
09 SSH Secure Shell
61
061 Goals and Learning Objectives
Video lesson
62
062 Introduction How to Login
Video lesson
63
063 SSH Remote Port Forwarding
Video lesson
64
064 SSH Local Port Forwarding
Video lesson
65
065 SSH Socks5 Proxy Tunneling with Dynamic Ports
Video lesson
66
066 SSH Public private key authentication
Video lesson
67
067 SSH Hardening
Video lesson
10 I2P - The Invisible Internet Project
68
068 Goals and Learning Objectives
Video lesson
69
069 I2P - Introduction
Video lesson
70
070 I2P Installing and Secure Configuration Part 1
Video lesson
71
071 I2P Installing and Secure Configuration Part 2
Video lesson
72
072 I2P Strengths and Weaknesses
Video lesson
11 Other Privacy and Anonymising Services
73
073 Goals and Learning Objectives
Video lesson
74
074 JonDonym - Introduction
Video lesson
75
075 JonDonym - Installing and Secure Configuration
Video lesson
76
076 Bullet Proof Hosting Services BPHS
Video lesson
77
077 Botnets and Hacked Boxes
Video lesson
12 Censorship Circumvention - Bypassing Firewalls Deep Packet Inspection
78
078 Goals and Learning Objectives
Video lesson
79
079 Outbound Firewall Bypassing - The Fundamentals Part 1
Video lesson
80
080 Outbound Firewall Bypassing - The Fundamentals Part 2
Video lesson
81
081 Outbound Bypassing - Tunneling through HTTP proxies
Video lesson
82
082 Outbound Bypassing - Port Sharing and Knocking
Video lesson
83
083 Outbound Bypassing Cloaking and Obfuscating
Video lesson
84
084 Outbound Bypassing - Remote login - VNC and RDP
Video lesson
85
085 Inbound Bypassing - Reverse shells SSH remote tunneling and remote login
Video lesson
86
086 Goals and Learning Objectives
Video lesson
87
087 Introduction to nesting and chaining - Proxies VPN SSH JonDonym and Tor
Video lesson
88
088 Strengths and Weaknesses User - SSH-VPN-JonDonym - Tor - Internet
Video lesson
89
089 Strengths and Weaknesses User - Tor - SSH-VPN-JonDonym - Internet
Video lesson
90
090 Nested VPNs - Strength and Weaknesses
Video lesson
91
091 How to setup nested VPNs
Video lesson
92
092 How to setup nested SSH
Video lesson
93
093 How to setup proxy chains
Video lesson
94
094 How to setup - User - VPN - Tor - Internet
Video lesson
95
095 How to setup - User - SSH - Tor - Internet
Video lesson
96
096 How to setup - User - JonDonym - Tor - Internet
Video lesson
97
097 How to setup - User - Tor - SSHVPNJonDoym - Internet with transproxy
Video lesson
98
098 How to setup - User - Tor - SSHVPNJonDoym - Internet with Whonix
Video lesson
99
099 Setting up nested services 3 hops
Video lesson
14 Off-site Internet Connections - Hotspots and Cafes
100
100 Goals and Learning Objectives
Video lesson
101
101 Staying safe while on public Wi-Fi hotspots
Video lesson
102
103 Using public Wi-Fi hotspots for security privacy and anonymity safely
Video lesson
103
103
Video lesson
104
104 Finding public Wi-Fi hotspots
Video lesson
105
105 Boosting Wi-Fi range
Video lesson
106
106 How are Wi-Fi users geo located
Video lesson
15 Mobile Cell Phones Cellular Networks
107
107 Goals and Learning Objectives
Video lesson
108
108 Cellular Network Weaknesses - The Network Operator
Video lesson
109
109 Cellular Networks Weaknesses - IMSI catchers
Video lesson
110
110 Cellular Networks Weaknesses - Signaling System No7 SS7
Video lesson
111
111 Mobile and Cell Phone Weaknesses
Video lesson
112
112 How to use a laptop and cellular networks for Internet privacy and anonymity
Video lesson
113
113 How you are geo located when using a cellular network
Video lesson
16 BONUS SECTION - Whats next Volume IV
114
114 BONUS - Important Information
Video lesson
115
115 Congratulations
Video lesson
116
117 BONUS - Example Lecture from Volume I- Intro to Isolation Compartmentalization
Video lesson
117
118 BONUS - Example Lecture from Volume II - Firefox Hardening
Video lesson
118
119 BONUS - Example Lecture from Volume 4 - Email Tracking Exploits
Video lesson
Please,
login
to leave a review
Add to wishlist
Share
Share "The Complete Cyber Security Course"
Facebook
Twitter
Linkedin
Telegram
Copy link
Enroll course
Course details
Lectures
118
Level
Beginner
Popular courses
Hot
Create your own UBER App with Flutter...
Free
By admin
COMPLETE PYTHON WEB COURSE LEARN BY B...
Free
By admin
Hot
Photography Masterclass: A Complete G...
Free
By admin
Special
Build WhatsApp Clone Using Android St...
Free
By admin
Popular Courses
Create your own UBER App with Flut...
Free
By admin
COMPLETE PYTHON WEB COURSE LEARN B...
Free
By admin
Photography Masterclass: A Complet...
Free
By admin
Categories
Blogs
Business
Development
HR and L&D
IT & Software
Soft Skills
Sign In
The password must have a minimum of 8 characters of numbers and letters, contain at least 1 capital letter
I want to sign up as instructor
Remember me
Sign In
Sign Up
Restore password
Send reset link
Password reset link sent
to your email
Close
No account?
Sign Up
Sign In
Lost Password?
✕
Compare Products