HOME > IT & Software > The Absolute Beginners Guide to Cyber Security 2024 Part 2

The Absolute Beginners Guide to Cyber Security 2024 Part 2

SynopsisThe Absolute Beginners Guide to Cyber Security 2024 – P...
The Absolute Beginners Guide to Cyber Security 2024 Part 2  No.1

The Absolute Beginners Guide to Cyber Security 2024 – Part 2, available at $159.99, has an average rating of 4.58, with 94 lectures, 1 quizzes, based on 10542 reviews, and has 34218 subscribers.

You will learn about Take up entry roles for IT and Cyber security jobs Configure and setup a VPN How to completely harden the Windows 10 operating system Use Tor to browse the internet anonymously Learn how backup and encrypt their hard drive Understand the basics of networking How to choose the right Anti Virus software How to encrypt and track emails How to set up a firewall This course is ideal for individuals who are Anyone who wants to begin a career as a cyber security professional or Students who want to learn practical techniques on how to protect their privacy online or Students who want to have a deeper understanding of many of the major topics in cyber security It is particularly useful for Anyone who wants to begin a career as a cyber security professional or Students who want to learn practical techniques on how to protect their privacy online or Students who want to have a deeper understanding of many of the major topics in cyber security.

Enroll now: The Absolute Beginners Guide to Cyber Security 2024 – Part 2

Summary

Title: The Absolute Beginners Guide to Cyber Security 2024 – Part 2

Price: $159.99

Average Rating: 4.58

Number of Lectures: 94

Number of Quizzes: 1

Number of Published Lectures: 93

Number of Published Quizzes: 1

Number of Curriculum Items: 95

Number of Published Curriculum Objects: 94

Number of Practice Tests: 1

Number of Published Practice Tests: 1

Original Price: $199.99

Quality Status: approved

Status: Live

What You Will Learn

  • Take up entry roles for IT and Cyber security jobs
  • Configure and setup a VPN
  • How to completely harden the Windows 10 operating system
  • Use Tor to browse the internet anonymously
  • Learn how backup and encrypt their hard drive
  • Understand the basics of networking
  • How to choose the right Anti Virus software
  • How to encrypt and track emails
  • How to set up a firewall
  • Who Should Attend

  • Anyone who wants to begin a career as a cyber security professional
  • Students who want to learn practical techniques on how to protect their privacy online
  • Students who want to have a deeper understanding of many of the major topics in cyber security
  • Target Audiences

  • Anyone who wants to begin a career as a cyber security professional
  • Students who want to learn practical techniques on how to protect their privacy online
  • Students who want to have a deeper understanding of many of the major topics in cyber security
  • ** PART 2 OF THE CYBER SECURITY GUIDE FOR BEGINNERS SERIES **

    Take your basic knowledge of cyber security to a whole new level with this exciting course that promises to be educational, informative and fun filled. 

    Build upon a basic foundation in Cyber Security with a strong focus on the following core topics.

  • Networking

  • Privacy & Anonymity

  • Malware

  • Email Security

  • Backups & Encryption

  • Windows 10 Hardening

  • What are the main benefits of taking this course?

    I am glad you asked. This course has been designed to provide you with the knowledge and tools to not only better protect yourself against malware but to also prepare you for a career in the cyber security field if you so wish. 

    You will learn all the latest techniques used in the world of cyber security today and understand how a lot security technologies work behind the scenes.

    In this course you will learn the following practical skills

  • How to use a proxy server

  • How to setup and use a virtual private network

  • How to use Tor to access the dark web anonymously

  • Best practices to browse the internet securely and privately

  • How to set up a firewall

  • How to use a rootkit scanner

  • How to encrypt your emails

  • How to track emails you have sent and also how to detect if you are being tracked

  • How to use 3 major anti-malware software products

  • How to completely harden the Windows 10 operating system

  • How to backup and encrypt your hard drive

  • How to choose the right anti virus

  • and much much much more

  • You will also learn how to use a wide variety of software to improve your security game and these include:

  • Virtual Private Networks

  • Kaspersky Antivirus

  • Bitlocker

  • Proxy servers

  • Bleachbit

  • Tor

  • CCleaner

  • Protonmail

  • Duckduck go

  • Brave Browser

  • Ugly Email

  • Mail Tracker

  • Nord VPN

  • GMER Rootkit scanner

  • Secure Boot

  • Veracrypt

  • Filevault

  • Guerrilla Mail

  • Comodo Firewall

  • Lastpass

  •  Jobs in Cyber security are plentiful and this course will help prepare you for entry level roles by providing you with a solid set of skills to build up on.

    * PERFECT FOR BEGINNERS *

    You don’t need to have a background in cyber security though any sort of prior knowledge would be beneficial. This course is designed in such a manner that as long as you know how to use a computer and the internet, you will be able to understand and apply everything you are taught.

    Content and Overview  
    Suitable for non professionals and students with a basic understanding of cyber security. In this course of nearly 100 lectures and almost 7 hours of content, you’ll learn all of the core cyber security fundamentals and develop a strong understanding of how security and privacy can either be maintained or deprived from a user. Each chapter closes with a section review highlighting the core points raised in the section.

    Starting with Networking 101, you will learn the basics of networking including what the TCP/IP protocol suite is and how the domain name system works.

    With the basics of networking mastered, you will be ready to jump into the course proper with the following section where you will begin to learn about privacy and anonymity. You will learn how advertisers and websites are able to track you online and what you can do about it.

    You will then move on to a more advanced section where you will be introduced to Anonymizers. You will learn how to work with proxy servers and how to setup and configure a Virtual Private Network. We will also explore how to use Tor to access the dark web as well as the pros and cons of using anonymizers. By the end of this section, you would have learned techniques and skills that you can use to secure your privacy online.

    Section 5 covers malware with a special focus on viruses, rootkits and ransomware. You will learn how these various forms of malware can affect you plus you will also be introduced to a variety of anti-malware software that you can use to fight against malware.

    We will then move to discuss about backupsand encryption. You will learn about cloud backups as well the advantages and disadvantages of using this type of technology. I will then show you how you can back up and encrypt your hard drive and sensitive files.

    Section 7 covers one of the most interesting aspects of cyber security – Social Engineering. You will learn about the different tactics employed by social engineers to extract important information without using any technical skills. We will explore how hackers exploit human psychology and fool their targets.

    Email security will be covered in the very next section. Emails are a fundamental component of our daily lives and you will learn exactly how emails are sent and received behind the scenes. You will learn how to track emails and how to use mail services like guerrilla mail and proton mail.

    In the final section of the course, you will learn how to harden the Windows 10 operating system against malware. Windows 10 by default is vulnerable to malware but with a few adjustments, you can make it far more secure and you will learn this tricks in this section.

    Complete with resources and section reviews, you’ll be able to apply what you have learnt in this course either at home or at your place of work and will receive a verifiable certificate of completion upon finishing the course.

    Take control of your privacy and security – Enroll Today in one of the very best cyber security courses you will find online.

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Welcome to the Course

    Lecture 2: Connect with Me

    Lecture 3: Download the PDF Guide Book

    Chapter 2: Networking 101

    Lecture 1: Section Preview

    Lecture 2: MAC Addresses and IP Addresses

    Lecture 3: Hubs, Switches and Routers

    Lecture 4: Ethernet 101

    Lecture 5: HTTP, HTTPS, SSL & TLS

    Lecture 6: The Internet Protocol Suite – TCP/IP

    Lecture 7: Understanding the DNS System

    Lecture 8: Section Review and Key Points

    Chapter 3: The Internet – Privacy & Survival of the Paranoid

    Lecture 1: Section Preview

    Lecture 2: What is Privacy, Anonymity and Pseudonymity

    Lecture 3: Identity Strategies

    Lecture 4: How We are Tracked Online

    Lecture 5: The FaceBook Data Mining Scandal

    Lecture 6: 5 Places You are Tracked Online

    Lecture 7: Cookies

    Lecture 8: Browsing in Icognito Mode – The Shocking Truth !!!

    Lecture 9: The Brave Browser

    Lecture 10: How to Disappear Online

    Lecture 11: Introduction to Stylometry

    Lecture 12: Section Review and Key Points

    Chapter 4: Anonymizers, Proxies, Virtual Private Networks & Tor

    Lecture 1: Section Preview

    Lecture 2: Annonymizer

    Lecture 3: Introduction to Proxy Servers

    Lecture 4: Introduction to VPNs

    Lecture 5: Types of VPNs

    Lecture 6: NordVPN

    Lecture 7: VPN Myths Debunked

    Lecture 8: Introduction to Tor

    Lecture 9: Tor Weaknesses

    Lecture 10: Attacking Tor – The end to end Correlation Hack

    Lecture 11: Accessing the Dark Web with Tor

    Lecture 12: Darknets

    Lecture 13: VPN + Tor

    Lecture 14: Meet Eldo Kim

    Lecture 15: Section Review and Key Points

    Chapter 5: Malware, Viruses, Rootkits, Ransomware & Attacks

    Lecture 1: Section Preview

    Lecture 2: Introduction to Malware

    Lecture 3: Viruses & Worms

    Lecture 4: Antivirus

    Lecture 5: Choosing the Right Antivirus Software

    Lecture 6: Rootkits

    Lecture 7: Securing the Windows 10 Boot Process

    Lecture 8: Using GMER – Rootkit Scanner

    Lecture 9: Ransomware – Cryptolocker, WannaCry, Bad Rabbit

    Lecture 10: Using the inbuilt AntiRansomware Tool

    Lecture 11: CC Cleaner

    Lecture 12: Bleachit

    Lecture 13: Malwarebytes

    Lecture 14: Section Review and Key Points

    Chapter 6: Backups, Storage, The Cloud and Encryption

    Lecture 1: Section Preview

    Lecture 2: How to Backup Your Computer

    Lecture 3: What is the Cloud?

    Lecture 4: Disk Encyrption

    Lecture 5: Encrypting with Veracrypt

    Lecture 6: Encrypting Windows 10 with Bitlocker

    Lecture 7: Encrypting Mac OS with FileVault

    Lecture 8: Self Encrypting Drives

    Lecture 9: Attacks Against Encryption

    Lecture 10: How to Password Protect USB Drives, Files & Folders

    Lecture 11: Section Review and Key Points

    Chapter 7: Social engineering – Scams, cons, tricks and fraud

    Lecture 1: Section Preview

    Lecture 2: What is Social Engineering?

    Lecture 3: Reconnaissance Methods

    Lecture 4: Anatomy of a Social Engineering Attack

    Lecture 5: The Way Back Machine

    Lecture 6: Meet Kevin Mitnick

    Lecture 7: Section Review and Key Points

    Chapter 8: The World of Electronic Mails – Dangers, Attacks & Protection

    Lecture 1: Section Preview

    Lecture 2: Email Basics, Protocols & Ports

    Lecture 3: How to Track Sent Emails

    Lecture 4: How to Detect Email Tracking

    Lecture 5: Guerrilla Mail

    Lecture 6: Introducing Proton Email

    Lecture 7: Review Update

    Lecture 8: Phishing Attacks

    Lecture 9: Scam Email Live Example

    Lecture 10: Section Review and Key Points

    Chapter 9: Windows 10 Hardening, Privacy & Security

    Lecture 1: Section Preview

    Lecture 2: Patching and Updates

    Lecture 3: Windows 10 Privacy – Turning off Ad Tracking

    Lecture 4: Windows 10 Privacy – Restricting Cortana

    Lecture 5: Windows 10 Privacy – Turning off Location Tracking

    Lecture 6: Windows 10 Privacy – Turning off Peer Updates

    Lecture 7: Windows 10 Hardening – The Windows 10 Firewall

    Lecture 8: Windows 10 Hardening – Enabling the Smart Screen Filter

    Lecture 9: Windows 10 Hardening – Randomizing the MAC Address

    Chapter 10: Final Exam & Conclusion

    Lecture 1: Exam Preview

    Instructors

  • The Absolute Beginners Guide to Cyber Security 2024 Part 2  No.2
    Alexander Oni
    Best Selling Instructor, 220,000 + Students
  • Rating Distribution

  • 1 stars: 47 votes
  • 2 stars: 114 votes
  • 3 stars: 837 votes
  • 4 stars: 3905 votes
  • 5 stars: 5639 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!