The Absolute Beginners Guide to Cyber Security - Part 2 | Alexander Oni | Skillshare

The Absolute Beginners Guide to Cyber Security - Part 2

Alexander Oni, Web Developer & Cyber Security Expert

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
82 Lessons (6h 23m)
    • 1. Course Promo

      2:11
    • 2. Connect with Me - Cyber Platforms

      3:46
    • 3. Networking 101 Section Preview

      1:03
    • 4. Meet Julian Assange

      1:49
    • 5. IP and MAC Addresses

      7:36
    • 6. Hubs Switches and Routers

      5:20
    • 7. Ethernet 101

      2:34
    • 8. HTTP, HTTPS, SSL and TLS

      6:29
    • 9. The Internet Protocol Suite

      6:47
    • 10. The DNS System

      6:22
    • 11. The Internet and Survival of the Paranoid Section Preview

      1:22
    • 12. Privacy Anonnymity Pseudonymity

      4:38
    • 13. Identity Strategies

      10:37
    • 14. How We Are Tracked Online

      5:18
    • 15. FaceBook vs Cambridge Analytica Scandal

      7:45
    • 16. Exercise How muc data does Facebook have on me

      3:18
    • 17. 5 Places You are Being Tracked

      4:16
    • 18. Browsing Incognito

      3:55
    • 19. Introduction to DuckDuckGo

      6:25
    • 20. Introduction to Brave Browser

      4:20
    • 21. How to Disappear Online

      3:56
    • 22. Introduction to Stylometry

      6:02
    • 23. Annonymizers Section Preview

      0:55
    • 24. Anonymizer

      3:52
    • 25. Introduction to Proxy Servers

      7:19
    • 26. Introduction to Virutal Private Networks

      4:52
    • 27. Types of VPNs

      6:16
    • 28. NordVPN

      7:46
    • 29. VPN Myths Debunked

      6:40
    • 30. Using Tor

      9:57
    • 31. Tor Weaknesses

      5:03
    • 32. Attacking Tor

      4:40
    • 33. The Dark Web

      8:15
    • 34. The Darknet

      3:24
    • 35. Combining VPN and Tor

      5:13
    • 36. Meet Eldo Kim

      1:52
    • 37. Malware Section Preview

      0:46
    • 38. Introduction to Malware

      4:52
    • 39. Viruses and Worms

      4:51
    • 40. How an Antivirus Works

      4:34
    • 41. Choosing an Antivirus Software

      8:34
    • 42. Rootkits

      5:06
    • 43. Securing the Windows 10 Boot Process

      5:27
    • 44. Using GMER Rootkit Scanner

      1:39
    • 45. Ransomware

      8:00
    • 46. Using the builtin Antiramsomware Tool

      2:14
    • 47. Using the CCleaner Software

      7:57
    • 48. Using Bleachbit

      3:50
    • 49. Malwarebytes

      6:35
    • 50. Backups and Encryption Section Preview

      0:54
    • 51. How to Backup Windows 10

      4:26
    • 52. Introduction to Cloud Computing

      9:39
    • 53. Encryption and Decryption

      4:24
    • 54. Encryption with Veracrypt

      9:22
    • 55. Encryption with Bitlocker

      2:06
    • 56. MAC Encryption with Filevault

      0:57
    • 57. Self Encrypting Drives

      0:44
    • 58. Encryption Attacks and Mitigations

      6:02
    • 59. How to Password Protect USB Drives and Folders

      10:46
    • 60. Social Engineering Section Preview

      0:49
    • 61. Introduction to Social Engineering

      10:30
    • 62. Reconnaissance

      8:42
    • 63. Anatomy of a Social Engineering Attack

      8:50
    • 64. The Way Back Machine

      3:43
    • 65. Meet Kevin Mitnick

      1:38
    • 66. Emails Section Preview

      1:09
    • 67. Email Basics, Ports and Protocols

      6:01
    • 68. How to Track Sent Emails

      3:10
    • 69. How to Detect Email Tracking

      2:38
    • 70. Using Guerrilla Mail

      4:38
    • 71. Using Proton Mail

      4:13
    • 72. Phishing Attacks

      5:12
    • 73. Windows 10 Hardening Section Preview

      0:39
    • 74. Patching and Updates

      4:22
    • 75. Turning off ad tracker

      2:29
    • 76. Restricting Cortana

      3:22
    • 77. Turning off Location Tracking

      3:12
    • 78. Turning off Peer Updates

      3:43
    • 79. The Windows 10 Firewall

      2:22
    • 80. The Windows 10 Smart Screen Filter

      2:39
    • 81. Randomizing the MAC Address

      2:07
    • 82. Conclusion

      0:54
18 students are watching this class