The Absolute Beginners Guide to Cyber Security - Part 2

Alexander Oni, Web Developer & Cyber Security Expert

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
83 Lessons (6h 35m)
    • 1. Course Promo

      2:11
    • 2. First things First

      4:20
    • 3. Networking 101 Section Preview

      1:03
    • 4. Meet Julian Assange

      1:49
    • 5. MAC Addresses vs IP Addresses

      7:36
    • 6. Hubs Switches and Routers

      5:20
    • 7. Ethernet 101

      2:34
    • 8. HTTP, HTTPS, SSL and TLS

      6:29
    • 9. The Internet Protocol Suite

      6:47
    • 10. The DNS System

      6:22
    • 11. The Internet and Survival of the Paranoid Section Preview

      1:22
    • 12. Privacy Anonnymity Pseudonymity

      4:38
    • 13. Identity Strategies

      10:37
    • 14. How We Are Tracked Online

      5:18
    • 15. James Gunn FIRED

      18:03
    • 16. FaceBook vs Cambridge Analytica Scandal

      7:45
    • 17. Exercise How muc data does Facebook have on me

      3:18
    • 18. 5 Places You are Being Tracked

      4:16
    • 19. Browsing Incognito

      3:55
    • 20. Introduction to DuckDuckGo

      6:25
    • 21. Introduction to Brave Browser

      4:20
    • 22. How to Delete Your Online Accounts

      4:08
    • 23. How to Disappear Online

      3:56
    • 24. Introduction to Stylometry

      6:02
    • 25. Annonymizers Section Preview

      0:55
    • 26. Anonymizer

      3:52
    • 27. Introduction to Proxy Servers

      7:19
    • 28. Introduction to Virutal Private Networks

      4:52
    • 29. Types of VPNs

      6:16
    • 30. NordVPN

      7:46
    • 31. VPN Myths Debunked

      6:40
    • 32. Using Tor

      9:57
    • 33. Tor Weaknesses

      5:03
    • 34. Attacking Tor

      4:40
    • 35. The Dark Web

      8:15
    • 36. The Darknet

      3:24
    • 37. Combining VPN and Tor

      5:13
    • 38. Meet Eldo Kim

      1:52
    • 39. Malware Section Preview

      0:46
    • 40. Introduction to Malware

      4:52
    • 41. Viruses and Worms

      4:51
    • 42. How an Antivirus Works

      4:34
    • 43. Choosing an Antivirus Software

      8:34
    • 44. Rootkits

      5:06
    • 45. Securing the Windows 10 Boot Process

      5:27
    • 46. Using GMER Rootkit Scanner

      1:39
    • 47. Ransomware

      8:00
    • 48. Using the builtin Antiramsomware Tool

      2:14
    • 49. Using the CCleaner Software

      7:57
    • 50. Using Bleachbit

      3:50
    • 51. Malwarebytes

      6:35
    • 52. Backups and Encryption Section Preview

      0:54
    • 53. How to Backup Windows 10

      4:26
    • 54. Introduction to Cloud Computing

      9:39
    • 55. Encryption and Decryption

      4:24
    • 56. Encryption with Veracrypt

      9:22
    • 57. Encryption with Bitlocker

      2:06
    • 58. MAC Encryption with Filevault

      0:57
    • 59. Self Encrypting Drives

      0:44
    • 60. Encryption Attacks and Mitigations

      6:02
    • 61. Social Engineering Section Preview

      0:49
    • 62. Introduction to Social Engineering

      10:30
    • 63. Reconnaissance

      8:42
    • 64. Anatomy of a Social Engineering Attack

      8:50
    • 65. The Way Back Machine

      3:43
    • 66. Meet Kevin Mitnick

      1:38
    • 67. Emails Section Preview

      1:09
    • 68. Email Basics, Ports and Protocols

      6:01
    • 69. How to Track Sent Emails

      3:10
    • 70. How to Detect Email Tracking

      2:38
    • 71. Using Guerrilla Mail

      4:38
    • 72. Using Proton Mail

      4:13
    • 73. Phishing Attacks

      5:12
    • 74. Windows 10 Hardening Section Preview

      0:39
    • 75. Patching and Updates

      4:22
    • 76. Turning off ad tracker

      2:29
    • 77. Restricting Cortana

      3:22
    • 78. Turning off Location Tracking

      3:12
    • 79. Turning off Peer Updates

      3:43
    • 80. The Windows 10 Firewall

      2:22
    • 81. The Windows 10 Smart Screen Filter

      2:39
    • 82. Randomizing the MAC Address

      2:07
    • 83. Conclusion

      0:54
12 students are watching this class

Project Description

For our class project, I want you to develop some security conscious habits using some of the skills and technology you have learned from this course.

Below are the habits:

  • Start using duckduckgo search engine
  • Start using the brave browser
  • Get yourself a VPN and start using it on a daily basis
  • Stop posting or commenting on sensitive topics on social media
  • Get an antivirus and ensure its updated regularly
  • Install the CCleaner software on your PC and run it at least once every week
  • Backup your hard drive today
  • Encrypt your hard drive also
  • If you are running Windows, ensure it is as hardened as possible

Student Projects