Sorry, your browser is not supported
To have the best experience using Skillshare, we recommend that you use one of these supported browsers.

The Complete 2018 Cyber Security Guide for Non Professionals

Alexander Oni, The Web Monkey Academy

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
79 Videos (5h 52m)
    • Promo

      2:37
    • Welcome to the Course 1

      1:32
    • Networking 101 Section Preview

      0:57
    • Meet Julian Assange

      1:49
    • MAC Addresses vs IP Addresses

      7:36
    • Hubs Switches and Routers

      5:20
    • Ethernet 101

      2:34
    • Hubs Switches and Routers

      5:20
    • The Internet Protocol Suite

      6:47
    • The DNS System

      6:22
    • The internet privacy and survival of the paranoid intro

      1:05
    • Privacy Anonnymity Pseudonymity

      4:38
    • Identity Strategies

      10:37
    • How We Are Tracked Online

      5:18
    • FaceBook vs Cambridge Analytica Scandal

      7:45
    • Exercise How muc data does Facebook have on me

      3:18
    • 5 Places You are Being Tracked

      4:16
    • Browsing Incognito

      3:55
    • Introduction to DuckDuckGo

      6:25
    • Introduction to Brave Browser

      4:20
    • How to Delete Your Online Accounts

      4:08
    • How to Disappear Online

      3:56
    • Introduction to Stylometry

      6:02
    • Annonymizers Section Intro

      0:43
    • Introduction to Anonymizers

      3:52
    • Introduction to Proxy Servers

      7:19
    • Introduction to Virutal Private Networks

      4:52
    • Types of VPNs

      6:16
    • NordVPN

      7:46
    • VPN Myths Debunked

      6:40
    • Using Tor

      9:57
    • Tor Weaknesses

      5:03
    • Attacking Tor

      4:40
    • The Dark Web

      3:24
    • Combining VPN and Tor

      5:13
    • Meet Eldo Kim

      1:52
    • Malware Section Intro

      1:07
    • Introduction to Malware

      4:52
    • Viruses and Worms

      4:51
    • How an Antivirus Works

      4:34
    • Choosing an Antivirus Software

      8:34
    • Rootkits

      5:06
    • Securing the Windows 10 Boot Process

      5:27
    • Using GMER Rootkit Scanner

      1:39
    • Ransomware

      8:00
    • Using the builtin Antiramsomware Tool

      2:14
    • Using the CCleaner Software

      7:57
    • Using Bleachbit

      3:50
    • Backups and Encryption Intro

      0:51
    • How to Backup Windows 10

      4:26
    • Introduction to Cloud Computing

      9:39
    • Encryption and Decryption

      4:24
    • Encryption with Veracrypt

      9:22
    • Encryption with Bitlocker

      2:06
    • MAC Encryption with Filevault

      0:57
    • Self Encrypting Drives

      0:44
    • Encryption Attacks and Mitigations

      6:02
    • Social Engineering Section Intro

      0:37
    • Introduction to Social Engineering

      10:30
    • Reconnaissance

      8:42
    • Anatomy of a Social Engineering Attack

      8:50
    • The Way Back Machine

      3:43
    • Meet Kevin Mitnick

      1:38
    • Email Security Section Intro

      0:50
    • Email Basics, Ports and Protocols

      6:01
    • How to Track Sent Emails

      3:10
    • How to Detect Email Tracking

      2:38
    • Using Guerrilla Mail

      4:38
    • Using Proton Mail

      4:13
    • Windows 10 Hardening Section Intro

      0:25
    • Patching and Updates

      4:22
    • Turning off ad tracker

      2:29
    • Restricting Cortana

      3:22
    • Turning off Location Tracking

      3:12
    • Turning off Peer Updates

      3:43
    • The Windows 10 Firewall

      2:22
    • The Windows 10 Smart Screen Filter

      2:39
    • Randomizing the MAC Address

      2:07
    • Conclusion

      0:54
16 students are watching this class