The Complete 2018 Cyber Security Guide for Non Professionals

Alexander Oni, The Web Monkey Academy

Play Speed
  • 0.5x
  • 1x (Normal)
  • 1.25x
  • 1.5x
  • 2x
79 Videos (5h 52m)
    • Promo

      2:37
    • Welcome to the Course 1

      1:32
    • Networking 101 Section Preview

      0:57
    • Meet Julian Assange

      1:49
    • MAC Addresses vs IP Addresses

      7:36
    • Hubs Switches and Routers

      5:20
    • Ethernet 101

      2:34
    • Hubs Switches and Routers

      5:20
    • The Internet Protocol Suite

      6:47
    • The DNS System

      6:22
    • The internet privacy and survival of the paranoid intro

      1:05
    • Privacy Anonnymity Pseudonymity

      4:38
    • Identity Strategies

      10:37
    • How We Are Tracked Online

      5:18
    • FaceBook vs Cambridge Analytica Scandal

      7:45
    • Exercise How muc data does Facebook have on me

      3:18
    • 5 Places You are Being Tracked

      4:16
    • Browsing Incognito

      3:55
    • Introduction to DuckDuckGo

      6:25
    • Introduction to Brave Browser

      4:20
    • How to Delete Your Online Accounts

      4:08
    • How to Disappear Online

      3:56
    • Introduction to Stylometry

      6:02
    • Annonymizers Section Intro

      0:43
    • Introduction to Anonymizers

      3:52
    • Introduction to Proxy Servers

      7:19
    • Introduction to Virutal Private Networks

      4:52
    • Types of VPNs

      6:16
    • NordVPN

      7:46
    • VPN Myths Debunked

      6:40
    • Using Tor

      9:57
    • Tor Weaknesses

      5:03
    • Attacking Tor

      4:40
    • The Dark Web

      3:24
    • Combining VPN and Tor

      5:13
    • Meet Eldo Kim

      1:52
    • Malware Section Intro

      1:07
    • Introduction to Malware

      4:52
    • Viruses and Worms

      4:51
    • How an Antivirus Works

      4:34
    • Choosing an Antivirus Software

      8:34
    • Rootkits

      5:06
    • Securing the Windows 10 Boot Process

      5:27
    • Using GMER Rootkit Scanner

      1:39
    • Ransomware

      8:00
    • Using the builtin Antiramsomware Tool

      2:14
    • Using the CCleaner Software

      7:57
    • Using Bleachbit

      3:50
    • Backups and Encryption Intro

      0:51
    • How to Backup Windows 10

      4:26
    • Introduction to Cloud Computing

      9:39
    • Encryption and Decryption

      4:24
    • Encryption with Veracrypt

      9:22
    • Encryption with Bitlocker

      2:06
    • MAC Encryption with Filevault

      0:57
    • Self Encrypting Drives

      0:44
    • Encryption Attacks and Mitigations

      6:02
    • Social Engineering Section Intro

      0:37
    • Introduction to Social Engineering

      10:30
    • Reconnaissance

      8:42
    • Anatomy of a Social Engineering Attack

      8:50
    • The Way Back Machine

      3:43
    • Meet Kevin Mitnick

      1:38
    • Email Security Section Intro

      0:50
    • Email Basics, Ports and Protocols

      6:01
    • How to Track Sent Emails

      3:10
    • How to Detect Email Tracking

      2:38
    • Using Guerrilla Mail

      4:38
    • Using Proton Mail

      4:13
    • Windows 10 Hardening Section Intro

      0:25
    • Patching and Updates

      4:22
    • Turning off ad tracker

      2:29
    • Restricting Cortana

      3:22
    • Turning off Location Tracking

      3:12
    • Turning off Peer Updates

      3:43
    • The Windows 10 Firewall

      2:22
    • The Windows 10 Smart Screen Filter

      2:39
    • Randomizing the MAC Address

      2:07
    • Conclusion

      0:54
18 students are watching this class

About This Class

Take your basic knowledge of cyber security to a whole new level with this exciting course that promises to be educational, informative and fun filled. 

Build upon a basic foundation in Cyber Security with a strong focus on the following core topics.

  • Networking
  • Privacy & Anonymity
  • Malware
  • Email Security
  • Backups & Encryption
  • Windows 10 Hardening

What are the main benefits of taking this course?

I am glad you asked. This course has been designed to provide you with the knowledge and tools to not only better protect yourself against malware but to also prepare you for a career in the cyber security field if you so wish. 

You will learn all the latest techniques used in the world of cyber security today and understand how a lot security technologies work behind the scenes.

In this course you will learn the following practical skills

  • How to use a proxy server
  • How to setup and use a virtual private network
  • How to use Tor to access the dark web anonymously
  • Best practices to browse the internet securely and privately
  • How to set up a firewall
  • How to use a rootkit scanner
  • How to encrypt your emails
  • How to track emails you have sent and also how to detect if you are being tracked
  • How to use 3 major anti-malware software products
  • How to completely harden the Windows 10 operating system
  • How to backup and encrypt your hard drive
  • How to choose the right anti virus
  • and much much much more

You will also learn how to use a wide variety of software to improve your security game and these include:

  • Virtual Private Networks
  • Kaspersky Antivirus
  • Bitlocker
  • Proxy servers
  • Bleachbit
  • Tor
  • CCleaner
  • Protonmail
  • Duckduck go
  • Brave Browser
  • Ugly Email
  • Mail Tracker
  • Nord VPN
  • GMER Rootkit scanner
  • Secure Boot
  • Veracrypt
  • Filevault
  • Guerrilla Mail
  • Comodo Firewall
  • Lastpass

 Jobs in Cyber security are plentiful and this course will help prepare you for entry level roles by providing you with a solid set of skills to build up on.

* PERFECT FOR BEGINNERS *

You don't need to have a background in cyber security though any sort of prior knowledge would be beneficial. This course is designed in such a manner that as long as you know how to use a computer and the internet, you will be able to understand and apply everything you are taught.

Content and Overview  

Suitable for non professionals and students with a basic understanding of cyber security. In this course of nearly 100 lectures and almost 7 hours of content, you’ll learn all of the core cyber security fundamentals and develop a strong understanding of how security and privacy can either be maintained or deprived from a user. Each chapter closes with a section review highlighting the core points raised in the section.

Starting with Networking 101, you will learn the basics of networking including what the TCP/IP protocol suite is and how the domain name system works.

With the basics of networking mastered, you will be ready to jump into the course proper with the following section where you will begin to learn about privacy and anonymity. You will learn how advertisers and websites are able to track you online and what you can do about it.

You will then move on to a more advanced section where you will be introduced to Anonymizers. You will learn how to work with proxy servers and how to setup and configure a Virtual Private Network. We will also explore how to use Tor to access the dark web as well as the pros and cons of using anonymizers. By the end of this section, you would have learned techniques and skills that you can use to secure your privacy online.

Section 5 covers malware with a special focus on viruses, rootkits and ransomware. You will learn how these various forms of malware can affect you plus you will also be introduced to a variety of anti-malware software that you can use to fight against malware.

We will then move to discuss about backups and encryption. You will learn about cloud backups as well the advantages and disadvantages of using this type of technology. I will then show you how you can back up and encrypt your hard drive and sensitive files.

Section 7 covers one of the most interesting aspects of cyber security - Social Engineering. You will learn about the different tactics employed by social engineers to extract important information without using any technical skills. We will explore how hackers exploit human psychology and fool their targets.

Email security will be covered in the very next section. Emails are a fundamental component of our daily lives and you will learn exactly how emails are sent and received behind the scenes. You will learn how to track emails and how to use mail services like guerrilla mail and proton mail.

In the final section of the course, you will learn how to harden the Windows 10 operating system against malware. Windows 10 by default is vulnerable to malware but with a few adjustments, you can make it far more secure and you will learn this tricks in this section.

Complete with resources and section reviews, you’ll be able to apply what you have learnt in this course either at home or at your place of work and will receive a verifiable certificate of completion upon finishing the course.

Take control of your privacy and security - Enroll Today in one of the very best cyber security courses you will find online.

5 of 6 students recommendSee All

Without question, one of the very best courses I ever took online. The lectures are presented in such an engaging manner it almost feels like I am watching a movie rather than taking a course. The course is filled with practical tips and the instructor is very funny. Highly recommended.

158

Students

--

Projects

Alexander Oni

The Web Monkey Academy

Hi there and welcome to the Web Monkey Academy on Skillshare. I am a professional web developer living in the United States of America.

I have been building websites for the past 7 years now and have been working exclusively with WordPress for almost 4 years.

I am also a cyber security expert and have a masters degree in Information Security.

See full profile