Get $1 credit for every $25 spent!

The Four Volume Cyber Security Bundle

Ending In:
Add to Cart - $35
Add to Cart ($35)
$555
93% off
wishlist
(12)
Courses
4
Lessons
521
Enrolled
120

What's Included

Video icon Video Overview

Product Details

Access
Lifetime
Content
11 hours
Lessons
117

Cyber Security Volume I: Hackers Exposed

Learn How to Stop Hackers, Prevent Tracking, & Counter Government Surveillance

By Nathan House | in Online Courses

Internet security has never been as important as it is today with more information than ever being handled digitally around the globe. In the first course of this four volume bundle, you'll get an introduction to hacking and how to protect yourself and others. You'll develop an understanding of the threat and vulnerability landscape through threat modeling and risk assessments, and build a foundation for which to expand your security knowledge.

  • Access 117 lectures & 11 hours of content 24/7
  • Explore the Darknet, malware, exploit kits, phishing, zero day vulnerabilities, & more
  • Learn about global tracking & hacking infrastructures that nation states run
  • Understand the foundations of operating system security & privacy functionality
  • Get a crash course on encryption, how it can be bypassed, & what you can do to mitigate risks
  • Discover defenses against phishing, SMShing, vishing, identity theft, & other cons
Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.

His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:

  • BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
  • SCF : SABSA Charted Architect Foundation
  • CISSP : Certified Information Systems Security Professional
  • CISA : Certified Information Systems Auditor
  • CISM : Certified Information Security Manager
  • ISO 27001 Certified ISMS Lead Auditor
  • CEH : Certified Ethical Hacker
  • OSCP : Offensive Security Certified Professional

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Section 1. Introduction
    • 1. Welcome and Introduction to the Instructor! Preview (2:06)
    • 2. Security Quick Win! (11:40)
    • 3. Goals and Learning Objectives - Volume 1 (2:30)
    • 4. Target Audience Preview (1:54)
    • 5. Study Recommendations (5:16)
    • The Forum - For Questions, Answers and Other Resources (1:34)
    • 6. Course updates (0:40)
  • Section 2. Know Yourself - The Threat and Vulnerability Landscape
    • 7. Goals and Learning Objectives (0:41)
    • 8. Protect What You Value (2:04)
    • 9. What is Privacy, Anonymity and Pseudonymity (4:35)
    • 10. Security, Vulnerabilities, Threats and Adversaries (4:37)
    • 11. Threat Modeling and Risk Assessments (7:51)
    • 12. Security vs Privacy vs Anonymity - Can we have it all? (1:56)
    • 13. Defense In Depth (1:35)
    • 14. The Zero Trust Model (3:40)
  • Section 3. Know Your Enemy - The Current Threat and Vulnerability Landscape
    • 15. Goals and Learning Objectives (0:43)
    • 16. Why You Need Security – The Value Of A Hack (5:14)
    • 17. The Top 3 Things You Need To Stay Safe Online (1:23)
    • 18. Security Bugs and Vulnerabilities - The Vulnerability Landscape (5:48)
    • 19. Hackers, crackers and cyber criminals (2:32)
    • 20. Malware, viruses, rootkits and RATs (6:56)
    • 21. Spyware, Adware, Scareware, PUPs & Browser hijacking (4:44)
    • 22. What is Phishing, Vishing and SMShing (14:53)
    • 23. Spamming & Doxing (3:15)
    • 24. Social engineering - Scams, cons, tricks and fraud (5:31)
    • 25. Darknets, Dark Markets and Exploit kits (8:04)
    • 26. Governments, spies and secret stuff part I (5:12)
    • 27. Governments, spies and secret stuff part II (9:43)
    • 28. Regulating encryption, mandating insecurity & legalizing spying (14:36)
    • 29. Trust & Backdoors (10:14)
    • 30. Censorship (2:24)
    • 31. Security News and Alerts – Stay Informed (0:49)
  • Section 4. Encryption Crash Course
    • 32. Goals and Learning Objectives (0:24)
    • 33. Symmetric Encryption (9:54)
    • 34. Asymmetric Encryption (10:17)
    • 35. Hash Functions (6:32)
    • 36. Digital Signatures (4:45)
    • 37. Secure Sockets Layer (SSL) and Transport layer security (TLS) (13:26)
    • 38. SSL Stripping (12:02)
    • 39. HTTPS (HTTP Secure) (7:49)
    • 40. Digital Certificates (6:19)
    • 41. Certificate Authorities and HTTPS (12:56)
    • 42. End-to-End Encryption (E2EE) (1:57)
    • 43. Steganography (8:12)
    • 44. How Security and Encryption is Really Attacked (2:42)
  • Section 5. Setting up a Testing Environment Using Virtual Machines
    • 45. Goals and Learning Objectives (0:27)
    • 46. Introduction to Setting up a Testing Environment Using Virtual Machines (10:08)
    • 76. Vmware (10:55)
    • 48. Virtual box (12:03)
    • 49. Kali Linux (2:50)
  • Section 6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)
    • 50. Goals and Learning Objectives (0:37)
    • 51. Security Features and Functionality (2:48)
    • 52. Security Bugs and Vulnerabilities (4:00)
    • 53. Usage Share (3:56)
    • 54. Windows 10 - Privacy & Tracking (6:08)
    • 55. Windows 10 - Disable tracking automatically (4:42)
    • 56. Windows 10 - Tool : Disable Windows 10 Tracking (8:32)
    • 57. Windows 10 – Cortana (2:20)
    • 58. Windows 10 – Privacy Settings (8:15)
    • 59. Windows 10 - WiFi Sense (3:38)
    • 60. Windows 7, 8 and 8.1 - Privacy & Tracking (7:19)
    • 61. Mac - Privacy & Tracking (4:33)
    • 62. Linux and Unix “like” Operating systems (3:27)
    • 63. Linux - Debian (1:02)
    • 64. Linux - Debian 8 Jessie - Virtual box guest additions Issue (6:15)
    • 65. Linux - OpenBSD and Archlinux (1:38)
    • 66. Linux - Ubuntu (0:58)
  • Section 7. Security Bugs and Vulnerabilities
    • 67. Goals and Learning Objectives (0:25)
    • 68. The Importance of Patching (3:47)
    • 69. Windows 7 - Auto Update (1:15)
    • 70. Windows 8 & 8.1 - Auto Update (1:25)
    • 71. Windows 10 - Auto Update (1:25)
    • 72. Windows - Criticality and Patch Tuesday (3:46)
    • 73. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching (8:34)
    • 74. Linux - Debian - Patching (10:58)
    • 75. Mac - Patching (6:58)
    • 76. Firefox - Browser and extension updates (4:23)
    • 77. Chrome - Browser and extension updates (1:13)
    • 78. IE and Edge - Browser and extention updates (0:46)
    • 79. Auto updates - The Impact to privacy and anonymity (1:41)
  • Section. 8 Reducing Threat Privilege
    • 80. Goals and Learning Objectives + Removing Privilege (2:53)
    • 81. Windows 7 - Not using admin (3:32)
    • 82. Windows 8 and 8.1 - Not using admin (4:14)
    • 83. Windows 10 - Not using admin (3:25)
  • Section 9. Social Engineering and Social Media Offence and Defence
    • 84. Goals and Learning Objectives (0:26)
    • 85. Information Disclosure and Identity Strategies for Social Media (12:34)
    • 86. Identify Verification and Registration (5:05)
    • 87. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1 (7:50)
    • 88. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2 (10:22)
    • 89. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons) (5:02)
  • Section 10. Security Domains
    • 90. Goals and Learning Objectives (0:21)
    • 91. Security Domains (10:00)
  • Section 11. Security Through Isolation and Compartmentalization
    • 92. Goals and Learning Objectives (0:37)
    • 93. Introduction to Isolation and Compartmentalization (2:10)
    • 94. Physical and Hardware Isolation - How to change the Mac Address (7:10)
    • 95. Physical and Hardware Isolation - Hardware Serials (11:18)
    • 96. Virtual Isolation (8:36)
    • 97. Dual Boot (2:41)
    • 98. Built-in Sandboxes and Application Isolation (3:07)
    • 99. Windows - Sandboxes and Application Isolation (5:57)
    • 100. Windows - Sandboxes and Application Isolation - Sandboxie (11:29)
    • 101. Linux - Sandboxes and Application Isolation (3:04)
    • 102. Mac - Sandboxes and Application Isolation (6:33)
    • 103. Virtual Machines (10:51)
    • 104. Virtual Machine Weaknesses (10:31)
    • 105. Virtual Machine Hardening (9:15)
    • 106. Whonix OS - Anonymous Operating system (20:51)
    • 107. Whonix OS - Weaknesses (4:18)
    • 108. Qubes OS (19:07)
    • 109. Security Domains, Isolation and Compartmentalization (4:42)
  • Section 12. BONUS - What's next?... Volume 2, 3 and 4
    • 110. BONUS - Important Information (0:46)
    • 111. Congratulations - Video to be redone
    • 112. BONUS Lecture from Volume 2 - Router Vulnerability Scanning (Shodan, Qualys) (16:23)
    • 113. BONUS Lecture from Volume 2 - Password cracking part 2 (7:09)
    • 114. BONUS Lecture from Volume 3 - Bypassing firewalls and HTTP proxies part 3 (15:21)
    • 115. BONUS Lecture from Volume 4 - Email clients, protocols and authentication (13:17)

View Full Curriculum


Access
Lifetime
Content
12.5 hours
Lessons
106

Cyber Security Volume II: Network Security

Discuss Network Security, Firewalls, & Learn the Best Password Managers On the Market

By Nathan House | in Online Courses

Over this course you'll learn network hacking techniques and vulnerability scanning to discover security risks across an entire network, learning skills for which companies are willing to pay top dollar. Whether you want to protect your own network or protect corporate networks professionally, this course will get you up to speed.

  • Access 106 lectures & 12.5 hours of content 24/7
  • Architect your network for maximum security & prevent local & remote attacks
  • Understand the various types of firewalls available, including layer 4 firewalls like Iptables & PF
  • Discuss firewalls on all platforms, including Windows, Mac OS, & Linux
  • Explore wireless security & learn how WiFi is hacked
  • Use tools like Wireshark, Tcpdump, & Syslog to monitor your network
  • Dive into search engine privacy & tracking, learning how to mitigate tracking & privacy issues
Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.

His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:

  • BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
  • SCF : SABSA Charted Architect Foundation
  • CISSP : Certified Information Systems Security Professional
  • CISA : Certified Information Systems Auditor
  • CISM : Certified Information Security Manager
  • ISO 27001 Certified ISMS Lead Auditor
  • CEH : Certified Ethical Hacker
  • OSCP : Offensive Security Certified Professional

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Section: 1 Introduction
    • 1. Welcome to Volume 2 (0:34)
    • 2. Introduction to the Instructor! (2:06)
    • 3. Security Quick Win! (11:23)
    • 4. Target Audience (1:54)
    • 5. Study Recommendations (4:34)
    • 6. Course updates (0:40)
  • Section: 2 Goals and Learning Objectives - Volume 2
    • 7. Goals and Learning Objectives - Volume 2 (3:09)
  • Section: 3 Routers - Port and Vulnerability scanning
    • 8. Goals and Learning Objectives (0:28)
    • 9. The Home Router (13:44)
    • 10. External Vulnerability Scanning - Shodan, Qualys & Nmap (16:23)
    • 11. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS (19:33)
    • 12. Open Source Custom Router Firmware (11:37)
  • Section: 4 Firewalls
    • 13. Goals and Learning Objectives (0:25)
    • 14. Firewalls – Host-based, network-based and virtual Part 1 (14:48)
    • 15. Firewalls – Host-based, network-based and virtual Part 2 (4:54)
    • 16. Windows - Host Based Firewalls - Windows Firewall (10:29)
    • 17. Windows - Host Based Firewalls - Windows Firewall Control (WFC) (5:18)
    • 18. Windows - Host Based Firewalls - Third Party (8:45)
    • 19. Linux - Host Based Firewalls - iptables (19:58)
    • 20. Linux - Host Based Firewalls - UFW, gufw & nftables (12:07)
    • 21. Mac OS X - Host based Firewalls - Application Firewall & PF (13:52)
    • 22. Mac OS X - Host based Firewalls - pflist, Icefloor & Murus (7:47)
    • 23. Mac OS X - Host based Firewalls - Little Snitch (6:22)
    • 24. Network based firewalls - Routers - DD-WRT (5:09)
    • 25. Network based firewalls - Hardware (2:43)
    • 26. Network based firewalls - PFsence, Smoothwall and Vyos (10:34)
  • Section: 5 Network Attacks, Architecture and Isolation
    • 27. Goals and Learning Objectives (0:17)
    • 28. Network Attacks and Network Isolation - Introduction and IOT (6:34)
    • 29. Network Attacks and Network Isolation - Arp Spoofing and Switches (6:19)
    • 30. Effective Network Isolation Part 1 (12:27)
    • 31. Effective Network Isolation Part 2 (7:26)
  • Section: 6 Wireless and Wi-Fi Security
    • 32. Goals and Learning Objectives (0:25)
    • 33. Wi-Fi Weaknesses - WEP (2:28)
    • 34. Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP (13:40)
    • 35. Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP (6:49)
    • 36. Wi-Fi Security Testing (4:01)
    • 37. Wireless Security - Secure Configuration and Network Isolation (14:18)
    • 38. Wireless security - RF Isolation and Reduction (3:01)
    • 39. Wireless security - Who is on my Wi-Fi Network? (3:20)
  • Section: 7 Network Monitoring for Threats
    • 40. Goals and Learning Objectives (0:17)
    • 41. Syslog (16:59)
    • 42. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1 (14:01)
    • 43. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2 (7:59)
    • 44. Wireshark - Finding malware and hackers - Part 1 (15:46)
    • 45. Wireshark - Finding malware and hackers - Part 2 (8:12)
    • 46. Network Monitoring - Wincap, NST, Netminer and NetWorx (1:39)
  • Section: 8 How We Are Tracked Online
    • 47. Goals and Learning Objectives (0:23)
    • 48. Types of Tracking (4:25)
    • 49. IP Address (5:27)
    • 50. 3rd Party Connections (4:25)
    • 51. HTTP Referer (3:21)
    • 52. Cookies and Scripts (8:00)
    • 53. Super Cookies (5:12)
    • 54. Browser Fingerprinting and Browser Volunteered Information (2:36)
    • 55. Browser and Browser Functionality (1:39)
    • 56. More Tracking (2:48)
    • 57. Browser and Internet Profiling (6:35)
  • Section: 9 Search Engines and Privacy
    • 58. Goals and Learning Objectives (0:19)
    • 59. Search Engine Tracking, Censorship and Privacy (12:44)
    • 60. Ixquick and Startpage (7:56)
    • 61. DuckDuckGo (3:44)
    • 62. Disconnect search (4:43)
    • 63. Yacy (3:32)
    • 64. Private and Anonymous Searching (7:34)
  • Section: 10 Browser Security and Tracking Prevention
    • 65. Goals and Learning Objectives (0:21)
    • 66. Which Browser – Choice of Browser (6:01)
    • 67. Reducing the Browser Attack Surface (11:34)
    • 68. Browser Hacking Demo (9:26)
    • 69. Browser Isolation and Compartmentalization (6:10)
    • 70. Firefox Security, Privacy and Tracking (12:26)
    • 71. uBlock origin - HTTP Filters, ad and track blockers (14:13)
    • 72. uMatrix - HTTP Filters, ad and track blockers (7:14)
    • 73. Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers (6:37)
    • 74. ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers (6:46)
    • 75. No-script - HTTP Filters, ad and track blockers (8:29)
    • 76. Policeman and others - HTTP Filters, ad and track blockers (3:56)
    • 77. History, Cookies and Super cookies Part 1 (11:43)
    • 78. History, Cookies and Super cookies Part 2 (12:13)
    • 79. HTTP Referer (2:19)
    • 80. Browser Fingerprinting (18:26)
    • 81. Certificates and Encryption (11:29)
    • 82. Firefox Hardening (18:49)
  • Section: 11 Passwords and Authentication Methods
    • 83. Goals and Learning Objectives (0:31)
    • 84. Password Attacks (3:22)
    • 85. How Passwords are Cracked - Hashes - Part 1 (16:17)
    • 86. How Passwords are Cracked - Hashcat - Part 2 (7:09)
    • 87. Operating System Passwords (2:27)
    • 88. Password Managers - An Introduction (2:07)
    • 89. Password Managers - Master Password (5:12)
    • 90. Password Managers - Keepass and Keepassx (4:59)
    • 91. Password Managers - Lastpass (11:22)
    • 92. Password Managers - Hardening Lastpass (7:34)
    • 93. Creating a Strong Password That You Can Remember - Part 1 (8:53)
    • 94. Creating a Strong Password That You Can Remember - Part 2 (9:23)
    • 95. Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy (10:54)
    • 96. Multi-Factor Authentication - Hard Tokens - 2FA Dongles (5:53)
    • 97. Choosing a Method of Multi-Factor Authentication (2:50)
    • 98. Multi-Factor Authentication - Strengths and Weaknesses (2:09)
    • 99. The Future of Password and Authentication (1:22)
  • Section: 12 BONUS Section... Whats Next?...Volume 3 and 4
    • 100. BONUS - Important Information (0:46)
    • 102. BONUS Lecture from Volume 3 - Which VPN protocol is best to use? and why? (11:43)
    • 103. BONUS Lecture from Volume 4 - Email Tracking and Hacking (10:33)
    • 104. BONUS Lecture from Volume 1 - Security Vulnerabilities, Threats and Adversaries (4:37)

View Full Curriculum


Access
Lifetime
Content
13.5 hours
Lessons
120

Cyber Security Volume III: Anonymous Browsing

Dive Into Anonymous Browsing, Hiding IP Addresses, Hacker OPSEC, & More

By Nathan House | in Online Courses

Anonymity and web privacy are hot button issues these days, especially now that internet service providers can sell off your browsing data without informing you. This course takes a deep dive into the best anonymizing and privacy methods, from Tor to bulletproof hosting and everything in between.

  • Access 120 lectures & 13.5 hours of content 24/7
  • Analyze the strengths & weaknesses of anonymity services like Tor, VPNs, proxy servers, OPSEC, I2P, & much more
  • Explore chaining & nesting anonymizing services together to provide layers of obfuscation
  • Cover bypassing censors, firewalls, & proxies
  • Understand how to use off-site connections & cellular networks for privacy & anonymity
Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.

His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:

  • BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
  • SCF : SABSA Charted Architect Foundation
  • CISSP : Certified Information Systems Security Professional
  • CISA : Certified Information Systems Auditor
  • CISM : Certified Information Security Manager
  • ISO 27001 Certified ISMS Lead Auditor
  • CEH : Certified Ethical Hacker
  • OSCP : Offensive Security Certified Professional

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Section: 1 Introduction
    • 1. Welcome to Volume III (0:35)
    • 2. Introduction to the Instructor! (2:06)
    • 3. Security Quick Win! (11:23)
    • 3. Target Audience (1:54)
    • 4. Study Recommendations (4:34)
    • 5. Course updates (0:40)
  • Section: 2 Goals and Objectives for Volume III
    • 6. Goals and Learning Objectives (3:39)
  • Section: 3 OPSEC (Operational Security)
    • 7. Goals and Learning Objectives (0:45)
    • 8. Introduction to OPSEC (3:45)
    • 9. Identities, pseudonyms and aliases (Identity Strategies) (6:04)
    • 10. Establishing Cover (9:12)
    • 11. Identify Cross Contamination (5:57)
    • 12. 10 Rules of OPSEC (13:47)
    • 13. Authorship Recognition and Evasion Methods (4:06)
    • 14. The knock (4:48)
    • 15. Case Studies of OPSEC Failures (7:22)
  • Section: 4 Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny Core linux
    • 16. Goals and Learning Objectives (0:13)
    • 17. Introduction to live operating systems (11:35)
    • 18. Knoppix, Puppy linux, Jondo live, Tiny core linux, Window To Go (12:18)
    • 19. Tails (13:43)
    • 20. Tails Demo (9:49)
  • Section: 5 Virtual Private Networks (VPNs)
    • 21. Goals and Learning Objectives (0:39)
    • 22. Introduction to VPNs (10:10)
    • 23. Which VPN protocol is best to use? and why? (11:43)
    • 24. VPN Weaknesses (16:32)
    • 25. Can you trust VPN providers? (8:52)
    • 26. VPNs and Domain Name System (DNS) Leaks (9:36)
    • 27. Setting up an OpenVPN client in Windows, Mac, iPhone and Android (11:56)
    • 28. Setting up an OpenVPN client on Linux (9:24)
    • 29. Preventing VPN Leaks - Firewalls and kill switches (12:16)
    • 30. Choosing the right VPN provider (11:42)
    • 31. Setting up an OpenVPN server Part 1 - The fast and easy way (12:28)
    • 32. Setting up an OpenVPN server Part 2 - Debian client (7:18)
    • 33. Setting up an OpenVPN server Part 3 - Home VPN (3:12)
  • Section: 6 Tor
    • 34. Goals and Learning Objectives (0:20)
    • 35. What is Tor? (7:35)
    • 36. The Tor Network and Browser (8:13)
    • 37. What should Tor be used for? (10:36)
    • 38. Directory Authorities and Relays (7:11)
    • 39. Tor Bridges (6:19)
    • 40. Tor Pluggable Transports and Traffic Obfuscation (8:20)
    • 41. Torrc Configuration File (13:32)
    • 42. Running other applications through Tor (13:54)
    • 43. Tor Weaknesses Part 1 (14:05)
    • 44. Tor Weaknesses Part 2 (6:55)
    • 45. Conclusions on Tor and mitigation to reduce risk (4:31)
    • 46. Attacking Tor: how the NSA targets users' online anonymity (14:04)
    • 47. Hidden services – The Tor darknet (3:04)
    • 48. Finding Tor hidden services (2:44)
    • 49. Other Tor Apps (2:43)
  • Section: 7 VPN and Tor Routers
    • 50. Goals and Learning Objectives (0:14)
    • 51. Introduction to VPN and Tor Routers (6:05)
    • 52. Custom Router Firmware for VPN & TOR Tunneling (6:19)
    • 53. Off the shelf VPN and TOR Routers (6:57)
    • 54. DIY Hardware TOR Routers (2:56)
    • 55. TOR and VPN Gateway Virtual Machines (5:55)
  • Section: 8 Proxies – HTTP, HTTPS, SOCKs and Web
    • 56. Goals and Learning Objectives (0:18)
    • 57. Proxies – HTTP, HTTPS and SOCKS Part 1 (9:04)
    • 58. Proxies – HTTP, HTTPS and SOCKS Part 2 (7:36)
    • 59. CGI proxies - Web proxy or web form proxy (4:15)
  • Section: 9 SSH Secure Shell
    • 60. Goals and Learning Objectives (0:18)
    • 61. Introduction & How to Login (5:23)
    • 62. SSH Remote Port Forwarding (8:27)
    • 63. SSH Local Port Forwarding (4:05)
    • 64. SSH Socks5 Proxy Tunneling with Dynamic Ports (10:20)
    • Lesson 65. SSH Public private key authentication (9:29)
    • Lesson 66. SSH Hardening (4:16)
  • Section: 10 I2P - The Invisible Internet Project
    • 67. Goals and Learning Objectives (0:16)
    • 68. I2P - Introduction (11:28)
    • 69. I2P Installing and Secure Configuration Part 1 (16:54)
    • 70. I2P Installing and Secure Configuration Part 2 (11:15)
    • 71. I2P Strengths and Weaknesses (4:21)
  • Section: 11 Other Privacy and Anonymising Services
    • 72. Goals and Learning Objectives (0:15)
    • 73. JonDonym - Introduction (8:43)
    • 74. JonDonym - Installing and Secure Configuration (5:13)
    • 75. Bullet Proof Hosting Services (BPHS) (4:14)
    • 76. Botnets and Hacked Boxes (1:45)
  • Section: 12 Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection
    • 77. Goals and Learning Objectives (0:15)
    • 78. Outbound Firewall Bypassing - The Fundamentals Part 1 (10:08)
    • 79. Outbound Firewall Bypassing - The Fundamentals Part 2 (10:45)
    • 80. Outbound Bypassing - Tunneling through HTTP proxies (15:21)
    • 81. Outbound Bypassing - Port Sharing and Knocking (7:37)
    • 82. Outbound Bypassing – Cloaking and Obfuscating (7:57)
    • 83. Outbound Bypassing - Remote login - VNC and RDP (5:34)
    • 84. Inbound Bypassing - Reverse shells, SSH remote tunneling and remote login (7:53)
  • Section: 13 Chaining/Nesting Privacy and Anonymising Services
    • 85. Goals and Learning Objectives (0:27)
    • 86. Introduction to nesting and chaining - Proxies, VPN, SSH, JonDonym and Tor (6:35)
    • 87. Strengths and Weaknesses : (User -> SSH-VPN-JonDonym -> Tor -> Internet) (10:38)
    • 88. Strengths and Weaknesses : (User -> Tor -> SSH-VPN-JonDonym -> Internet) (10:17)
    • 89. Nested VPNs - Strength and Weaknesses (8:01)
    • 90. How to setup nested VPNs (6:16)
    • 91. How to setup nested SSH (6:28)
    • 92. How to setup proxy chains (7:14)
    • 93. How to setup - (User -> VPN -> Tor -> Internet) (2:08)
    • 94. How to setup - (User -> SSH -> Tor -> Internet) (3:45)
    • 95. How to setup - (User -> JonDonym -> Tor -> Internet) (1:42)
    • 96. How to setup - (User -> Tor -> SSH/VPN/JonDoym -> Internet) with transproxy (15:16)
    • 97. How to setup - (User -> Tor -> SSH/VPN/JonDoym -> Internet) with Whonix (8:02)
    • 98. Setting up nested services (3 + hops) (4:58)
  • Section: 14 Off-site Internet Connections - Hotspots and Cafes
    • 99. Goals and Learning Objectives (0:21)
    • 100. Staying safe while on public Wi-Fi hotspots (4:32)
    • 101. Using Internet Cafés for security, privacy and anonymity safely (7:38)
    • 102. Using public Wi-Fi hotspots for security, privacy and anonymity safely (9:30)
    • 103. Finding public Wi-Fi hotspots (4:20)
    • 104. Boosting Wi-Fi range (12:38)
    • 105. How are Wi-Fi users geo located? (4:50)
  • Section: 15 Mobile, Cell Phones & Cellular Networks
    • 106. Goals and Learning Objectives (0:20)
    • 107. Cellular Network Weaknesses - The Network Operator (6:03)
    • 108. Cellular Networks Weaknesses - IMSI catchers (4:49)
    • 109. Cellular Networks Weaknesses - Signaling System No7 (SS7) (4:08)
    • 110. Mobile and Cell Phone Weaknesses (10:29)
    • 111. How to use a laptop and cellular networks for Internet privacy and anonymity (9:11)
    • 112. How you are geo located when using a cellular network (4:28)
  • Section: 16 BONUS SECTION - Whats next Volume IV
    • 113. BONUS . Important information (0:46)
    • 115. BONUS - Example Lecture from Volume I- Intro to Isolation & Compartmentalization (2:10)
    • 116. BONUS - Example Lecture from Volume II - Firefox Hardening (18:49)
    • 117. BONUS - Example Lecture from Volume 4 - Email Tracking & Exploits (10:33)

View Full Curriculum


Access
Lifetime
Content
16.5 hours
Lessons
178

Cyber Security Volume IV: End Point Protection

Learn About Application & Execution Control, Disk Encryption, & Antivirus Protection

By Nathan House | in Online Courses

Personal or professional, it makes no difference, learning to secure laptops, desktops, and mobile services is an excellent skill to have, and this course will teach you how to protect each from advanced hackers, trackers, exploit kits, thieves, and much more. Covering end-point-protection on Windows, Mac OS, Linux, iOS, and Android, this course will help you master techniques to defend all kinds of devices. Maybe somebody will even pay you for it!

  • Access 178 lectures & 16.5 hours of content 24/7
  • Master the selection & implementation of solid disk encryption technology
  • Understand the current & next gen antivirus solutions, how they work, & how to select the best products
  • Learn how to detect & monitor for threats such as malware & hackers
  • Get up to speed on hacker hunting
  • Perform operating system hardening to decrease the attack surfaces of your devices
  • Explore the best techniques in anti-forensics to securely delete data & meta-data
Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.

His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:

  • BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
  • SCF : SABSA Charted Architect Foundation
  • CISSP : Certified Information Systems Security Professional
  • CISA : Certified Information Systems Auditor
  • CISM : Certified Information Security Manager
  • ISO 27001 Certified ISMS Lead Auditor
  • CEH : Certified Ethical Hacker
  • OSCP : Offensive Security Certified Professional

Details & Requirements

  • Length of time users can access this course: lifetime
  • Access options: web streaming, mobile streaming
  • Certification of completion not included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Experience level required: all levels

Compatibility

  • Internet required

Course Outline

  • Section 1: Introduction
    • 1. Welcome to Volume 4 (0:44)
    • 2. Introduction to the Instructor! (2:06)
    • 3. Security Quick Win! (11:23)
    • 4. Target Audience (1:54)
    • 5. Study Recommendations (4:34)
    • 6. Course updates (0:40)
  • Section 2: Goals and Learning Objectives - Volume 4
    • 8. What is End Point Protection? and why is it important? (4:38)
    • 9. Goals and Learning Objectives - Volume 4 (3:26)
  • Section 3: File and Disk Encryption
    • 10. Goals and Learning Objectives (0:44)
    • 11. Disk Encryption – What is it good for? (7:48)
    • 12. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation (5:29)
    • 13. Disk Encryption Attacks - Physical (11:17)
    • 14 Disk Encryption Attacks - Containers, Volumes and Partitions (2:21)
    • 15. Windows - Disk Encryption - An Introduction (2:39)
    • 16. Windows - Disk Encryption - Bitlocker (12:06)
    • 17. Windows - Setting Up BitLocker (9:30)
    • 18. Windows - Disk Encryption - VeraCrypt (11:28)
    • 19. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt (3:06)
    • 20. Windows, Mac & Linux - Setting up VeraCrypt (11:42)
    • 21. Mac - Filevault2 (5:39)
    • 22. Mac - Setting up Filevault2 (7:35)
    • 23. Linux Whole Disk Encryption - Dm-crypt and LUKS (5:54)
    • 24. Linux - Setting up DMCrypt/LUKS (5:09)
    • 25. Linux - Encrypting the boot partition with Grub2 (4:47)
    • 26. Self Encrypting Drives (SEDs) (1:47)
    • 27. Defense Against Disk Decryption Attacks (7:48)
    • 28. File Encryption (4:13)
    • 29. Mandatory Key Disclosure & Plausible Deniability (7:34)
    • 30. Nesting Crypto Systems & Obfuscation (3:20)
    • 31. Case Studies in Disk Decryption (2:45)
  • Section 4: Anti-Virus and End-Point-Protection
    • 32. Goals and Learning Objectives (0:38)
    • 33. Is Anti-Virus dead? - The Threat Landscape (3:55)
    • 34. Is Anti-Virus dead? - Protection Methods (10:53)
    • 35. Ransomware (4:17)
    • 36. Anti-Virus and End-Point-Protection Testing (4:04)
    • 37. The Problem With AV and EPP Testing (3:38)
    • 38. The Best of Business End-Point-Protection (EPP) (2:23)
    • 39. Windows - The Best of Anti-Virus and End-Point-Protection (4:05)
    • 40. Business End Point Protection (EPP) (2:23)
    • 41. Mac - XProtect (2:51)
    • 42. Mac - The Best of Anti-Virus and End-Point-Protection (2:34)
    • 43. Linux - The Best of Anti-Virus and End-Point-Protection (2:41)
    • 44. Online and Second Opinion - Anti-Virus and End-Point-Protection (3:12)
    • 45. Is Anti-Virus and End-Point-Protection Dangerous? (6:35)
  • Section 5: Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)
    • 46. Goals and Learning Objectives (0:34)
    • 47. Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP) (4:59)
    • 48. End Point Detection and Response (EDR) (6:39)
    • 49. End-Point-Protection: How it works together in layers (6:57)
  • Section 6: End-Point-Protection Technology
    • 50. Goals and Learning Objectives (0:40)
    • 51. What is application and execution control? (9:49)
    • 52. Windows - Application control - ACLs, Windows Permission Identifier & Accessenum (6:26)
    • 53. Windows - Application control - User Account Control (UAC) (4:18)
    • 54. Windows - Application control - Software Restriction Policies (4:34)
    • 55. Windows - Application control - AppLocker (10:23)
    • 56. Windows - Application Control - Parental controls (2:43)
    • 57. Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks (6:35)
    • 58. Windows - Exploitation Prevention - EMET (12:58)
    • 59. Windows - Exploitation Prevention - Traps, MBEA and HMPA (4:49)
    • 60. Windows 10 - Device Guard (11:32)
    • 61. Windows - Defender Application Guard for Microsoft Edge (2:21)
    • 62. Linux - Access Control Models (7:45)
    • 63. Linux - Security frameworks - AppArmor (2:13)
    • 64. Linux - Security frameworks - SElinux (3:19)
    • 65. Linux - Security frameworks - Grsecurity (3:59)
    • 66. Linux - Security frameworks - PaX and more (1:40)
    • 67. Linux & Mac - File permissions, POSIX and ACLs (8:03)
    • 68. Mac - Application control - Parental controls (3:04)
    • 69. Mac - Application control - Gatekeeper (5:23)
    • 70. Mac - Application control - System Integrity Protection (5:42)
    • 71. Mac - Application control - Santa (3:47)
    • 72. Mac - Application control - Little Flocker (6:59)
    • 73. Mac - Other Stuff! (1:19)
    • 74. The New Normal For End-Point-Protection Technology (7:50)
    • 75. Cylance (4:46)
  • Section 7: Threat Detection and Monitoring
    • 76. Goals and Learning Objectives (0:48)
    • 77. A Complete Failure to Detect Threats (5:20)
    • 78. Rethinking Honeypots (4:37)
    • 79. CanaryTokens (18:46)
    • 80. OpenCanary (12:19)
    • 81. CanaryPi
    • 82. Artillery - Binary Defense (3:32)
    • 83. Honey Drive (1:13)
    • 84. Intrusion Detection Systems (IDS) Part 1 - Methods (7:11)
    • 85. Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n (4:55)
    • 86. Host-Based Intrusion Detection - OSSEC (4:40)
    • 87. Network Analysis - Sguil, Xplico & NetworkMiner (3:05)
    • 88. File Integrity Monitoring (FIM) and Checking Part 1 (2:58)
    • 89. File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe (2:31)
    • 90. Network Security Toolkit (NST) (2:04)
    • 91. Security Onion (1:17)
    • 92. Security Information and Event Management Software (SIEM) (2:51)
  • Section 8: Malware and Hacker Hunting on the End-Point
    • 93. Goals and Learning Objectives (0:49)
    • 94. Introduction to Malware and Hacker Hunting (8:20)
    • 95. Windows - Farbar Recovery Scanner (9:20)
    • 96. Automated Malware Removal Tools (10:41)
    • 97. Live Rescue Operating Systems, CDs, and USBs (6:42)
    • 98. Windows - Malware Seek & Destroy (Process Explorer) Part 1 (11:33)
    • 99. Windows - Malware Seek & Destroy - Process Explorer - Part 2 (10:04)
    • 100. Windows - Malware Seek & Destroy - Process Tools (2:09)
    • 101. Windows - Malware Seek & Destroy - Sigcheck (2:31)
    • 102. Windows - Malware Seek & Destroy - Autoruns (10:09)
    • 103. Windows - Malware Seek & Destroy - Process Monitor (10:47)
    • 104. Windows - Malware Seek & Destroy - Network Connections (8:10)
    • 105. Malware Seek & Destroy - Networkx (2:21)
    • 106. Linux - Seek & Destroy Malware and Hackers - Sysdig (10:27)
    • 107. Linux - Seek & Destroy Malware and Hackers - Csysdig (11:13)
    • 108. Linux - Seek & Destroy Malware and Hackers - debsums and unhide (1:53)
    • 109. Linux & Mac OS X - Malware Seek & Destroy - netstat (7:13)
    • 110. Linux & Mac OS X - Malware Seek & Destroy - lsof (8:15)
    • 111. Linux - Malware Seek & Destroy - rkhunter (6:13)
    • 112. Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD (2:00)
    • 113. Linux - Malware Seek & Destroy - Linux - Persistence Part 1 (3:23)
    • 114. Linux - Malware Seek & Destroy - Linux - Persistence Part 2 (10:18)
    • 115. Linux - Malware Seek & Destroy - Linux - Persistence Part 3 (2:55)
    • 116. Mac - Malware Seek & Destroy - Task Explorer (5:22)
    • 117. Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer (7:26)
    • 118. Mac, Linux & Windows - OSquery (14:47)
    • 119. Firmware Rootkits – Seek and Destroy Part 1 (7:28)
    • 120. Firmware Rootkits – Seek and Destroy Part 2 (4:05)
    • 121. End-Point-Protection Recovery and Remediation Technology (3:17)
    • 122. Encrypted Backup and Cloud Storage (6:03)
  • Section 9: Operating System and Application Hardening
    • 123. Goals and Learning Objectives (0:47)
    • 124. An Introduction to Hardening (5:28)
    • 125. Hardening Standards (10:01)
    • 126. OpenSCAP (12:46)
    • 127. Baseline Auditing (3:31)
    • 128. Windows – Hardening (1:54)
    • 129. Windows - Security Compliance Manager (SCM) (11:01)
    • 130. Mac – Hardening (1:35)
    • 131. Linux – Hardening (3:31)
    • 132. Security Focused Operating Systems (4:49)
    • 133. Monitoring for Security Drift (1:16)
  • Section 10: Secure Deleting, Evidence Elimination and Anti-Forensics
    • 134. Goals and Learning Objectives (0:43)
    • 135 Secure File Deletion - Mechanical drives (8:10)
    • 136. Secure File Deletion - Solid Sate Drive (6:37)
    • 137. Evidence Elimination & Anti-Forensics - An Introduction (4:42)
    • 138. Evidence Elimination - CCleaner and Bleachit (7:02)
    • 139. Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer (5:49)
    • 140. Disk Wiping - Mechanical Drives (5:46)
    • 141. Disk Wiping - Solid State Drives (10:53)
    • 142. Scrubbing EXIF & Metadata Part 1 - Introduction (6:56)
    • 143. Scrubbing EXIF & Metadata Part 2 - Tools (5:14)
    • 144. Scrubbing EXIF & Metadata Part 3 - Guidance (4:36)
    • 145. Sensor Noise Camera Identification (4:06)
  • Section 11: Email Security, Privacy and Anonymity
    • 146. Goals and Learning Objectives (1:05)
    • 147. Clients, Protocols and Authentication (13:17)
    • 148. Email Weaknesses (13:02)
    • 149. PGP & GPG & Privacy (5:50)
    • 150. PGP & GPG Clients (6:28)
    • 151. Windows - PGP & GPG (19:52)
    • 152. Tail - PGP & GPG (4:01)
    • 153. PGP & GPG Weaknesses (6:15)
    • 154. Improving OpenPGP Security - Best Practices - Part 1 (2:32)
    • 155. Improving OpenPGP Security - Primary and Subkeys - Part 2 (12:20)
    • 156. Improving OpenPGP Security - Smartcards/Yubikey - Part 3 (7:41)
    • 157. Email Tracking & Exploits (10:33)
    • 158. Email Anonymity & Pseudonymity (6:18)
    • 159. TorBirdy (7:36)
    • 160. Remailers (7:34)
    • 161. Choosing an Email Provider (13:46)
    • 162. Email Alternatives (3:17)
  • Section 12: Messengers - Security, Privacy and Anonymity
    • 163. Goals and Learning Objectives (0:19)
    • 164. An Introduction to Instant Messengers (3:08)
    • 165. Instant Messengers - Signal (2:30)
    • 166. Instant Messengers - Chatsecure (1:39)
    • 167. Instant Messengers - Cryptocat (0:45)
    • 168. Instant Messengers - Ricochet (0:46)
    • 169. Instant Messengers - Other (0:38)
    • 170. Video and Voice Messengers - Linphone (4:28)
    • 171. Video and Voice Messengers - Jitsi (1:40)
    • 172. Video and Voice Messengers - Other (0:57)
  • Section 13: BONUS SECTION
    • 173. Congratulations!! (0:29)
    • 176. BONUS Sample Lecture from Volume 1 - Qubes OS (19:07)
    • 177. BONUS Sample Lecture from Volume 2 - Effective Network Isolation (12:27)
    • 178. BONUS Sample Lecture from Volume 3 - Socks5 proxy tunneling (10:20)

View Full Curriculum



Terms

  • Instant digital redemption

15-Day Satisfaction Guarantee

We want you to be happy with every course you purchase! If you're unsatisfied for any reason, we will issue a store credit refund within 15 days of purchase.