17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
The Complete Cyber Security Course - Hackers Exposed
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
The Complete Cyber Security Course : Hackers Exposed!
Volume 1 : Learn how to stop hackers, prevent tracking, advanced anonymous browsing and counter government surveillance
Requirements
A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn.
Please note this is Volume 1 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity.
Description
Learn a practical skill-set in defeating all online threats, including - advanced hackers, trackers, malware, zero days, exploit kits, cybercriminals and more.
Go from a beginner to advanced in this easy to follow expert course.
Covering all major platforms - Windows 7, Windows 8, Windows 10, MacOS and Linux.
This course covers the fundamental building blocks of your required skill set - You will understand the threat and vulnerability landscape through threat modeling and risk assessments.
We explore the Darknet and mindset of the cyber criminal. Covering malware, exploit kits, phishing, zero-day vulnerabilities and much more.
You will learn about the global tracking and hacking infrastructures that nation states run. Covering the NSA, FBI, CIA, GCHQ, China’s MSS and other intelligence agencies capabilities.
You will understand the foundations of operating system security and privacy functionality. A close look at the new Windows 10 privacy issues and how to best mitigate them.
There is a complete easy to follow crash course on encryption, how encryption can be bypassed and what you can do to mitigate the risks.
Master defenses against phishing, SMShing, vishing, identity theft, scam, cons and other social engineering threats.
Finally we cover the extremely important, but underused security control of isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS.
This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
01 Introduction/001 Welcome and Introduction to the Instructor.mp4
59.1 MB
01 Introduction/002 Goals and Learning Objectives - Volume 1.mp4
70.4 MB
01 Introduction/003 Target Audience.mp4
49.7 MB
01 Introduction/004 Study Recommendations.mp4
95.8 MB
01 Introduction/005 Course updates.mp4
18.8 MB
02 know Yourself - The Threat and Vulnerability Landscape/006 Goals and Learning Objectives.mp4
19.4 MB
02 know Yourself - The Threat and Vulnerability Landscape/007 Protect What You Value.mp4
21.5 MB
02 know Yourself - The Threat and Vulnerability Landscape/008 What is Privacy Anonymity and Pseudonymity.mp4
107.7 MB
02 know Yourself - The Threat and Vulnerability Landscape/009 Security Vulnerabilities Threats and Adversaries.mp4
88 MB
02 know Yourself - The Threat and Vulnerability Landscape/010 Threat Modeling and Risk Assessments.mp4
147.7 MB
02 know Yourself - The Threat and Vulnerability Landscape/011 Security vs Privacy vs Anonymity - Can we have it all.mp4
41.2 MB
02 know Yourself - The Threat and Vulnerability Landscape/012 Defense In Depth.mp4
6.9 MB
02 know Yourself - The Threat and Vulnerability Landscape/013 The Zero Trust Model.mp4
76.7 MB
02 know Yourself - The Threat and Vulnerability Landscape/The-Cyber-Security-Landscape-Diagram.jpg
777.2 KB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/014 Goals and Learning Objectives.mp4
20.7 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/015 Why You Need Security The Value Of A Hack.mp4
114.6 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/016 The Top 3 Things You Need To Stay Safe Online.mp4
10.7 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/017 Security Bugs and Vulnerabilities.mp4
124.6 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/018 Hackers crackers and cyber criminals.mp4
61.2 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/019 Malware viruses rootkits and RATs.mp4
81.3 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/020 Spyware Adware Scareware PUPs Browser hijacking.mp4
71.9 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/021 What is Phishing Vishing and SMShing.mp4
54.9 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/022 Spamming Doxing.mp4
34.3 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/023 Social engineering - Scams cons tricks and fraud.mp4
93.4 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/024 Darknets Dark Markets and Exploit kits.mp4
204.2 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/025 Governments spies and secret stuff part I.mp4
136.3 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/026 Governments spies and secret stuff part II.mp4
164 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/027 Encryption mandating insecurity legalizing spying.mp4
330.2 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/028 Trust Backdoors.mp4
166.8 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/029 Censorship.mp4
41.6 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/030 Security News and Alerts Stay Informed.mp4
10 MB
04 Encryption Crash Course/031 Goals and Learning Objectives.mp4