17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
The Absolute Beginners Guide To Cyber Security - Part 2
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
** PART 2 OF THE CYBER SECURITY GUIDE FOR BEGINNERS SERIES **
Take your basic knowledge of cyber security to a whole new level with this exciting course that promises to be educational, informative and fun filled.
Build upon a basic foundation in Cyber Security with a strong focus on the following core topics.
Networking
Privacy & Anonymity
Malware
Email Security
Backups & Encryption
Windows 10 Hardening
What are the main benefits of taking this course?
I am glad you asked. This course has been designed to provide you with the knowledge and tools to not only better protect yourself against malware but to also prepare you for a career in the cyber security field if you so wish.
You will learn all the latest techniques used in the world of cyber security today and understand how a lot security technologies work behind the scenes.
In this course you will learn the following practical skills
How to use a proxy server
How to setup and use a virtual private network
How to use Tor to access the dark web anonymously
Best practices to browse the internet securely and privately
How to set up a firewall
How to use a rootkit scanner
How to encrypt your emails
How to track emails you have sent and also how to detect if you are being tracked
How to use 3 major anti-malware software products
How to completely harden the Windows 10 operating system
How to backup and encrypt your hard drive
How to choose the right anti virus
and much much much more
You will also learn how to use a wide variety of software to improve your security game and these include:
Virtual Private Networks
Kaspersky Antivirus
Bitlocker
Proxy servers
Bleachbit
Tor
CCleaner
Protonmail
Duckduck go
Brave Browser
Ugly Email
Mail Tracker
Nord VPN
GMER Rootkit scanner
Secure Boot
Veracrypt
Filevault
Guerrilla Mail
Comodo Firewall
Lastpass
Jobs in Cyber security are plentiful and this course will help prepare you for entry level roles by providing you with a solid set of skills to build up on.
* PERFECT FOR BEGINNERS *
You don’t need to have a background in cyber security though any sort of prior knowledge would be beneficial. This course is designed in such a manner that as long as you know how to use a computer and the internet, you will be able to understand and apply everything you are taught.
Content and Overview Suitable for non professionals and students with a basic understanding of cyber security. In this course of nearly 100 lectures and almost 7 hours of content, you’ll learn all of the core cyber security fundamentals and develop a strong understanding of how security and privacy can either be maintained or deprived from a user. Each chapter closes with a section review highlighting the core points raised in the section.
Starting with Networking 101, you will learn the basics of networking including what the TCP/IP protocol suite is and how the domain name system works.
With the basics of networking mastered, you will be ready to jump into the course proper with the following section where you will begin to learn about privacy and anonymity. You will learn how advertisers and websites are able to track you online and what you can do about it.
You will then move on to a more advanced section where you will be introduced to Anonymizers. You will learn how to work with proxy servers and how to setup and configure a Virtual Private Network. We will also explore how to use Tor to access the dark web as well as the pros and cons of using anonymizers. By the end of this section, you would have learned techniques and skills that you can use to secure your privacy online.
Section 5 covers malware with a special focus on viruses, rootkits and ransomware. You will learn how these various forms of malware can affect you plus you will also be introduced to a variety of anti-malware software that you can use to fight against malware.
We will then move to discuss about backups and encryption. You will learn about cloud backups as well the advantages and disadvantages of using this type of technology. I will then show you how you can back up and encrypt your hard drive and sensitive files.
Section 7 covers one of the most interesting aspects of cyber security – Social Engineering. You will learn about the different tactics employed by social engineers to extract important information without using any technical skills. We will explore how hackers exploit human psychology and fool their targets.
Email security will be covered in the very next section. Emails are a fundamental component of our daily lives and you will learn exactly how emails are sent and received behind the scenes. You will learn how to track emails and how to use mail services like guerrilla mail and proton mail.
In the final section of the course, you will learn how to harden the Windows 10 operating system against malware. Windows 10 by default is vulnerable to malware but with a few adjustments, you can make it far more secure and you will learn this tricks in this section.
Complete with resources and section reviews, you’ll be able to apply what you have learnt in this course either at home or at your place of work and will receive a verifiable certificate of completion upon finishing the course.
Take control of your privacy and security – Enroll Today in one of the very best cyber security courses you will find online.
Who this course is for:
Anyone who wants to begin a career as a cyber security professional
Students who want to learn practical techniques on how to protect their privacy online
Students who want to have a deeper understanding of many of the major topics in cyber security
Requirements
You should have an intermediate knowledge on how to use a computer and the internet
You should have a basic knowledge of cyber and computer security
Last Updated 8/2022
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
.pad/0
14 B
TutsNode.org.txt
63 B
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/01 - Introduction/001 Welcome to the Course.mp4
115.1 MB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/01 - Introduction/001 Welcome to the Course_en.srt
8.6 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/01 - Introduction/002 Connect with Me_en.srt
6 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/01 - Introduction/003 Download the PDF Guide Book.html
98 B
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/02 - Networking 101/001 Section Preview_en.srt
1.4 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/02 - Networking 101/002 MAC Addresses and IP Addresses_en.srt
11.1 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/02 - Networking 101/003 Hubs, Switches and Routers_en.srt
8.3 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/02 - Networking 101/004 Ethernet 101_en.srt
3.8 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/02 - Networking 101/005 HTTP, HTTPS, SSL & TLS_en.srt
8.9 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/02 - Networking 101/006 The Internet Protocol Suite - TCPIP_en.srt
10 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/02 - Networking 101/007 Understanding the DNS System_en.srt
8.6 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/02 - Networking 101/008 Section Review and Key Points.html
940 B
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/03 - The Internet - Privacy & Survival of the Paranoid/001 Section Preview_en.srt
1.9 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/03 - The Internet - Privacy & Survival of the Paranoid/002 What is Privacy, Anonymity and Pseudonymity_en.srt
6.4 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/03 - The Internet - Privacy & Survival of the Paranoid/003 Identity Strategies_en.srt
15.1 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/03 - The Internet - Privacy & Survival of the Paranoid/004 How We are Tracked Online_en.srt
7.5 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/03 - The Internet - Privacy & Survival of the Paranoid/005 The FaceBook Data Mining Scandal_en.srt
12.1 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/03 - The Internet - Privacy & Survival of the Paranoid/006 5 Places You are Tracked Online_en.srt
5.7 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/03 - The Internet - Privacy & Survival of the Paranoid/007 Cookies.html
2.5 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/03 - The Internet - Privacy & Survival of the Paranoid/008 Browsing in Icognito Mode - The Shocking Truth !!!_en.srt
5.5 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/03 - The Internet - Privacy & Survival of the Paranoid/009 The Brave Browser_en.srt
6.8 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/03 - The Internet - Privacy & Survival of the Paranoid/010 How to Disappear Online_en.srt
5.8 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/03 - The Internet - Privacy & Survival of the Paranoid/011 Introduction to Stylometry_en.srt
8.8 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/03 - The Internet - Privacy & Survival of the Paranoid/012 Section Review and Key Points.html
612 B
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/03 - The Internet - Privacy & Survival of the Paranoid/external-links.txt
976 B
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/001 Section Preview_en.srt
1.3 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/002 Annonymizer_en.srt
5.2 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/003 Introduction to Proxy Servers_en.srt
10.9 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/004 Introduction to VPNs_en.srt
6.6 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/005 Types of VPNs_en.srt
9.3 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/006 NordVPN_en.srt
11.8 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/007 VPN Myths Debunked_en.srt
9 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/008 Introduction to Tor_en.srt
14.6 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/009 Tor Weaknesses_en.srt
6.8 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/010 Attacking Tor - The end to end Correlation Hack_en.srt
6.5 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/011 Accessing the Dark Web with Tor_en.srt
11.4 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/012 Darknets_en.srt
5.2 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/013 VPN + Tor_en.srt
7.1 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/014 Meet Eldo Kim_en.srt
2.7 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/015 Section Review and Key Points.html
1008 B
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/04 - Anonymizers, Proxies, Virtual Private Networks & Tor/external-links.txt
303 B
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/001 Section Preview_en.srt
1.1 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/002 Introduction to Malware_en.srt
7 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/003 Viruses & Worms_en.srt
6.6 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/005 Choosing the Right Antivirus Software_en.srt
12.8 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/006 Rootkits_en.srt
7.2 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/007 Securing the Windows 10 Boot Process_en.srt
8.4 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/008 Using GMER - Rootkit Scanner_en.srt
2.5 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/009 Ransomware - Cryptolocker, WannaCry, Bad Rabbit_en.srt
10.9 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/010 Using the inbuilt AntiRansomware Tool_en.srt
3.4 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/011 CC Cleaner_en.srt
13.3 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/012 Bleachit_en.srt
6.5 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/05 - Malware, Viruses, Rootkits, Ransomware & Attacks/013 Malwarebytes_en.srt
11.2 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/06 - Backups, Storage, The Cloud and Encryption/002 How to Backup Your Computer_en.srt
6.7 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/06 - Backups, Storage, The Cloud and Encryption/003 What is the Cloud_en.srt
14.9 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/06 - Backups, Storage, The Cloud and Encryption/004 Disk Encyrption_en.srt
6.3 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/06 - Backups, Storage, The Cloud and Encryption/005 Encrypting with Veracrypt_en.srt
15.8 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/06 - Backups, Storage, The Cloud and Encryption/006 Encrypting Windows 10 with Bitlocker_en.srt
3.1 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/06 - Backups, Storage, The Cloud and Encryption/009 Attacks Against Encryption_en.srt
8.7 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/06 - Backups, Storage, The Cloud and Encryption/010 How to Password Protect USB Drives, Files & Folders_en.srt
16.7 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/07 - Social engineering - Scams, cons, tricks and fraud/002 What is Social Engineering_en.srt
16.8 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/07 - Social engineering - Scams, cons, tricks and fraud/003 Reconnaissance Methods.mp4
123.7 MB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/07 - Social engineering - Scams, cons, tricks and fraud/003 Reconnaissance Methods_en.srt
14.9 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/07 - Social engineering - Scams, cons, tricks and fraud/004 Anatomy of a Social Engineering Attack_en.srt
14.4 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/07 - Social engineering - Scams, cons, tricks and fraud/005 The Way Back Machine_en.srt
5.4 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/07 - Social engineering - Scams, cons, tricks and fraud/006 Meet Kevin Mitnick_en.srt
2 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/002 Email Basics, Protocols & Ports_en.srt
8.5 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/003 How to Track Sent Emails_en.srt
4.6 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/004 How to Detect Email Tracking_en.srt
4.3 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/005 Guerrilla Mail_en.srt
7 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/006 Introducing Proton Email_en.srt
6.2 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/007 Review Update_en.srt
4.7 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/008 Phishing Attacks_en.srt
8.1 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/08 - The World of Electronic Mails - Dangers, Attacks & Protection/009 Scam Email Live Example_en.srt
11.5 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/09 - Windows 10 Hardening, Privacy & Security/002 Patching and Updates_en.srt
6.6 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/09 - Windows 10 Hardening, Privacy & Security/003 Windows 10 Privacy - Turning off Ad Tracking_en.srt
3.7 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/09 - Windows 10 Hardening, Privacy & Security/004 Windows 10 Privacy - Restricting Cortana_en.srt
5.2 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/09 - Windows 10 Hardening, Privacy & Security/005 Windows 10 Privacy - Turning off Location Tracking_en.srt
4.6 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/09 - Windows 10 Hardening, Privacy & Security/006 Windows 10 Privacy - Turning off Peer Updates_en.srt
5.4 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/09 - Windows 10 Hardening, Privacy & Security/007 Windows 10 Hardening - The Windows 10 Firewall_en.srt
3.7 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/09 - Windows 10 Hardening, Privacy & Security/008 Windows 10 Hardening - Enabling the Smart Screen Filter_en.srt
3.8 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/09 - Windows 10 Hardening, Privacy & Security/009 Windows 10 Hardening - Randomizing the MAC Address_en.srt
3.2 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/10 - Final Exam & Conclusion/002 Other Cyber Security Courses_en.srt
7.3 KB
[TutsNode.org] - The Absolute Beginners Guide to Cyber Security - Part 2/10 - Final Exam & Conclusion/003 Getting your Certificate_en.srt