Cyber Security

Course outline 

Module 1: Introduction

  • Welcome and Introduction to the Instructor
  • Security Quick Win
  • Goals and Learning Objectives – Volume 1
  • Target Audience
  • Study Recommendations
  • The Forum – For Questions, Answers, and Other Resources
  • Course Updates

Module 2: Know Yourself – The Threat and Vulnerability Landscape

  • Goals and Learning Objectives
  • Protect What You Value
  • Privacy, Anonymity, and Pseudonymity
  • Security, Vulnerabilities, Threats, and Adversaries
  • Threat Modeling and Risk Assessments
  • Security vs Privacy vs Anonymity – Can We Have It All?
  • Defense in Depth
  • The Zero Trust Model

Module 3: Know Your Enemy – The Current Threat and Vulnerability Landscape

  • Goals and Learning Objectives
  • Why You Need Security – The Value of a Hack
  • Top 3 Things You Need to Stay Safe Online
  • Security Bugs and Vulnerabilities – The Vulnerability Landscape
  • Hackers, Crackers, and Cyber Criminals
  • Malware, Viruses, Rootkits, and RATs
  • Spyware, Adware, Scareware, PUPs, and Browser Hijacking
  • Phishing, Vishing, and SMShing
  • Spamming and Doxing
  • Social Engineering – Scams, Cons, Tricks, and Fraud
  • Darknets, Dark Markets, and Exploit Kits
  • Governments, Spies, and Secret Stuff – Part I
  • Governments, Spies, and Secret Stuff – Part II
  • Regulating Encryption, Mandating Insecurity, and Legalizing Spying
  • Trust and Backdoors
  • Censorship
  • Security News and Alerts – Stay Informed

Module 4: Encryption Crash Course

  • Goals and Learning Objectives
  • Symmetric Encryption
  • Asymmetric Encryption
  • Hash Functions
  • Digital Signatures
  • SSL and TLS
  • SSL Stripping
  • HTTPS (HTTP Secure)
  • Digital Certificates
  • Certificate Authorities and HTTPS
  • End-to-End Encryption (E2EE)
  • Steganography
  • How Security and Encryption are Really Attacked

Module 5: Setting Up a Testing Environment Using Virtual Machines

  • Goals and Learning Objectives
  • Introduction to Virtual Machines
  • VMware
  • VirtualBox
  • Kali Linux 2016

Module 6: Operating System Security & Privacy (Windows vs Mac OS X vs Linux)

  • Goals and Learning Objectives
  • Security Features and Functionality
  • Security Bugs and Vulnerabilities
  • Usage Share
  • Windows 10 – Privacy & Tracking
    • Disabling Tracking Automatically
    • Cortana
    • Privacy Settings
    • WiFi Sense
  • Windows 7, 8, and 8.1 – Privacy & Tracking
  • Mac – Privacy & Tracking
  • Linux and Unix-like Operating Systems
    • Debian
    • OpenBSD and Archlinux
    • Ubuntu
  •  

Module 7: Security Bugs and Vulnerabilities

  • Goals and Learning Objectives
  • The Importance of Patching
  • Windows 7, 8, 8.1, and 10 – Auto Update and Patch Management
  • Linux – Debian Patching
  • Mac – Patching
  • Browser and Extension Updates
    • Firefox
    • Chrome
    • IE and Edge
  • Auto Updates – Impact on Privacy and Anonymity

Module 8: Reducing Threat Privilege

  • Goals and Learning Objectives
  • Removing Privileges
  • Windows 7, 8, and 10 – Not Using Admin Rights

Module 9: Social Engineering and Social Media Offense and Defense

  • Goals and Learning Objectives
  • Information Disclosure and Identity Strategies for Social Media
  • Identity, Verification, and Registration
  • Behavioral Security Controls Against Social Threats
    • Phishing and Spam Part 1
    • Phishing and Spam Part 2
  • Technical Security Controls Against Social Threats
    • Phishing, Spam, Scam, and Cons

Module 10: Security Domains

  • Goals and Learning Objectives
  • Overview of Security Domains

Module 11: Security Through Isolation and Compartmentalization

    • Goals and Learning Objectives
    • Introduction to Isolation and Compartmentalization
      • Physical and Hardware Isolation
        • Changing the MAC Address
        • Hardware Serials
      • Virtual Isolation
      • Dual Boot
      • Built-in Sandboxes and Application Isolation
        • Windows Sandboxes and Application Isolation
        • Linux Sandboxes and Application Isolation
        • Mac Sandboxes and Application Isolation
      • Virtual Machines
        • Virtual Machine Weaknesses
        • Virtual Machine Hardening
      • Whonix OS – Anonymous Operating System
        • Weaknesses
      • Qubes OS
      • Security Domains, Isolation, and Compartmentalization