
Cyber Security
Course outline
Module 1: Introduction
- Welcome and Introduction to the Instructor
- Security Quick Win
- Goals and Learning Objectives – Volume 1
- Target Audience
- Study Recommendations
- The Forum – For Questions, Answers, and Other Resources
- Course Updates
Module 2: Know Yourself – The Threat and Vulnerability Landscape
- Goals and Learning Objectives
- Protect What You Value
- Privacy, Anonymity, and Pseudonymity
- Security, Vulnerabilities, Threats, and Adversaries
- Threat Modeling and Risk Assessments
- Security vs Privacy vs Anonymity – Can We Have It All?
- Defense in Depth
- The Zero Trust Model
Module 3: Know Your Enemy – The Current Threat and Vulnerability Landscape
- Goals and Learning Objectives
- Why You Need Security – The Value of a Hack
- Top 3 Things You Need to Stay Safe Online
- Security Bugs and Vulnerabilities – The Vulnerability Landscape
- Hackers, Crackers, and Cyber Criminals
- Malware, Viruses, Rootkits, and RATs
- Spyware, Adware, Scareware, PUPs, and Browser Hijacking
- Phishing, Vishing, and SMShing
- Spamming and Doxing
- Social Engineering – Scams, Cons, Tricks, and Fraud
- Darknets, Dark Markets, and Exploit Kits
- Governments, Spies, and Secret Stuff – Part I
- Governments, Spies, and Secret Stuff – Part II
- Regulating Encryption, Mandating Insecurity, and Legalizing Spying
- Trust and Backdoors
- Censorship
- Security News and Alerts – Stay Informed
Module 4: Encryption Crash Course
- Goals and Learning Objectives
- Symmetric Encryption
- Asymmetric Encryption
- Hash Functions
- Digital Signatures
- SSL and TLS
- SSL Stripping
- HTTPS (HTTP Secure)
- Digital Certificates
- Certificate Authorities and HTTPS
- End-to-End Encryption (E2EE)
- Steganography
- How Security and Encryption are Really Attacked
Module 5: Setting Up a Testing Environment Using Virtual Machines
- Goals and Learning Objectives
- Introduction to Virtual Machines
- VMware
- VirtualBox
- Kali Linux 2016
Module 6: Operating System Security & Privacy (Windows vs Mac OS X vs Linux)
- Goals and Learning Objectives
- Security Features and Functionality
- Security Bugs and Vulnerabilities
- Usage Share
- Windows 10 – Privacy & Tracking
- Disabling Tracking Automatically
- Cortana
- Privacy Settings
- WiFi Sense
- Windows 7, 8, and 8.1 – Privacy & Tracking
- Mac – Privacy & Tracking
- Linux and Unix-like Operating Systems
- Debian
- OpenBSD and Archlinux
- Ubuntu
Module 7: Security Bugs and Vulnerabilities
- Goals and Learning Objectives
- The Importance of Patching
- Windows 7, 8, 8.1, and 10 – Auto Update and Patch Management
- Linux – Debian Patching
- Mac – Patching
- Browser and Extension Updates
- Firefox
- Chrome
- IE and Edge
- Auto Updates – Impact on Privacy and Anonymity
Module 8: Reducing Threat Privilege
- Goals and Learning Objectives
- Removing Privileges
- Windows 7, 8, and 10 – Not Using Admin Rights
Module 9: Social Engineering and Social Media Offense and Defense
- Goals and Learning Objectives
- Information Disclosure and Identity Strategies for Social Media
- Identity, Verification, and Registration
- Behavioral Security Controls Against Social Threats
- Phishing and Spam Part 1
- Phishing and Spam Part 2
- Technical Security Controls Against Social Threats
- Phishing, Spam, Scam, and Cons
Module 10: Security Domains
- Goals and Learning Objectives
- Overview of Security Domains
Module 11: Security Through Isolation and Compartmentalization
- Goals and Learning Objectives
- Introduction to Isolation and Compartmentalization
- Physical and Hardware Isolation
- Changing the MAC Address
- Hardware Serials
- Virtual Isolation
- Dual Boot
- Built-in Sandboxes and Application Isolation
- Windows Sandboxes and Application Isolation
- Linux Sandboxes and Application Isolation
- Mac Sandboxes and Application Isolation
- Virtual Machines
- Virtual Machine Weaknesses
- Virtual Machine Hardening
- Whonix OS – Anonymous Operating System
- Weaknesses
- Qubes OS
- Security Domains, Isolation, and Compartmentalization
- Physical and Hardware Isolation
