Search This Blog

Thursday, March 8, 2018

The Complete Cyber ​​Security Video Training Course on 5 DVDs




Duration - 52 Hours
530 Video Lessons
5 DVDs


1_Hacking Exposed (DVD1 & DVD2)
Duration : 11 Hours

Learn how to stop hackers, prevent tracking, advanced anonymous browsing, and Learn a practical skill-set in defeating all online threats, including - advanced hackers, trackers, malware, zero days, exploit kits, cyber criminals and more.

Introduction 6 Lectures
know Yourself - The Threat and Vulnerability Landscape 11 Lectures
Know Your Enemy - The Current Threat and Vulnerability Landscape 18 Lectures
Encryption Crash Course 13 Lectures
Setting up a Testing Environment Using Virtual Machines (Lab) 5 Lectures
Operating System Security & Privacy (Windows vs Mac OS X vs Linux) 17 Lectures
Security Bugs and Vulnerabilities 13 Lectures
Reducing Threat Privilege 4 Lectures
Social Engineering and Social Media Offence and Defence 6 Lectures
Security Domains 2 Lectures
Security Through Isolation and Compartmentalization 18 Lectures
Wrap Up 6 Lectures
BONUS Section 01:03

2_Network security (DVD-3)
Duration : 12:10 Hours

WiFi Security, WiFi Hackers, Firewalls, Wireshark. Plus Best Password Managers
Introduction 6 Lectures
Goals and Learning Objectives - Volume 2 1 Lecture
Routers - Port and Vulnerability scanning 5 Lectures
Firewalls 14 Lectures
Network Attacks, Architecture and Isolation 5 Lectures
Wireless and Wi-Fi Security 8 Lectures
Network Monitoring for Threats 7 Lectures
How We Are Tracked Online 11 Lectures
Search Engines and Privacy 7 Lectures
Browser Security and Tracking Prevention 18 Lectures
Passwords and Authentication Methods 17 Lectures
Wrap Up 5 Lectures
BONUS Section 

3_Anonymous Browsing (DVD-4)
Duration : 13:30 Hours

Anonymous, Hide my IP, Internet Privacy, Hacker OPSEC, Tor, proxy servers and virtual private networks Best

Introduction 6 Lectures
Goals and Objectives for Volume III 1 Lecture
OPSEC (Operational Security) 9 Lectures
Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu 5 Lectures
Virtual Private Networks (VPNs) 13 Lectures
Tor 16 Lectures
VPN and Tor Routers 6 Lectures
Proxies – HTTP, HTTPS, SOCKs and Web 4 Lectures
SSH Secure Shell 7 Lectures
I2P - The Invisible Internet Project 5 Lectures
Other Privacy and Anonymising Services 5 Lectures
Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection 8 Lectures
Chaining/Nesting Privacy and Anonymising Services 14 Lectures
Off-site Internet Connections - Hotspots and Cafes 7 Lectures
Mobile, Cell Phones & Cellular Networks 7 Lectures
Wrap Up 5 Lectures
BONUS Section 00:47

4_End Point Protection (DVD-5)
Duration : 16:38 Hours

Antivirus and Malware, Disk Encryption, Detection and Removal of Malware and Hackers, Applications and Execution Control
Introduction 6 Lectures
Goals and Learning Objectives - Volume 4 2 Lectures
File and Disk Encryption 22 Lectures
Anti-Virus and End-Point-Protection 14 Lectures
Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR) 4 Lectures
End-Point-Protection Technology 26 Lectures
Threat Detection and Monitoring 17 Lectures
Malware and Hacker Hunting on the End-Point 30 Lectures
Operating System and Application Hardening 11 Lectures
Secure Deleting, Evidence Elimination and Anti-Forensics 12 Lectures
Email Security, Privacy and Anonymity 17 Lectures
Messengers - Security, Privacy and Anonymity 10 Lectures
Wrap Up 5 Lectures
BONUS Section 01:03

======================================================================

This DVDs are only suitable for a PC/laptop/Mac; it WILL NOT play on a TV 
======================================================================

Term

No comments:

Post a Comment