The Ultimate White Hat Hacker Certification Bundle

39 Reviews
4202 Enrolled
10 Courses & 98 Hours
$39.99$1,345.00
You save 97% -

What's Included

The Complete Cyber Security Course, Vol.1: Hackers Exposed
  • Certification included
  • Experience level required: All levels
  • Access 120 lectures & 11 hours of content 24/7
  • Length of time users can access this course: Lifetime

Course Curriculum

120 Lessons (11h)

  • Section 1. Introduction
    Welcome and Introduction to the Instructor!2:06
    Security Quick Win!11:40
    Goals and Learning Objectives - Volume 12:30
    Target Audience Preview1:54
    Study Recommendations4:19
    The Forum - For Questions, Answers and Other Resources1:34
    Course updates0:40
  • Section 2. Know Yourself - The Threat and Vulnerability Landscape
    Goals and Learning Objectives0:41
    Protect What You Value2:04
    What is Privacy, Anonymity and Pseudonymity4:35
    Security, Vulnerabilities, Threats and Adversaries4:37
    Threat Modeling and Risk Assessments7:51
    Security vs Privacy vs Anonymity - Can we have it all?1:56
    Defense In Depth1:35
    The Zero Trust Model3:40
  • Section 3. Know Your Enemy - The Current Threat and Vulnerability Landscape
    Goals and Learning Objectives0:43
    Why You Need Security – The Value Of A Hack5:14
    The Top 3 Things You Need To Stay Safe Online1:23
    Security Bugs and Vulnerabilities - The Vulnerability Landscape5:48
    Hackers, crackers and cyber criminals2:32
    Malware, viruses, rootkits and RATs6:56
    Spyware, Adware, Scareware, PUPs & Browser hijacking4:44
    What is Phishing, Vishing and SMShing14:53
    Spamming & Doxing3:15
    Social engineering - Scams, cons, tricks and fraud5:31
    Darknets, Dark Markets and Exploit kits8:04
    Governments, spies and secret stuff part I5:12
    Governments, spies and secret stuff part II9:43
    Regulating encryption, mandating insecurity & legalizing spying14:36
    Trust & Backdoors10:14
    Censorship2:24
    Security News and Alerts – Stay Informed0:49
  • Section 4. Encryption Crash Course
    Goals and Learning Objectives0:24
    Symmetric Encryption9:54
    Asymmetric Encryption10:17
    Hash Functions6:32
    Digital Signatures4:45
    Secure Sockets Layer (SSL) and Transport layer security (TLS)13:26
    SSL Stripping12:02
    HTTPS (HTTP Secure)7:49
    Digital Certificates6:19
    Certificate Authorities and HTTPS12:56
    End-to-End Encryption (E2EE)1:57
    Steganography8:12
    How Security and Encryption is Really Attacked2:42
  • Section 5. Setting up a Testing Environment Using Virtual Machines
    Goals and Learning Objectives0:27
    Introduction to Setting up a Testing Environment Using Virtual Machines10:08
    Vmware10:55
    Virtual box12:03
    Kali Linux2:50
  • Section 6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)
    Goals and Learning Objectives0:37
    Security Features and Functionality5:56
    Security Bugs and Vulnerabilities5:31
    Usage Share5:01
    Windows 10 - Privacy & Tracking6:08
    Windows 10 - Disable tracking automatically4:42
    Windows 10 - Tool : Disable Windows 10 Tracking8:14
    Windows 10 – Cortana2:59
    Windows 10 – Privacy Settings9:40
    Windows 10 - WiFi Sense4:16
    Windows 7, 8 and 8.1 - Privacy & Tracking7:19
    Mac - Privacy & Tracking4:28
    Linux and Unix “like” Operating systems3:30
    General Use Operating Systems (Windows, MacOS and Linux)3:45
    General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)5:04
    Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)2:55
    Anonymity Focused Operating Systems (Tails and Whonix OS)2:56
    Penetration Testing and Ethical Hacking Focused Operating Systems0:49
    Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)2:31
    Linux - Debian 8 Jessie - Virtual box guest additions Issue6:26
  • Section 7. Security Bugs and Vulnerabilities
    Goals and Learning Objectives0:25
    The Importance of Patching3:47
    Windows 7 - Auto Update1:15
    Windows 8 & 8.1 - Auto Update1:24
    Windows 10 - Auto Update1:25
    Windows - Criticality and Patch Tuesday3:46
    Windows 7, 8, 8.1 & 10 - Automate the pain away from patching8:34
    Linux - Debian - Patching10:58
    Mac - Patching6:58
    Firefox - Browser and extension updates4:23
    Chrome - Browser and extension updates1:13
    IE and Edge - Browser and extention updates0:46
    Auto updates - The Impact to privacy and anonymity1:41
  • Section. 8 Reducing Threat Privilege
    Goals and Learning Objectives + Removing Privilege2:53
    Windows 7 - Not using admin3:32
    Windows 8 and 8.1 - Not using admin4:14
    Windows 10 - Not using admin3:25
  • Section 9. Social Engineering and Social Media Offence and Defence
    Goals and Learning Objectives0:26
    Information Disclosure and Identity Strategies for Social Media12:34
    Identify Verification and Registration5:05
    Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 17:50
    Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 210:22
    Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)5:02
  • Section 10. Security Domains
    Goals and Learning Objectives0:20
    Security Domains10:00
  • Section 11. Security Through Isolation and Compartmentalization
    Goals and Learning Objectives0:37
    Introduction to Isolation and Compartmentalization2:10
    Physical and Hardware Isolation - How to change the Mac Address7:10
    Physical and Hardware Isolation - Hardware Serials11:18
    Virtual Isolation8:36
    Dual Boot2:41
    Built-in Sandboxes and Application Isolation3:07
    Windows - Sandboxes and Application Isolation5:57
    Windows - Sandboxes and Application Isolation - Sandboxie11:29
    Linux - Sandboxes and Application Isolation3:04
    Mac - Sandboxes and Application Isolation6:33
    Virtual Machines10:51
    Virtual Machine Weaknesses10:31
    Virtual Machine Hardening9:15
    Whonix OS - Anonymous Operating system20:51
    Whonix OS - Weaknesses4:18
    Qubes OS19:07
    Security Domains, Isolation and Compartmentalization4:42
  • Section 12. BONUS - What's next?... Volume 2, 3 and 4
    Important Information0:46
    Congratulations0:58
    Certificate of Completion for CPEs0:56
    BONUS Lecture from Volume 2 - Router Vulnerability Scanning (Shodan, Qualys)16:23
    BONUS Lecture from Volume 2 - Password cracking part 27:09
    BONUS Lecture from Volume 3 - Bypassing firewalls and HTTP proxies part 315:21
    BONUS Lecture from Volume 4 - Email clients, protocols and authentication13:17

The Complete Cyber Security Course, Vol.1: Hackers Exposed

NH
Nathan House

Nathan House | Leading Cyber Security Expert

4.5/5 Instructor Rating: ★ ★ ★ ★

Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.

His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.

Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:
  • BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
  • SCF : SABSA Charted Architect Foundation
  • CISSP : Certified Information Systems Security Professional
  • CISA : Certified Information Systems Auditor
  • CISM : Certified Information Security Manager
  • ISO 27001 Certified ISMS Lead Auditor
  • CEH : Certified Ethical Hacker
  • OSCP : Offensive Security Certified Professional

Description

Internet security has never been as important as it is today with more information than ever being handled digitally around the globe. In this course, you'll get an introduction to hacking and how to protect yourself and others. You'll develop an understanding of the threat and vulnerability landscape through threat modeling and risk assessments, and build a foundation for which to expand your security knowledge.

25,373 positive ratings from 146,300 students enrolled

  • Access 120 lectures & 11 hours of content 24/7
  • Explore the Darknet, malware, exploit kits, phishing, zero-day vulnerabilities, & more
  • Learn about global tracking & hacking infrastructures that nation states run
  • Understand the foundations of operating system security & privacy functionality
  • Get a crash course on encryption, how it can be bypassed, & what you can do to mitigate risks
  • Discover defenses against phishing, SMShing, vishing, identity theft, & other cons

"It's a fantastic course that I would highly recommend for anyone who wishes to jump in/enrich their knowledge in regards to cybersecurity." – Marcin Duszynski

Specs

Important Details

  • Length of time users can access this course: lifetime
  • Access options: web & mobile streaming
  • Certification of completion included
  • Redemption deadline: redeem your code within 30 days of purchase
  • Updates included
  • Experience level required: all levels

Requirements

  • Basic understanding of using operating systems, networks, and the Internet
  • Able to download and install software

Terms

  • Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.