Foundation
- Section 2: Know Yourself - The Threat & Vulnerability Landscape
- Section 3: Know Your Enemy - The Current Threat & Vulnerability Landscape
- Why You Need Security - The Value of a Hack
- Security Bugs & Vulnerabilities - The Vulnerability Landscape
- Malware, viruses, rootkits and RATs
- Spyware, Adware, Scareware, PUPs & Browser hijacking
- What is Phishing, Vishing & SMShing
- Spamming & Doxing
- Social engineering - Scams, cons, tricks and fraud
- Governments, spies and secret stuff
- Regulating encryption, mandating insecurity & legalizing spying
- Trust & Backdoors
- Censorship
- Security News and Alert - Stayed Informed
- Section 4: Encryption Crash Course
- Hash Functions
- Digital Signatures
- Secure Sockets Layer (SSL) & Transport Layer Security (TLS)
- SSL Stripping
- HPPTS (HTTP Secure)
- Certificate Authorities & HTTPS
- Steganography
- How Security & Encryption is Really Attacked
- Section 5: Setting up a Testing Environment Using Virtual Machines
- Introduction to Setting up a Testing Environment using Virtual Machines
- Vmware
- Virtual box
- Kali Linux 2016
- Section 6: Operating System Security & Privacy (Windows vs Mac OS X vs Linux
- Security Bugs & Vulnerabilities
- Usage Share
- Windows 10
- Privacy & Tracking
- Disable tracking automatically
- Tool: Disable Windows 10 Tracking
- Cortana
- Privacy Settings
- Windows 7, 8 and 8.1 - Privacy & Tracking
- Linux and Unix "like" Operating Systems
- Linux
- Debian
- Debian 8 Jessie - Virtual box guest additions issue
- OpenBSD & Archlinux
- Ubuntu
- Section 7: Security Bugs and Vulnerabilities
- Windows - Criticality & Patch Tuesday
- Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
- Linux - Debian - Patching
- Section 9: Social Engineering & Social Media Offense and Defense
- Information Disclosure & Identity Strategies for Social Media
- Identify Verification & Registration
- Behavioural Security Controls Against Social Threats (
Phishing, Spam)
- Technical Security Controls Against Social Threats (Phishing, Spam, Scams & Cons)
- Section 11: Security through Isolation & Compartmentalization
- Physial & Hardware Isolation
- How to change the Mac Address
- Hardware Serials
- Virtual Isolation
- Dual Boot
- Sandboxes & Application Isolation
- Virtual Machines
- Whonix OS - Anonymous Operating System
- Qubes OS
- Security Domains, Isolation & Compartmentalization