Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Cyber Security for Absolute Beginners: Online Security
Introduction
Welcome to the Course! (1:20)
Course Prerequisites (1:03)
Quick Course Overview (1:17)
Having a Proper Mindset (1:42)
Course Lecture PDFs (0:21)
Why Learn Cyber Security from Me? (2:26)
Join our Facebook Student Community
Student Exercise: Introduce Yourself
The Importance of Online Security
Why We Need Online Security (3:44)
Understanding the Dark Net, Dark Web, Dark Market (5:13)
The Internet 101
How Web Requests Work (Simplified) (3:39)
HTTP vs HTTPS (8:59)
How We’re Tracked Online
Section Introduction (0:21)
Who Tracks Us Online (2:12)
HTTP Referers (5:04)
Cookies & Super Cookies (11:56)
3rd Party Connections (8:00)
Browser Fingerprinting & Volunteered Information (4:55)
Search Engine Tracking (8:05)
Online Privacy and Anonymity
Section Introduction (0:23)
Online Privacy, Anonymity and Pseudonymity (9:37)
Privacy-Focused Search Engines (5:42)
Tips for Private and Anonymous Searching (2:45)
Web Browser Privacy & Security
Section Introduction (0:36)
Browser Vulnerabilities & Privacy Concerns (6:08)
A Quick Note on Endpoint Protection & Anti-Virus Software (2:32)
Understanding Browser Private Mode (6:05)
Browser Choices (2:49)
Brave Browser (10:31)
Mozilla FireFox Browser (7:17)
Recommended FireFox Privacy Extensions (13:35)
Microsoft Edge Browser (5:22)
Apple Safari Browser (5:40)
CCleaner (4:39)
Anonymizing Services
Section Introduction (0:31)
Understanding Anonymizing Services (2:57)
Anonymous Web Proxy Servers (7:58)
Virtual Private Networks (8:41)
VPN Live Demo & Recommendations (8:51)
Introduction to Tor
Section Introduction (0:34)
Understanding The Onion Router (Tor) (11:29)
My Thoughts on Tor (2:05)
Tor Vulnerabilities (3:48)
Using VPN with Tor (1:37)
The Tor Browser (6:13)
Brave Browser Tor Feature (2:30)
Password Management
Section Introduction (0:36)
Password Breaches Statistics (2:07)
Identifying Online Data Breaches (6:05)
Utilizing 2-Factor Authentication (3:50)
Why You Need a Password Manager (5:12)
Live Demo: BitWarden and NordPass Password Managers (6:22)
Email Privacy & Security
Section Introduction (0:51)
Understanding Email Clients, Protocols and Ports (8:23)
Inherent Email Weaknesses & Risks (4:22)
Live Demo: Network Sniffing Unencrypted Emails (12:13)
How Email Tracking Pixels Work (3:12)
Other Methods of Email Tracking (2:47)
Email Marketing Campaign Behind the Scenes (6:48)
Identifying & Stopping Email Tracking (4:48)
How to Easily Send Spoofed or Anonymous Emails (2:29)
Privacy-Focused Email Provider: Proton Mail (4:20)
Email Security Best Practices (6:37)
Additional Topics
Section Introduction (0:42)
Securely Sharing Sensitive Information Online (4:47)
Safely Use Public Wi-Fi Hotspots (3:53)
Safely Downloading Files (5:35)
Implementing Parental Controls (5:55)
Conclusion & Next Steps
Congratulations & Next Steps (1:30)
Browser Vulnerabilities & Privacy Concerns
Download
Browser Vulnerabilities & Privacy Concerns.pdf
Complete and Continue
Discussion
0
comments
Load more
0 comments