Complete - Cyber Security - Privacy - Anonymity
Complete - Cyber Security - Privacy - Anonymity
Complete - Cyber Security - Privacy - Anonymity
In this course students will learn practical skill-set in defeating all online threats, beginner to
advanced approach, explore dark nets and mindset of the cyber criminals, global tracking
and hacking infrastructures of FBI, NSA, CIA, GCHQ, MSS and other intelligence agencies,
encryption techniques, hacking techniques & vulnerability scanning, network for maximum
security, wireless security, search engine privacy, browser security, best anonymizing & privacy
methods, bypassing censors, firewalls and proxies, end point protection technologies, hacker
hunting, anti-forensics, OS hardening, email & messenger security, Live OS, USBs, tails, who nix,
parrot systems and many others. No real system/network will be harmed during this course.
The course is divided into 4 sections (25hrs/Section)
Section – 1: Hackers Exposed
Introduction Setting up Lab, Kali Linux, VMWare, Virtual Box, Canary Tokens,
Norse, ANT Product Data, Intelligence Agencies, InSpectre,
Kanguru, CIA, Security, Privacy, Anonymity, Pseudonymity
Know Yourself Assets, Vulnerabilities, Threats, Adversaries, Defense in Depth,
Zero Trust Model
Know Your Enemy Vulnerability Landscape, Exploit Kit, Hackers, Crackers, Cyber
Criminals, Malware, Viruses, Rootkits, RATs, Spyware, Adware,
Scareware, PUPs, Browser Hijacking, Phishing, Vishing, SMShing,
Spamming, Doxing, CPU Hijackers, Darknets, Dark Markets,
Governments, spies, secret stuff, Trust and backdoors,
Censorship, CTI
Encryption Symmetric, Asymmetric, Hashes, Digital Signatures, SSL, TLS, SSL
Strip,Sniffers, ArpWatch, Cain & Abel, HTTPS, Digital
Certificates, CA, E2EE, Steganography, Openpuff,
OS Security and Privacy Security Features & Functionality, Usage Share, Win -10 privacy
& tracking, Disable tracking, Cortana, Wifisense, Mac –
privacy & tracking, Linux like OS, Debian, OpenBSD, Archlinux,
Ubuntu
Security Bugs and Win7/8/8.1/10 - Patching/Autopatching, Autoupdate, Linux-
Vulnerabilities Debian Patching, Mac – patching, Browser & Extension
updates – Firefox/Chrome/IE/Edge, Reducing Threat Privilege -
NoAdmin
Social Engineering and Information disclosure, Identity Strategies, Identify Verification
Social Media Offence & & Registration, Behavioral Security Controls, Technical Security
Defense Controls
Security through Isolation Security Domains, Hardware Isolation, Macdaddyx, Wifispoof,
and Compartmentalization Tmac, dmidecode, cpuz, cupid, i-nex, Virtual Isolation,
Maxthon, portable apps, pen drive apps, authentic8, apikes,
aegis, dual boot, multiboot, application isolation, built-in
sandboxes, f-sandbox, shadowdefender, returnil, deepfreeze,
comodo, bufferzone, sandboxie, apparmour, firejail,
buckleup, super-duper, Virtual Machines, hypervisor,
openvpn, openVZ, virt, Virtual Machine weakness, hardening,
WhonixOS, QubesOS, Librem 13
Section – 2 : Network Security
Files and Disk encryption Disk encryption, Attacks – physical, containers, volumes &
partitions, Passware kit enterprise, Windowsscope, Inception,
Firewire attack, cold boot attack, Evil maid attack,
DiskCryptor, Symantec Drive encryption, Ciphershed,
VeraCrypt, Truecrypt, Bitlocker, Filevault2, Dm-crypt and LUKS,
Self-encrypting devices, defense against decrypting attacks,
TRESOR, File encryptions, AES Crypt, peazip, keka, gnupg,
nesting cryptosystem and obfuscation
Anti-virus and end point Threat landscape, FUDs, Protection Methods, Ransomware,
protection Bitdefender, AV & EPP testing problem, Business EPP, Mac –
Xprotect, Kaspersky, FireEye
EDR NG-EPP, Layers protection, EDR
End-point-protection Application and execution control, backdoor factory, ACLs,
technology Accessenum, UAC, Applocker, parental controls, AV,
Appguard, Voodoo Shields, NoVirus Thanks, Exploitation
prevention, EMET, Traps, MBEA, HMPA, Device Guard,
AppArmor, SELinux, GRsecurity, PaX, POSIX & ACLs,
Gatekeeper, System Integrity Protection, Santa, Xfence,
Cylance
Threat Detection and Honeypots, CanaryTokens, OpenCanary, CanaryPi, Artillery –
Monitoring Binary Defense, Honey Drive, Intrusion detection systems –
Snort, Suricata, Bro IDS & Open WIPS-n, Host based intrusion
detection – OSSEC, Network Analysis – Sguil, Xplico & Network
Miner, OWASP Zed Proxy, Burp Proxy, File integrity monitoring,
Samhain, AIDE, ADaudit, Osiris, Afick, Solar Winds, Tripwire & El
Jefe, Network Security Toolkit, Security Onion, SIEM
Malware and Hacker Farber recovery scanner, Automated malware removal tools,
hunting HitmanPro, Malwarebytes, Kaspersky, Adwcleaner,
Roguekiller, Super anti spyware, Live rescue OS, USBs,
Malware seek & destroy, Process Explorer, Process tools,
Sigcheck, Autoruns, Process Monitor, Network Connections,
Networkx, SysDig, Csysdig, debsums, unhide, netstat, lsof,
rkhunter, Chkrootkit, Tiger, Clamav, LMD, Persistence, Task
explorer, KnockKnock, BlockBlock, KextViewer, OSquery,
Firmware Rootkits, BIOS Attacks, darwindumper, EPPRRT,
carboncopy, acronis true image, encrypted backup & cloud
storage, qnap, seafile, syncany, spydio, syncthing
OS and App hardening Hardening Standards, CIS benchmark, STIG Viewer,
OpenSCAP, NIST, baseline auditing, openvas, tenable,
windows hardening, security compliance manager, LGPO,
Attack Surface analyzer, Policy analyzer, Mac – Hardening,
Linux – Hardening, Security focused OS, Subgraph, Whonix,
Tails, Astra Linux, Trisquel, Parrot Security OS, Monitoring for
security drift
Anti-forensics Secure file deletion, eraser, fileshredder, Evidence
elimination, ccleaner, bleachit, Virtual Memory, SWAP, RAM
memory cache & buffer, disable memory dump, disk wiping,
scrubbing EXIF, imageoptim, pdfparanoia, imagemagick,
Sensor Noise Camera Identification
Emails – security, privacy & STARTTLS, Email Weaknesses, PGP, GPG & privacy, GNU
anonymity privacy guard, OpenKeyChain, gpg4usb, iPGMail, Gpg4Win,
Tail, Smartcards Yubikey, Email tracking & exploits, Email
anonymity & pseudonymity, TorBirdy, Remailers, mixmaster,
quicksilvermail, mixminion, email privacy tester, email
alternatives
Messengers - security, Signal, Chatsecure, cryptocat, Ricochet, Linphone, Jitsi,
privacy & anonymity Jabber XMPP, ring, tox