About this Course:
This course covers the fundamental building blocks of your required skillset - You will understand the threat and vulnerability landscape through threat modelling and the risk assessment.
We explore the Darknet and mind-set of the cyber criminal. Covering malware, exploit kits, phishing, zero day vulnerabilities and much more.
You will learn about the global tracking and hacking infrastructures that nation states run. Covering the NSA, FBI, CIA, GCHQ, China’s MSS and other intelligence agencies capabilities.
You will understand the foundations of operating system security and privacy functionality. A close look at the new Windows 10 privacy issues and how to best mitigate them.
There is a complete easy to follow crash course on encryption, how encryption can be bypassed and what you can do to mitigate the risks.
Master defences against phishing, SMShing, vishing, identity theft, scam, cons an other social engineering threats.
Finally we cover the extremely important, but underused security control of isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS.
This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.
What you will learn
Nathan House, CEO of Station X, a cyber security consultancy, is a cyber security expert who brings close to a quarter century of experience in cyber security. Over these years, he has been called upon to advise some of largest companies in the world, where he has helped assure the security of projects that have run into many billion pounds. One of this recent, challenging assignments has been that of lead security consultant for several of the UK’s mobile banking and payment solutions. In this role, he has helped secure over £71bn in transactions!
Nathan’s strong experience at such huge projects is backed by solid qualifications. He holds a highly impressive set of qualifications ranging from CISSP (Certified Information Systems Security Professional) to CISA (Certified Information Systems Auditor) to CISM (Certified Information Security Manager) to CEH (Certified Ethical Hacker) to OSCP (Offensive Security Certified Professional).
His client list looks equally awesome: BP, ExxonMobil, Shell, Vodafone, VISA, T-Mobile, GSK, COOP Banking Group, Royal Bank of Scotland, NatWest, and Yorkshire Bank among others. Any wonder Nathan has been called upon to speak at a number of high-level security conferences, has developed free security tools, and has discovered serious security vulnerabilities in leading applications?