Goals and Learning Objectives - Volume 1

4 . Goals and Learning Objectives - Vol 1

Let's talk about the goals and learning objectives for volume one volume, one covers the fundamental building blocks of a required skill sets.

Becoming a security and privacy expert.

You will understand the online threat and vulnerability landscape through.

Threat modelling and risk assessments.

This means you will understand in detail the threats and adversaries that we face such as hackers, trackers, malware, zero days, exploit kits, and much more.

You will understand how to determine the potential risk that they pose, then how to mitigate that risk through the selection, implementation and monitoring, of appropriate security controls.

You will learn how to set up test environments in virtual box and VMware using the guest operating system of your choice or host operating system of your choice, including windows, Mac, OSX, Linux, and Kali.

After this course you'll understand encryption from symmetric algorithms to asymmetric algorithms, hashes, SSH, SSL, TLS, and so on how encryption works, how it can be bypassed and what you can do to mitigate the risks taught in an easy to follow.

After this course, you will understand the security and privacy differences between windows 7, windows 8, windows 10, mac OS X and Linux.

We will cover how to make patching easier across those platforms, then how to mitigate their security and privacy issues.

Patching is very important.

It has to be covered in the fundamentals.

You will learn practical defences against social engineering threats.

Phishing smashing vishing identity theft, scams, cons, and others.

You'll learn how to use isolation and compartmentalization as a security control covering sandboxes application isolation, virtual machines Whonix and Qube OS.

This is volume one of four of your complete guide to internet security, privacy, and anonymity.

If you want to know about the continuation of the course through the other volumes, check out the bonus lecture at the end to understand how they all fit together.

Complete and Continue  

Become a Member and Get Unlimited Access to 300+ Top Cyber Security Courses.