This curse sums up more than 10 years working on IT and the content of a master degree in information technologies security.
The topics are:
CIA triad, types of attacks and security mechanisms
Security concepts and methodologies (Terminology, Security properties and case study of a Risk Management plan)
Cryptography (Introduction, Historical background, principles and how to stay anonymous on the Internet)
Security benchmark (Black-box and white-box approach to exploit and secure a system)
Formulary hacks (Code a vulnerable form, exploit and secure it)
Security in email (PGP) and web servers (X.509)
Network firewall with Snort integration
Remote security analysis and assessment
Build a dedicated virtual server (Backup your data, including Time Machine, run your Virtual Machines among other perks)
Extra chapters about web server sandboxes and the Wannacry ransomware, will be updated as I see fit our you demand.
Even if you are already a system administrator or a newbie you are most likely to find something new, as I did previously to start this.
If you have any question or doubt just send me a message.
All questions and feedback will have a response within 24 hours, sign up today and start learning now.
You will also learn how use most of Google's full capacities, use other search engines to fetch sensitive information and validate if credentials are compromised. Besides this you will learn how to setup a phishing attack website in order to get sensitive information by cloning websites such as Google's, Facebook, LinkedIn, etc and you will also learn how to setup a local fake WiFi access point to get users credentials, among other useful information.
This course is constantly reviewed and updated with new lessons
Last update: Jun 2023