The Ultimate White Hat Hacker Certification Bundle
4297 Enrolled
10 Courses & 98 Hours
$39.99$110.00
You save 63%
What's Included

$11.00 Value
The Complete Cyber Security Course, Vol.1: Hackers Exposed
Nathan House
120 Lessons (11h)
Lifetime

- Experience level required: All levels
- Access 120 lectures & 11 hours of content 24/7
- Length of time users can access this course: Lifetime
Course Curriculum
120 Lessons (11h)
- Section 1. IntroductionWelcome and Introduction to the Instructor!2:06Security Quick Win!11:40Goals and Learning Objectives - Volume 12:30Target Audience Preview1:54Study Recommendations4:19The Forum - For Questions, Answers and Other Resources1:34Course updates0:40
- Section 2. Know Yourself - The Threat and Vulnerability LandscapeGoals and Learning Objectives0:41Protect What You Value2:04What is Privacy, Anonymity and Pseudonymity4:35Security, Vulnerabilities, Threats and Adversaries4:37Threat Modeling and Risk Assessments7:51Security vs Privacy vs Anonymity - Can we have it all?1:56Defense In Depth1:35The Zero Trust Model3:40
- Section 3. Know Your Enemy - The Current Threat and Vulnerability LandscapeGoals and Learning Objectives0:43Why You Need Security – The Value Of A Hack5:14The Top 3 Things You Need To Stay Safe Online1:23Security Bugs and Vulnerabilities - The Vulnerability Landscape5:48Hackers, crackers and cyber criminals2:32Malware, viruses, rootkits and RATs6:56Spyware, Adware, Scareware, PUPs & Browser hijacking4:44What is Phishing, Vishing and SMShing14:53Spamming & Doxing3:15Social engineering - Scams, cons, tricks and fraud5:31Darknets, Dark Markets and Exploit kits8:04Governments, spies and secret stuff part I5:12Governments, spies and secret stuff part II9:43Regulating encryption, mandating insecurity & legalizing spying14:36Trust & Backdoors10:14Censorship2:24Security News and Alerts – Stay Informed0:49
- Section 4. Encryption Crash CourseGoals and Learning Objectives0:24Symmetric Encryption9:54Asymmetric Encryption10:17Hash Functions6:32Digital Signatures4:45Secure Sockets Layer (SSL) and Transport layer security (TLS)13:26SSL Stripping12:02HTTPS (HTTP Secure)7:49Digital Certificates6:19Certificate Authorities and HTTPS12:56End-to-End Encryption (E2EE)1:57Steganography8:12How Security and Encryption is Really Attacked2:42
- Section 5. Setting up a Testing Environment Using Virtual MachinesGoals and Learning Objectives0:27Introduction to Setting up a Testing Environment Using Virtual Machines10:08Vmware10:55Virtual box12:03Kali Linux2:50
- Section 6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)Goals and Learning Objectives0:37Security Features and Functionality5:56Security Bugs and Vulnerabilities5:31Usage Share5:01Windows 10 - Privacy & Tracking6:08Windows 10 - Disable tracking automatically4:42Windows 10 - Tool : Disable Windows 10 Tracking8:14Windows 10 – Cortana2:59Windows 10 – Privacy Settings9:40Windows 10 - WiFi Sense4:16Windows 7, 8 and 8.1 - Privacy & Tracking7:19Mac - Privacy & Tracking4:28Linux and Unix “like” Operating systems3:30General Use Operating Systems (Windows, MacOS and Linux)3:45General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)5:04Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)2:55Anonymity Focused Operating Systems (Tails and Whonix OS)2:56Penetration Testing and Ethical Hacking Focused Operating Systems0:49Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)2:31Linux - Debian 8 Jessie - Virtual box guest additions Issue6:26
- Section 7. Security Bugs and VulnerabilitiesGoals and Learning Objectives0:25The Importance of Patching3:47Windows 7 - Auto Update1:15Windows 8 & 8.1 - Auto Update1:24Windows 10 - Auto Update1:25Windows - Criticality and Patch Tuesday3:46Windows 7, 8, 8.1 & 10 - Automate the pain away from patching8:34Linux - Debian - Patching10:58Mac - Patching6:58Firefox - Browser and extension updates4:23Chrome - Browser and extension updates1:13IE and Edge - Browser and extention updates0:46Auto updates - The Impact to privacy and anonymity1:41
- Section. 8 Reducing Threat PrivilegeGoals and Learning Objectives + Removing Privilege2:53Windows 7 - Not using admin3:32Windows 8 and 8.1 - Not using admin4:14Windows 10 - Not using admin3:25
- Section 9. Social Engineering and Social Media Offence and DefenceGoals and Learning Objectives0:26Information Disclosure and Identity Strategies for Social Media12:34Identify Verification and Registration5:05Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 17:50Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 210:22Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)5:02
- Section 10. Security DomainsGoals and Learning Objectives0:20Security Domains10:00
- Section 11. Security Through Isolation and CompartmentalizationGoals and Learning Objectives0:37Introduction to Isolation and Compartmentalization2:10Physical and Hardware Isolation - How to change the Mac Address7:10Physical and Hardware Isolation - Hardware Serials11:18Virtual Isolation8:36Dual Boot2:41Built-in Sandboxes and Application Isolation3:07Windows - Sandboxes and Application Isolation5:57Windows - Sandboxes and Application Isolation - Sandboxie11:29Linux - Sandboxes and Application Isolation3:04Mac - Sandboxes and Application Isolation6:33Virtual Machines10:51Virtual Machine Weaknesses10:31Virtual Machine Hardening9:15Whonix OS - Anonymous Operating system20:51Whonix OS - Weaknesses4:18Qubes OS19:07Security Domains, Isolation and Compartmentalization4:42
- Section 12. BONUS - What's next?... Volume 2, 3 and 4Important Information0:46Congratulations0:58Certificate of Completion for CPEs0:56BONUS Lecture from Volume 2 - Router Vulnerability Scanning (Shodan, Qualys)16:23BONUS Lecture from Volume 2 - Password cracking part 27:09BONUS Lecture from Volume 3 - Bypassing firewalls and HTTP proxies part 315:21BONUS Lecture from Volume 4 - Email clients, protocols and authentication13:17
The Complete Cyber Security Course, Vol.1: Hackers Exposed
NH
Nathan HouseNathan House | Leading Cyber Security Expert
4.5/5 Instructor Rating:
★ ★ ★ ★
★
★
Nathan House has over 24 years experience in cyber security where he has advised some of largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is CEO of Station X, a cyber security consultancy. More recently Nathan acted as the lead security consultant on a number of the UK's mobile banking and payment solutions helping secure to date over £71Bn in transactions.
His clients have included; BP, ExxonMobil, Shell, Vodafone, VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest, Yorkshire bank, BG Group, BT, London 2012.
Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications. Nathan's qualifications and education include:
- BSc. (Hons) Computing 'Networks & Communication' 1st Class Honors
- SCF : SABSA Charted Architect Foundation
- CISSP : Certified Information Systems Security Professional
- CISA : Certified Information Systems Auditor
- CISM : Certified Information Security Manager
- ISO 27001 Certified ISMS Lead Auditor
- CEH : Certified Ethical Hacker
- OSCP : Offensive Security Certified Professional
Description
Internet security has never been as important as it is today with more information than ever being handled digitally around the globe. In this course, you'll get an introduction to hacking and how to protect yourself and others. You'll develop an understanding of the threat and vulnerability landscape through threat modeling and risk assessments, and build a foundation for which to expand your security knowledge.
25,373 positive ratings from 146,300 students enrolled
- Access 120 lectures & 11 hours of content 24/7
- Explore the Darknet, malware, exploit kits, phishing, zero-day vulnerabilities, & more
- Learn about global tracking & hacking infrastructures that nation states run
- Understand the foundations of operating system security & privacy functionality
- Get a crash course on encryption, how it can be bypassed, & what you can do to mitigate risks
- Discover defenses against phishing, SMShing, vishing, identity theft, & other cons
"It's a fantastic course that I would highly recommend for anyone who wishes to jump in/enrich their knowledge in regards to cybersecurity." – Marcin Duszynski
Specs
Important Details
- Length of time users can access this course: lifetime
- Access options: web & mobile streaming
- Certification of completion included
- Redemption deadline: redeem your code within 30 days of purchase
- Updates included
- Experience level required: all levels
- Have questions on how digital purchases work? Learn more here
Requirements
- Basic understanding of using operating systems, networks, and the Internet
- Able to download and install software

$11.00 Value
The Complete Cyber Security Course, Vol.2: Network Security
Nathan House
106 Lessons (12h)
Lifetime

$11.00 Value
The Complete Cyber Security Course, Vol.3: Anonymous Browsing
Nathan House
120 Lessons (13h)
Lifetime

$11.00 Value
The Complete Cyber Security Course, Vol.4: End-Point Protection
Nathan House
176 Lessons (16h)
Lifetime

$11.00 Value
CompTIA CySA+ Cybersecurity Analyst (CS0-001) Prep Course
Total Seminars
51 Lessons (7h)
Lifetime

$11.00 Value
Cyber Security: Python & Web Applications
Mashrur Hossain
196 Lessons (10h)
Lifetime

$11.00 Value
Complete Ethical Hacking & Cyber Security Masterclass Course
Joe Parys
78 Lessons (13h)
Lifetime

$11.00 Value
Python 3 for Offensive PenTest: A Complete Practical Course
Hussam Khrais
28 Lessons (2h)
Lifetime

$11.00 Value
The Complete Nmap Ethical Hacking Course: Network Security Assessment
Nathan House
54 Lessons (4h)
Lifetime

$11.00 Value
CompTIA PenTest+ (PT0-001) Ethical Hacking
Total Seminars
67 Lessons (10h)
Lifetime
Terms
- Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final.
Your cart is empty. Continue Shopping!
Processing order...