Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:01,040 --> 00:00:07,370
Let's talk about the goals and learning objectives for Vol. 1 vol. 1 covers the fundamental building
2
00:00:07,370 --> 00:00:13,180
blocks of a required skill sets becoming a security and privacy expert.
3
00:00:13,400 --> 00:00:20,510
You understand the online threat and vulnerability landscape through threat modeling and risk assessments.
4
00:00:20,510 --> 00:00:26,930
This means you understand in detail the threats and adversaries that we face such as hackers trackers
5
00:00:26,930 --> 00:00:32,170
malware zero days exploit kits and much more.
6
00:00:32,300 --> 00:00:39,620
You understand how to determine the potential risk that they pose then how to mitigate that risk through
7
00:00:39,620 --> 00:00:45,270
the selection implementation and monitoring of appropriate security controls.
8
00:00:45,290 --> 00:00:52,490
You will learn how to set up test environments in virtual box and VM where using the guest operating
9
00:00:52,490 --> 00:01:01,220
system of your choice or host operating system of your choice including Windows Mac OSX Linux and Kelly
10
00:01:02,120 --> 00:01:09,710
after this cause you'll understand encryption from symmetric algorithms to asymmetric algorithms hashes
11
00:01:10,160 --> 00:01:14,750
S-sh SSL TLR class and so on.
12
00:01:14,840 --> 00:01:20,350
How encryption works how it can be bypassed and what you can do to mitigate the risks.
13
00:01:20,360 --> 00:01:27,890
Toss in an easy to follow way after this cause you understand the security and privacy differences between
14
00:01:27,890 --> 00:01:33,290
Windows 7 Windows 8 Windows 10 Mac OS X and Linux.
15
00:01:33,290 --> 00:01:38,570
We will cover how to make patching easier across those platforms.
16
00:01:38,720 --> 00:01:43,140
Then how to mitigate their security and privacy issues.
17
00:01:43,160 --> 00:01:46,980
Patching is very important has to be code in the fundamentals.
18
00:01:47,030 --> 00:01:53,960
You will learn practical defenses against social engineering threats like phishing smashing phishing
19
00:01:54,260 --> 00:01:58,540
identity theft scams cons and others.
20
00:01:58,580 --> 00:02:06,580
You'll learn how to use isolation compartmentalisation as a security control covering some boxes.
21
00:02:06,590 --> 00:02:08,420
Application isolation.
22
00:02:08,420 --> 00:02:09,610
Virtual machines.
23
00:02:09,650 --> 00:02:13,560
Unix and cubes OS.
24
00:02:13,710 --> 00:02:18,290
This is Volume 1 of 4 of your complete guide to Internet security.
25
00:02:18,290 --> 00:02:20,490
Privacy and anonymity.
26
00:02:20,580 --> 00:02:25,860
If you want to know about the continuation of the course through the other volumes check out the bonus
27
00:02:25,860 --> 00:02:29,400
lecture at the end to understand how they all fit together.
2945
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.