1 00:00:01,040 --> 00:00:07,370 Let's talk about the goals and learning objectives for Vol. 1 vol. 1 covers the fundamental building 2 00:00:07,370 --> 00:00:13,180 blocks of a required skill sets becoming a security and privacy expert. 3 00:00:13,400 --> 00:00:20,510 You understand the online threat and vulnerability landscape through threat modeling and risk assessments. 4 00:00:20,510 --> 00:00:26,930 This means you understand in detail the threats and adversaries that we face such as hackers trackers 5 00:00:26,930 --> 00:00:32,170 malware zero days exploit kits and much more. 6 00:00:32,300 --> 00:00:39,620 You understand how to determine the potential risk that they pose then how to mitigate that risk through 7 00:00:39,620 --> 00:00:45,270 the selection implementation and monitoring of appropriate security controls. 8 00:00:45,290 --> 00:00:52,490 You will learn how to set up test environments in virtual box and VM where using the guest operating 9 00:00:52,490 --> 00:01:01,220 system of your choice or host operating system of your choice including Windows Mac OSX Linux and Kelly 10 00:01:02,120 --> 00:01:09,710 after this cause you'll understand encryption from symmetric algorithms to asymmetric algorithms hashes 11 00:01:10,160 --> 00:01:14,750 S-sh SSL TLR class and so on. 12 00:01:14,840 --> 00:01:20,350 How encryption works how it can be bypassed and what you can do to mitigate the risks. 13 00:01:20,360 --> 00:01:27,890 Toss in an easy to follow way after this cause you understand the security and privacy differences between 14 00:01:27,890 --> 00:01:33,290 Windows 7 Windows 8 Windows 10 Mac OS X and Linux. 15 00:01:33,290 --> 00:01:38,570 We will cover how to make patching easier across those platforms. 16 00:01:38,720 --> 00:01:43,140 Then how to mitigate their security and privacy issues. 17 00:01:43,160 --> 00:01:46,980 Patching is very important has to be code in the fundamentals. 18 00:01:47,030 --> 00:01:53,960 You will learn practical defenses against social engineering threats like phishing smashing phishing 19 00:01:54,260 --> 00:01:58,540 identity theft scams cons and others. 20 00:01:58,580 --> 00:02:06,580 You'll learn how to use isolation compartmentalisation as a security control covering some boxes. 21 00:02:06,590 --> 00:02:08,420 Application isolation. 22 00:02:08,420 --> 00:02:09,610 Virtual machines. 23 00:02:09,650 --> 00:02:13,560 Unix and cubes OS. 24 00:02:13,710 --> 00:02:18,290 This is Volume 1 of 4 of your complete guide to Internet security. 25 00:02:18,290 --> 00:02:20,490 Privacy and anonymity. 26 00:02:20,580 --> 00:02:25,860 If you want to know about the continuation of the course through the other volumes check out the bonus 27 00:02:25,860 --> 00:02:29,400 lecture at the end to understand how they all fit together.