Protect yourself by hacking your own PC - Vol. 1
MP4 | Video: 1280x720 | 84 kbps | 44 KHz | Duration: 1 Hours | 203 MB
Genre: eLearning | Language: English
How to hide your online identity
This is a Part 1 of 5 series on hands-on lectures on online security.
This lecture, , will focus on how to protect your online identity to avoid becoming a victim of hacking.
This course doesn't require any material and it will take about an hour to complete.
This course will help you to develop a common sense on the topic of online security and privacy.
In Chapter 1, I will teach you how to how to use Google to gather intelligence better than average Google users.
In Chapter 2, I will teach you about the risk you could unknowingly face by falling a victim to online criminals. I will list the attack types and prevention that include Adware, Hacking, Malware, Phising, Ransomware, Spam, Spyware, Trojan, Worm, etc..
In Chapter 3, I will teach you how to check if your PC was already compromised by hackers. I will show you how to disinfect your PC and prevent future infections. The Chapter 3 will also cover how to activate live Microsoft's monitoring systems for the intrusion detection and prevention.
In Chapter 4, I will teach you how to keep your identity hidden and how to remove your online tracks from the Internet. The Chapter 4 will also cover how to hide your online activities by using multiple VPNs and TOR.
In Chapter 5, I will teach you how the global surveillance network works.
In Chapter 6, I will teach you the dangers of Remote Access Trojan and why this is the worst thing that can happen to you. I will teach you how to remove them from your PC if you were infected. I will also teach you how to trace the hacker who has had illegally compromised your PC -- and bring them to justice.