Hi, what do you want to do?
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Location Tracking
Here, we will look at how location tracking works on our systems and networks and how we can prevent systems from knowing our location to prevent being hacked.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Restricting Cortana
In this video, we will understand how Cortana works and how to limit the amount of information it collects, to prevent the data from being shared through trackers.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Windows 10 Privacy - Turning Off Ad Tracking
This video illustrates a few tricks and tips to improve the privacy of the Windows 10 operating system. You will learn how to turn off ad tracking and prevent being tracked.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Patching and Updates
This video demonstrates how applying Windows safety patches and updates is essential in constantly keeping the system safe and how to use these patches and updates.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Scam Email Live Example
In this video, we will look at the various examples of scam emails that bombard your inbox from time to time and how they can be dangerous if the information is passed on to unknown people.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Phishing Attacks
Here, we will understand the concepts of phishing, how the attack is performed, the dangers of opening phishing emails, and how to prevent them.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Introducing Proton Email
This video illustrates the Proton email and its features and advantages, safety, and disadvantages.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Guerrilla Mail
This video illustrates Guerrilla mail and its features and advantages, safety, and disadvantages.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How to Detect Email Tracking
In this lesson, we will understand how to detect if someone is tracking your email and how to prevent that from happening.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How to Track Sent Emails
In this video, we will look at an email tracker software that allows you to track the status of the sent mail or if the emails have been read or not, the email tracker.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Email Basics, Protocols and Ports
In this lesson, you will learn about emails, what protocols and ports they use to communicate, the IMAP port 143 and POP port 110, IMAP port 993 and POP port 995, encrypted and unencrypted.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The World of Electronic Mails – Dangers, Attacks, and Protection
This section focuses on emails, the dangers of not protecting the emails or opening dangerous emails, how hackers attack using emails, and how to protect yourself from being hacked by emails.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Meet Kevin Mitnick
This video is an overview of a famous hacker, Kevin Mitnick, that highlights his hacking techniques.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - The Way Back Machine
This service serves as a database or archive of snapshots of webpages from the past or even just before changing the current website as a reference.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Reconnaissance Methods
In this lesson, you will learn about footprinting, or the art of collecting information about a person or object of interest, called reconnaissance.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Attacks Against Encryption
In this video, we will look at the different kinds of attacks that hackers can perform to decrypt an already encrypted hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Self-Encrypting Drives
In this lesson, you will learn about Self-encrypting Drives (SEDs), which can encrypt the drive on their own automatically.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting Mac OS with FileVault
In this video, you will learn about encrypting a Mac OS system with an encryption tool, FileVault.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting Windows 10 with Bitlocker
Another encryption tool available for the Windows 10 Operating system, Bitlocker, is explored here.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Encrypting with Veracrypt
After learning about encryption, we will look at encrypting a computer using Veracrypt software.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Disk Encryption
Here, you will learn about encryption and decryption, the two technologies applied to a hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - What Is the Cloud?
In this lesson, we will understand more about cloud computing, storing data online than on a local hard drive.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - How to Back Up Your Computer
In this video, we will look at a backup, the advantages of having a backup system in place, and how to back up your computer.
Curated Video
Cyber Security for Absolute Beginners - 2022 Edition - Part 02 - Malwarebytes
This video elaborates on another antimalware product called Malwarebytes.