Course curriculum

    1. Your computer and how it works

    2. What is a Motherboard?

    3. What is a CPU?

    4. What is a GPU?

    5. What is RAM?

    6. What is a PSU?

    7. What is a BIOS?

    8. What is a Hard Drive?

    9. What are PCIe lanes?

    10. External Devices

    11. Airflow and heat management

    12. Computer related units

    13. Laptops, Desktops and other devices

    14. Benchmarking

    15. Additional Devices

    16. Resourcing components

    17. How does Computer Hardware Work - Extra Video Content

    18. Repairing computers and other smart electronics.

    1. File Structure in Windows

    2. Basic Windows Utilities

    3. Important Symbols

    4. Keyboard Shortcuts

    5. Logic Gates and Heat Production

    6. Network Troubleshooting

    7. Internet Safety and File Integrity

    8. Installing Drivers

    9. Customization/Personalization of Windows

    10. Cool things you can do in Modern Windows

    1. Obsidian

    2. Github

    3. Steps Recorder, Snipping tool

    1. Understanding some of the following topics

    2. Defanging a URL

    3. IP Loggers

    4. Online Information Exposure

    5. EXIF Data in Images

    6. Facial Recognition Programs/Websites

    7. Browser Fingerprinting

    8. Cookie Tracking

    9. Device Access Through Applications

    10. Keyboard Eavesdropping

    11. Infected Files/File Extensions

    12. Sandboxing

    13. Malicious Software Updates

    14. Typosquatting

    15. Social Engineering

    16. Phishing

    17. Targeting Friends & Family

    18. RFID Cloning

    19. Rubber Duckies

    20. Physical Security

    21. WiFi Cloning and Man in the Middle Attacks

    22. Time Zones and User Activity Tracking

    23. Vulnerable Associates

    24. Harassment Campaigns

    25. EGO Exposure

    26. Sim Swapping

    27. Rabbit Holes and False Traps

    28. Voice Cloning (Vishing)

    29. IP History and Registration IP vs Most Recent

    30. Password Reuse and Storage

    31. Out-of-Date Software Exposure

    32. Peer to Peer Sniffing

    33. Common techniques to remove malware from a computer

    1. Internet Fundamentals

    2. Ports & Websites

    3. Interacting with your Router

    4. Public vs Private IPs (LAN vs WAN)

    5. TCP vs UDP

    6. How ISPs work

    7. Network types to remember

    8. WiFi vs Other Wireless Technologies

About this course

  • $500.00
  • 297 lessons
  • 0 hours of video content

Become a professional Ethical Hacker