Penetration Testing With Kali Linux
81 lectures   6 hours  All Levels
Price 2000 Rs.
Preview this course

What Will I Learn?
    Secure Windows 8/10
    Prevent data leaks and loss
    Secure networks
    Use built-in security mechanisms
    Know Windows 8 like an expert

Basic IT knowledge


Windows 8/10 is an operating system which introduced many changes compared to the previous versions. The differences are not only in the appearance of your colorful desktop and icons, but also a lot of new security solutions.

Does your computer actually belong to you? Are you sure that there's no suspicious traffic in your network? Hackers attack using automated techniques at the same time, hundreds of thousands of computers, often for fun and "blindly".

Most Windows users do not use the built-in security mechanisms, which are provided by the system itself. For this reason, the client's machines often become "zombies" that remotely (and without the user's knowledge), are used by hackers. Meanwhile, the correct configuration can prevent the majority of currently used attacks.

Windows 8: Hacking & Securing is recommended to people who benefit from this system either for personal or professional purposes. After the training, you will be able to effectively protect your system from most threats.
Who is the target audience?

Windows 8 users and administrators
  IT Students
Future System Administrators
Curriculum For This Course
Introduction - Let's begin
Popular threats and vulnerability distribution
Computer infection rate
Dangerous software
Adware and malware
Rogue antiviruses
Windows 8 Security Features
Windows 8 Security improvements
Protection from network threats
System protection features

Integral Security
Secure boot
What is the UEFI?
UEFI advantages
UEFI booting vs BIOS booting
Windows 7 booting vs Windows 8 booting
WIM - practice
Booting from USB - practice
Booting from USB - part 2
Benefits of USB booting
Account types
Security of LiveID
Sign in options
Picture password
Automatic sign in
Easy system updates
Preinstalling drivers
Device Manager
Perventing installation of selected devices
Protecting User Data
Software RAID
MBR <==> GPT - theory
MBR <==> GPT - practice
MBR <==> GPT - practice part 2
Disk redundancy
Configuring drives
Creating VHDX
Using VHDX
Data encryption
BitLocker tips
File history
NTFS permissions
EFS encryption
Dynamic access control
Files in cloud

Internet Security
IP protocols
Network connections
Network and Sharing Center
Private/public host address
IPv6 Protocol
IPv6 addresses
Remote access
Diagnostic and troubleshooting
Windows Firewall
Configuring firewall
Smart screen
Internet options
ALSR protection
Windows defender
Built-in security software
VPN protocols

OS Protection
Action Center
Automatic maintaince
User account control
UAC default configuration
UAC permissions
Multiple local group policy
Use of GP
GP enforcement
Windows Store
WS Configuration
Classic Apps
Troubleshooting apps
New and improved system features
System refreshing
Copyright © 2018 Hacker Computer School  All Rights Reserved