Protect Yourself and Others Online!
Learn Security Fundamentals: Theory and Practice
Theory, Technical Examples, and Tutorials
Intro
Passwords
Who is Tracking You?
Update Your Computer and Scan
Support Roppers
Join our Chat Room(s)
Chapter Survey 1
CIA(NA)
Risk
Threat Modeling
Your Threat Model
Chapter Survey 2
People You Know
Data Minimization
Linux Password Reset
Windows Password Reset
Technical Attacks
Lockpicking and Security
OPSEC and Compartmentalization
Dox Yourself First
Chapter Survey 3
Authentication Design
Password Complexity
Password Manager
Hashing
Two Factor Authentication
Security Questions and Account Resets
Outdated Extensions and Permissions
Phishing
Miscellaneous
Chapter Survey 4
Intro to Hostile Networks
Protect Your IP Address
IP Protections
Encryption
Metadata
Man in the Middle
Sooo.... VPNs?
Chapter Survey 5
Network Architecture Notes
Cyber Killchain
Post-Exploitation
Malware Types
Job Roles - Red vs Blue
Phishing Case Study
Chapter Survey 6
How to Tell if You are Hacked
Anti-Virus Basics
Threat Hunting Basics
Linux Network Hunting Lab
Linux Process Hunting
Windows Network Threat Hunting
Windows Process Hunting
Malware Removal
Chapter Survey 7
Don't Get Hacked
Securing Windows, According to Taylor Swift
Securing Linux, According to Dennis
Supply Chain Attacks
How to Help Others Be Safe Online
Chapter Survey 8
Explain how different pricing options might be valuable to different segments of your audience.
Free
Regular price
Dennis Devey
Add your email to get the latest updates.
For support, feedback, or if you just want to say hello, my email is contact@hoppersroppers.org