The Best Introduction to Cyber Security

Theory, Technical Examples, and Tutorials

This course will not teach you how to be a hacker or a pentester. During this course you will learn theory, application, and examples of real-world threats and build a mental model for yourself about how this field works. The course is designed to be accessible for a student with no prior knowledge, but is worthwhile for any seasoned expert to take so that they can learn more about the subjects they have never had to dive into. A graduate of this course should be confident that they are fully prepared to continue their security education and protect themselves and others online.

Course curriculum

  • 1

    Secure Yourself Now

    • Intro

    • Passwords

    • Who is Tracking You?

    • Update Your Computer and Scan

    • Support Roppers

    • Join our Chat Room(s)

    • Chapter Survey 1

  • 2

    Risk

    • CIA(NA)

    • Risk

    • Threat Modeling

    • Your Threat Model

    • Chapter Survey 2

  • 3

    Real World

    • People You Know

    • Data Minimization

    • Linux Password Reset

    • Windows Password Reset

    • Technical Attacks

    • Lockpicking and Security

    • OPSEC and Compartmentalization

    • Dox Yourself First

    • Chapter Survey 3

  • 4

    Passwords and Authentication

    • Authentication Design

    • Password Complexity

    • Password Manager

    • Hashing

    • Two Factor Authentication

    • Security Questions and Account Resets

    • Outdated Extensions and Permissions

    • Phishing

    • Miscellaneous

    • Chapter Survey 4

  • 5

    Networks

    • Intro to Hostile Networks

    • Protect Your IP Address

    • IP Protections

    • Encryption

    • Metadata

    • Man in the Middle

    • Sooo.... VPNs?

    • Chapter Survey 5

  • 6

    How Hacking Works

    • Network Architecture Notes

    • Cyber Killchain

    • Post-Exploitation

    • Malware Types

    • Job Roles - Red vs Blue

    • Phishing Case Study

    • Chapter Survey 6

  • 7

    Defense Against the Dark Arts

    • How to Tell if You are Hacked

    • Anti-Virus Basics

    • Threat Hunting Basics

    • Linux Network Hunting Lab

    • Linux Process Hunting

    • Windows Network Threat Hunting

    • Windows Process Hunting

    • Malware Removal

    • Chapter Survey 7

  • 8

    Securing Yourself

    • Don't Get Hacked

    • Securing Windows, According to Taylor Swift

    • Securing Linux, According to Dennis

    • Supply Chain Attacks

    • How to Help Others Be Safe Online

    • Chapter Survey 8

Our goal isn't to teach you how to hack, our goal is to teach you how to learn.

Pricing options

Explain how different pricing options might be valuable to different segments of your audience.

Instructor(s)

Lead Instructor

Dennis Devey

I am an independent security researcher who is into education, malware command and control, and endpoint hardening. Back in school I was on our competitive Cyber Security Team and focused on building training for new members. I made this website to continue the work I had done and to share it with the widest audience possible.

Join our Mailing List!

Add your email to get the latest updates.

Contact

For support, feedback, or if you just want to say hello, my email is contact@hoppersroppers.org