Protect Yourself and Others Online!
Learn Security Fundamentals: Theory and Practice
Theory, Technical Examples, and Tutorials
Intro
Passwords
Who is Tracking You?
Update Your Computer and Scan
Support Roppers
Join our Chat Room(s)
Chapter Survey 1
CIA(NA)
Risk
Threat Modeling
Your Threat Model
Chapter Survey 2
People You Know
Data Minimization
Linux Password Reset
Windows Password Reset
Technical Attacks
Lockpicking and Security
OPSEC and Compartmentalization
Dox Yourself First
Chapter Survey 3
Authentication Design
Password Complexity
Password Manager
Hashing
Two Factor Authentication
Security Questions and Account Resets
Outdated Extensions and Permissions
Phishing
Miscellaneous
Chapter Survey 4
Intro to Hostile Networks
Protect Your IP Address
IP Protections
Encryption
Metadata
Man in the Middle
Sooo.... VPNs?
Chapter Survey 5
Network Architecture Notes
Cyber Killchain
Post-Exploitation
Malware Types
Job Roles - Red vs Blue
Phishing Case Study
Chapter Survey 6
Explain how different pricing options might be valuable to different segments of your audience.
Regular price
Add your email to get the latest updates.
For support, feedback, or if you just want to say hello, my email is contact@hoppersroppers.org