Apologies for the long absence I have been not well most of January but back now and right into it.
Since I started this site I have managed to discover some fantastic resources and this course were available on UDEMY at this link HERE, I have it through Station X.
I will admit that I hadn’t heard of Station X until recently but have the pleasure of signing up for a few of their courses because there is such a fantastic selection of cybersecurity courses, I will share the bio about them:
“Who We Are We
Station X has been a leading provider of the best online cybersecurity courses and services since 1996.
We specialise in utilising cutting-edge technology, extensive knowledge and experience, to help clients identify vulnerabilities and reduce business risk from cybersecurity attacks.
What We Do for You
Through careful analysis and industry-leading solutions, we help you avoid security breaches and service interruptions that cost you money and erode the trust of your customers.
If you have been attacked, we help minimise damage and resume normal business operations quickly. We also provide top-of-the-line employee training to reduce human error from your cyber threat profile.
All of our solutions are practical, budget-friendly and can be customised to fit your particular needs.
Our partners are all seasoned experts, highly ethical and dedicated to helping you improve your cyber security. We stay on top of the very latest industry developments and have acquired all of the top accreditations and certifications, including CISSP, CISA, CISM, CEH, CHECK, CREST, SABSA, TOGAF and ISO 27001 LA.
Working with Station X, you will:
- Avoid the cost of downtime associated with a cyber attack
- Meet regulatory requirements and avoid fines
- Preserve your company’s reputation
- Retain customer loyalty
- Gain complete confidence in your security architecture so that you can pursue new business opportunities vigorously
- Ensure your software programs are free of security vulnerabilities and don’t violate best practices or have security design issues
- Ensure employees have the training to avoid and recognise attacks
- Resolve attacks quickly so that damage and business disruption is minimised
- Address existing threats and vulnerabilities to prevent future attacks
- Increase your productivity by leaving the big security issues to us, freeing yourself up to concentrate on your core business competencies
- Gain a team of security experts! We do this day in and day out
- Gain access to unmatched industry knowledge, leading-edge technology and state-of-the-art equipment
At Station X, we understand the security needs and concerns of today’s businesses and will work closely with you to ensure your company is protected.
We offer expert staff, superior tools and systems.
When you choose Station X, you are selecting a partner that is dedicated to meeting your needs and providing you with superior service. Your security is our #1 priority.”
This is the little (ok, maybe biggish) list of courses I have signed up for and will talk about on this site when I complete each one.
- The Complete Cyber Security Course! Volume 1
- The Complete Cyber Security Course! Volume 2
- The Complete Cyber Security Course! Volume 3
- The Complete Cyber Security Course! Volume 4
- WiFi Hacking: Wireless Penetration Testing for Beginners
- Network Hacking Continued – Intermediate to Advanced
- Start Using Wireshark to Hack like a Pro
- CompTIA Network+ Cert. (N10-006): The Total Course
- CompTIA Network+ Cert. (N10-006): Practice Tests
- The Complete Nmap Ethical Hacking Course : Network Security Assessment
- Learn Website Hacking / Penetration Testing From Scratch
- Learn Network Hacking From Scratch (WiFi & Wired)
- Learn Social Engineering From Scratch
- Learn Hacking Using Android From Scratch
- Hands-on Penetration Testing Labs 1.0
- Hands-on Penetration Testing Labs 2.0
- Hands-on Penetration Testing Labs 3.0
- Kali Linux Web App Pentesting Labs
- Reverse Engineering with Radare2
- Network Hacking Continued – Intermediate to Advanced
- Learn Python & Ethical Hacking From Scratch
- Cyber Security – Python and Web Applications
- The Ultimate Linux Mastery Bundle
- CompTIA Pentest+ (PT0-001): Complete Course & Practice Exam
And it is the top one ‘The Complete Cyber Security Course! Volume 1’ that I am going to talk about here and now.
This course is taught by Nathan House who has over 24 years experience in cybersecurity where he has advised some of the largest companies in the world, assuring security on multi-million and multi-billion pound projects. He is actually the CEO of Station X.
More recently he has acted as the lead security consultant
on a number of the UKs mobile banking and payment solutions helping secure to
date over £71Bn in transactions with clients that have included; BP, ExxonMobil, Shell, Vodafone,
VISA, T-mobile, GSK, COOP Banking Group, Royal Bank of Scotland, Natwest,
Yorkshire bank, BG Group, BT, London 2012.
Over the years he has spoken at a number of security conferences, developed free security tools, and discovered serious security vulnerabilities in leading applications.
Qualifications and education
★ BSc. (Hons) Computing
‘Networks & Communication’ 1st Class Honors
★ SCF : SABSA Chartered Architect Foundation
★ CISSP : Certified Information Systems Security Professional
★ CISA : Certified Information Systems Auditor
★ CISM : Certified Information Security Manager
★ ISO 27001 Certified ISMS Lead Auditor
★ CEH : Certified Ethical Hacker
★ OSCP : Offensive Security Certified Professional
So as you can see the course is taught by a man who absolutely knows what he is talking about.
This is part 1 of a 4 part course with each part touching on different subjects so for instance, the titles for each are:
- VOLUME 1: HACKER’S EXPOSED
- VOLUME 2: NETWORK SECURITY
- VOLUME 3: ANONYMOUS BROWSING
- VOLUME 4: ENDPOINT PROTECTION
And in each of these there is a ridiculous amount of information and seeing as we talking about volume 1 the I will show you what you get.
Then in each section, there are several more topics like this.
All together there are ONE HUNDRED AND FIFTEEN chapters that cover everything from What is ‘Privacy, Anonymity and Pseudonymity’ to ‘Physical and Hardware Isolation – How to change the Mac Address’ and a hell of a lot more.
What I really liked about this course is where it wasn’t as technical as a couple of others I have taken (its only volume 1) there is an amazing amount of explanations on concepts within cybersecurity and hacking in general.
Nathan is very clear and talks with obvious experience and qualified statements on each subject along with great practical resources, on each section under the video there are links to each thing he talks about allowing you to go and look further into the subject.
I would have LOVED to taking this course earlier because it gives more theoretical explanation to each thing spoken about which I really enjoyed because it was quite academic in a sense which seems to be leading perfectly into volumes 2, 3 and 4.
It’s like taking the theory test for your driving licence before going into the car and driving which I really liked as some of the courses I have taken tend to talk about more on HOW to do something but not the WHY you want, need or should do it.
Here is a breakdown of the sections.
Section 1 was the introductory part which was good as didn’t take too long but it was nice to get the study recommendations.
Section 2 spoke a lot on security, threats and vulnerabilities from both the hacker’s side and the side doing the protecting.
Section 3 we start to get into it with discussions on viruses, malware, RAT’s, Spyware, Vishing etc.
Section 4 is the encryption crash course and I must admit I didn’t know too much about encryption beforehand bot now feel like I am definitely up to intermediate now.
Section 5 is setting up the test environment but really like about Nathan as a teacher is he doesn’t just show you how to do these things on Windows but also Linux and Mac too.
Section 6 was on operating systems and covers EVERYTHING you could imagine in here like Windows 7, 8, 8.1 and 10, Mac, Kali, Black Arch, Parrot, Tails and Whonix and possibly more that I have forgotten.
Section 7 is where we talk all about bugs and vulnerabilities so we touch on auto-updates, the importance of keeping updates up to date, patch Tuesday, browser extensions and such.
Section 8 is on reducing threat privilege.
Section 9 was my favourite on as we covered social engineering quite in-depth.
Section 10 is on security domains.
Section 11 is a good one on isolation and compartmentalization.
Section 12 is the bonus section to get you ready for the following volumes.
Overall an EXCELLENT first volume from a fantastic teacher, I have already started volume 2 and will chat about it when done and I can imagine you will hear me speaking a lot about Station X and why you should check them out, look at these course selections and believe me when I tell you the prices are UNBELIEVABLE.
Check them out at the following:-
- Station X website = https://www.stationx.net/
- Station X Facebook = https://www.facebook.com/gotostationx/
- Station X Twitter = https://twitter.com/gotostationx/
- Station X LinkedIn = https://www.linkedin.com/company/stationx/
- Station X YouTube = https://www.youtube.com/channel/UC-vWmE-BHcUrYW5zwDijL1g/videos
- Nathan Twitter = https://twitter.com/GotoNathan
And I will see you again next time.