• Post category:StudyBullet-14
  • Reading time:3 mins read


Windows Security Basics

What you will learn

How a Windows computer gets hacked

Investigate Network Connections

Investigate Tasks

See Windows Event Logs

Description

Want to Secure your Windows computer or know how it can get hacked?

In this course you will learn about Windows Endpoint Security. It is a beginners course that doesn’t need any prior knowledge. You will see how a Windows computer can get hacked (demo)Β and all the steps you can do to investigate a Windows system.

You will learn about tools like Microsoft Defender, TCPΒ View, Task Manager and others. Each tool has its unique purpose and can assist you with the security of your Windows device.


Get Instant Notification of New Courses on our Telegram channel.


Microsoft Defender for Endpoint is a comprehensive security solution that helps organizations defend against threats including malware, viruses, and phishing attacks. It also includes features like device management and data loss prevention.

TCP View lets you see network connections from your device to the internet. Hackers often have a connection to your device to remotely control it, use a so called reverse shell. This makes your computer connect to one of theirs, and allows them to remotely control it. They can access files, microphone, webcam and much more.

Do you want to know how to investigate your Windows computers or how a hack works?Β This course is for you. It is a beginners course that doesn’t require any advanced knowledge.

English
language

Content

Introduction

Introduction
Demo Hack
Task Manager
TCP View
Process Explorer
Windows Event Log
osquery