File | Size |
---|
1. Introduction/1. Welcome and Introduction to the Instructor!.mp4 | 19.90 MB |
1. Introduction/2. Security Quick Win!.mp4 | 43.19 MB |
1. Introduction/3. Goals and Learning Objectives - Volume 1.mp4 | 16.11 MB |
1. Introduction/4. Target Audience.mp4 | 7.34 MB |
1. Introduction/5. Study Recommendations.mp4 | 17.95 MB |
1. Introduction/6. Course updates.mp4 | 4.40 MB |
10. Security Domains/1. Goals and Learning Objectives.mp4 | 1.43 MB |
10. Security Domains/2. Security Domains.mp4 | 21.85 MB |
11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.mp4 | 2.30 MB |
11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.mp4 | 13.86 MB |
11. Security Through Isolation and Compartmentalization/10.1 Trusted BSD.html | 87.00 B |
11. Security Through Isolation and Compartmentalization/10.2 Firejail.html | 92.00 B |
11. Security Through Isolation and Compartmentalization/10.3 Linux Sandbox.html | 96.00 B |
11. Security Through Isolation and Compartmentalization/10.4 Apparmor.html | 105.00 B |
11. Security Through Isolation and Compartmentalization/10.5 Script Sandfox.html | 118.00 B |
11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.mp4 | 23.80 MB |
11. Security Through Isolation and Compartmentalization/11.1 Mac OS X - App Sandbox.html | 193.00 B |
11. Security Through Isolation and Compartmentalization/11.2 OSX-Sandbox--Seatbelt--Profiles.html | 119.00 B |
11. Security Through Isolation and Compartmentalization/11.3 Sandbox Man page.html | 165.00 B |
11. Security Through Isolation and Compartmentalization/11.4 Firefox profile.html | 132.00 B |
11. Security Through Isolation and Compartmentalization/11.5 Apple Sandbox Guide.html | 139.00 B |
11. Security Through Isolation and Compartmentalization/11.6 SuperDuper.html | 127.00 B |
11. Security Through Isolation and Compartmentalization/11.8 Buckle Up.html | 97.00 B |
11. Security Through Isolation and Compartmentalization/12. Virtual Machines.mp4 | 44.44 MB |
11. Security Through Isolation and Compartmentalization/12.1 Virt Manager.html | 86.00 B |
11. Security Through Isolation and Compartmentalization/12.2 Wikipedia - Hypervisor.html | 101.00 B |
11. Security Through Isolation and Compartmentalization/12.3 Wikipedia - Comparison of platform virtualization software.html | 137.00 B |
11. Security Through Isolation and Compartmentalization/12.4 Turnkey Linux - Openvpn.html | 97.00 B |
11. Security Through Isolation and Compartmentalization/12.5 Wikipedia - Kernel-based Virtual Machine.html | 119.00 B |
11. Security Through Isolation and Compartmentalization/12.6 OpenVZ.html | 90.00 B |
11. Security Through Isolation and Compartmentalization/12.7 KVM Debian Jessie.html | 98.00 B |
11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.mp4 | 22.74 MB |
11. Security Through Isolation and Compartmentalization/13.1 Venom.html | 90.00 B |
11. Security Through Isolation and Compartmentalization/13.2 Example VMware security bug.html | 123.00 B |
11. Security Through Isolation and Compartmentalization/13.4 httpsen.wikipedia.orgwikiTiming_channel.html | 105.00 B |
11. Security Through Isolation and Compartmentalization/13.5 httpsen.wikipedia.orgwikiX86_virtualization.html | 109.00 B |
11. Security Through Isolation and Compartmentalization/13.7 httpsen.wikipedia.orgwikiCovert_channel.html | 105.00 B |
11. Security Through Isolation and Compartmentalization/13.8 A look at malware with VM detection.html | 161.00 B |
11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.mp4 | 36.97 MB |
11. Security Through Isolation and Compartmentalization/14.1 Convert VM to ISO.html | 109.00 B |
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4 | 88.64 MB |
11. Security Through Isolation and Compartmentalization/15.1 Whonix Check.html | 100.00 B |
11. Security Through Isolation and Compartmentalization/15.2 httpswww.whonix.org.html | 84.00 B |
11. Security Through Isolation and Compartmentalization/15.3 Whonix and virtualbox.html | 99.00 B |
11. Security Through Isolation and Compartmentalization/15.4 ARM - Anonymizing relay monitor.html | 108.00 B |
11. Security Through Isolation and Compartmentalization/15.5 Whonix Features.html | 97.00 B |
11. Security Through Isolation and Compartmentalization/15.6 How to implement physical isolation.html | 131.00 B |
11. Security Through Isolation and Compartmentalization/15.7 Whonix Stream Isolation.html | 105.00 B |
11. Security Through Isolation and Compartmentalization/15.8 Whonix VM snapshots.html | 116.00 B |
11. Security Through Isolation and Compartmentalization/15.9 If setting up your own workstations - MUST READ.html | 112.00 B |
11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.mp4 | 15.79 MB |
11. Security Through Isolation and Compartmentalization/16.1 Whonix - Warnings.html | 96.00 B |
11. Security Through Isolation and Compartmentalization/16.2 Whonix's lack of an Amnesic feature.html | 190.00 B |
11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4 | 78.73 MB |
11. Security Through Isolation and Compartmentalization/17.1 Qubes docs.html | 90.00 B |
11. Security Through Isolation and Compartmentalization/17.10 Video Tour of Qubes.html | 91.00 B |
11. Security Through Isolation and Compartmentalization/17.2 Qubes Download.html | 96.00 B |
11. Security Through Isolation and Compartmentalization/17.3 Windows templates.html | 108.00 B |
11. Security Through Isolation and Compartmentalization/17.4 Whonix templates.html | 105.00 B |
11. Security Through Isolation and Compartmentalization/17.5 Debian template(s).html | 107.00 B |
11. Security Through Isolation and Compartmentalization/17.6 Split GPG.html | 100.00 B |
11. Security Through Isolation and Compartmentalization/17.7 Disposable VMs (DispVMs).html | 97.00 B |
11. Security Through Isolation and Compartmentalization/17.8 Librem 13 laptop.html | 105.00 B |
11. Security Through Isolation and Compartmentalization/17.9 Hardware Compatibility List (HCL).html | 90.00 B |
11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.mp4 | 14.98 MB |
11. Security Through Isolation and Compartmentalization/18.1 Partitioning my digital life into security domains.html | 145.00 B |
11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.mp4 | 5.67 MB |
11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.mp4 | 25.58 MB |
11. Security Through Isolation and Compartmentalization/3.1 Mac OS X - Wifispoof.html | 83.00 B |
11. Security Through Isolation and Compartmentalization/3.2 Mac OS X - Macdaddyx.html | 109.00 B |
11. Security Through Isolation and Compartmentalization/3.3 Windows - Tmac.html | 89.00 B |
11. Security Through Isolation and Compartmentalization/3.4 Linux - How to use macchanger.html | 132.00 B |
11. Security Through Isolation and Compartmentalization/3.5 Mac OS X - How to change the mac address.html | 141.00 B |
11. Security Through Isolation and Compartmentalization/3.6 Diagram of Mac.html | 131.00 B |
11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.mp4 | 50.25 MB |
11. Security Through Isolation and Compartmentalization/4.1 Windows - CPU Z.html | 103.00 B |
11. Security Through Isolation and Compartmentalization/4.2 Mac OS X - Installing dmidecode with brew.html | 119.00 B |
11. Security Through Isolation and Compartmentalization/4.3 Linux and Mac OS X - dmidecode.html | 93.00 B |
11. Security Through Isolation and Compartmentalization/4.4 Windows - dmidecode.html | 115.00 B |
11. Security Through Isolation and Compartmentalization/4.5 Linux - i-nex.html | 88.00 B |
11. Security Through Isolation and Compartmentalization/4.6 Mac OS X - Mac Cupid.html | 120.00 B |
11. Security Through Isolation and Compartmentalization/4.7 httpswww.yubico.com.html | 84.00 B |
11. Security Through Isolation and Compartmentalization/4.8 httpswww.nitrokey.com.html | 87.00 B |
11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.mp4 | 57.32 MB |
11. Security Through Isolation and Compartmentalization/5.1 Pen Drive Apps.html | 89.00 B |
11. Security Through Isolation and Compartmentalization/5.2 Portable Apps.html | 85.00 B |
11. Security Through Isolation and Compartmentalization/5.3 Authentic8.html | 97.00 B |
11. Security Through Isolation and Compartmentalization/5.4 Spoons.net.html | 88.00 B |
11. Security Through Isolation and Compartmentalization/5.5 Spikes.html | 91.00 B |
11. Security Through Isolation and Compartmentalization/5.6 Maxthon.html | 84.00 B |
11. Security Through Isolation and Compartmentalization/5.7 Aegis Secure Key - USB 2.0 Flash Drive.html | 108.00 B |
11. Security Through Isolation and Compartmentalization/6. Dual Boot.mp4 | 7.93 MB |
11. Security Through Isolation and Compartmentalization/6.1 Dual Booting explained.html | 177.00 B |
11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.mp4 | 10.41 MB |
11. Security Through Isolation and Compartmentalization/7.1 Chromium sandbox design.html | 121.00 B |
11. Security Through Isolation and Compartmentalization/7.2 Mozilla Sandbox design.html | 102.00 B |
11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.mp4 | 26.37 MB |
11. Security Through Isolation and Compartmentalization/8.1 BufferZone.html | 112.00 B |
11. Security Through Isolation and Compartmentalization/8.2 Deepfreeze Cloud Browser and Desktop.html | 129.00 B |
11. Security Through Isolation and Compartmentalization/8.3 Shadowdefender.html | 91.00 B |
11. Security Through Isolation and Compartmentalization/8.4 Returnil.html | 118.00 B |
11. Security Through Isolation and Compartmentalization/8.5 f-sandbox.html | 92.00 B |
11. Security Through Isolation and Compartmentalization/8.6 Deepfreeze Standard.html | 121.00 B |
11. Security Through Isolation and Compartmentalization/8.7 Comodo.html | 110.00 B |
11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4 | 70.12 MB |
11. Security Through Isolation and Compartmentalization/9.1 Introduction and quick guide sandboxie.html | 143.00 B |
11. Security Through Isolation and Compartmentalization/9.2 Sandboxie guide.html | 118.00 B |
11. Security Through Isolation and Compartmentalization/9.3 Sandboxie How it Works.html | 106.00 B |
11. Security Through Isolation and Compartmentalization/9.4 Sandboxie forum.html | 96.00 B |
12. Wrap Up/1. Congratulations.mp4 | 5.29 MB |
2. know Yourself - The Threat and Vulnerability Landscape/1. Theory and Practical.mp4 | 2.25 MB |
2. know Yourself - The Threat and Vulnerability Landscape/10. Defense In Depth.mp4 | 2.99 MB |
2. know Yourself - The Threat and Vulnerability Landscape/11. The Zero Trust Model.mp4 | 10.28 MB |
2. know Yourself - The Threat and Vulnerability Landscape/2. Goals and Learning Objectives.mp4 | 2.71 MB |
2. know Yourself - The Threat and Vulnerability Landscape/3. Protect What You Value.mp4 | 8.94 MB |
2. know Yourself - The Threat and Vulnerability Landscape/4. What is Privacy, Anonymity and Pseudonymity.mp4 | 11.88 MB |
2. know Yourself - The Threat and Vulnerability Landscape/5. Security, Vulnerabilities, Threats and Adversaries.mp4 | 11.24 MB |
2. know Yourself - The Threat and Vulnerability Landscape/5.1 The Cyber Security Landscape Diagram.jpg.jpg | 777.15 kB |
2. know Yourself - The Threat and Vulnerability Landscape/6. Asset Selection.mp4 | 7.69 MB |
2. know Yourself - The Threat and Vulnerability Landscape/7. Threat Modeling and Risk Assessments.mp4 | 18.04 MB |
2. know Yourself - The Threat and Vulnerability Landscape/8. Security vs Privacy vs Anonymity - Can we have it all.mp4 | 5.44 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/1. Goals and Learning Objectives.mp4 | 2.89 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.1 httpwww.consumerfraudreporting.org.html | 98.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.2 httpwww.actionfraud.police.uktypes_of_fraud.html | 108.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.3 Top 10 scams.html | 127.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.10 httpsgithub.comhoshsadiqadblock-nocoin-list.html | 110.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.8 httpscoinhive.com.html | 82.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.9 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html | 116.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. Darknets, Dark Markets and Exploit kits.mp4 | 32.43 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/13. Governments, spies and secret stuff part I.mp4 | 27.03 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Governments, spies and secret stuff part II.mp4 | 30.24 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.1 httpscryptome.org201401nsa-codenames.htm.html | 107.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.2 httpstheintercept.com.html | 86.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.3 httpwww.nsaplayset.org.html | 87.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.4 httpsnsa.gov1.infodninsa-ant-catalog.html | 103.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.6 httpswikileaks.org-Leaks-.html.html | 95.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.11 Clipper chip.html | 192.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.3 UK data communications bill.html | 121.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.4 Kazakhstans new encryption law.html | 185.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.5 WhatsApp was Banned for 48 Hours in Brazil.html | 112.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.7 A Worldwide Survey of Encryption Products - pdf.html | 153.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.mp4 | 24.49 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.vtt | 11.01 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.2 Examples of backdoors.html | 123.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.3 Apple backdoor order.html | 112.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.5 Formal methods.html | 105.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.7 httpsreproducible-builds.org.html | 93.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. Censorship.mp4 | 6.49 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. Cyber Threat Intelligence – Stay Informed.mp4 | 2.62 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18.1 httpwww.stationx.netalerts.html | 91.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. Why You Need Security – The Value Of A Hack.mp4 | 28.93 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. The Top 3 Things You Need To Stay Safe Online.mp4 | 2.51 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3.1 httpsresearch.google.compubspub43963.html.html | 107.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.1 Exploit Kit Landscape Map.html | 99.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.2 httpswww.exploit-db.comsearch.html | 95.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.3 CVE details.html | 88.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/5. Hackers, crackers and cyber criminals.mp4 | 7.71 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware, viruses, rootkits and RATs.mp4 | 12.15 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.1 Malware stats.html | 107.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.2 SophosLabs 2018 Malware Forecast.html | 162.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.4 Report - Spotlight perils of malvertisements.html | 142.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.5 7 most common RATs.html | 149.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. What is Phishing, Vishing and SMShing.mp4 | 25.99 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8.1 Live phishing links.html | 87.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8.2 XSS example vulnerability.html | 136.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spamming & Doxing.mp4 | 4.79 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9.1 Spam example.html | 142.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9.2 Spam stats.html | 104.00 B |
4. Encryption Crash Course/1. Goals and Learning Objectives.mp4 | 1.63 MB |
4. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4 | 199.31 MB |
4. Encryption Crash Course/10.1 CA Ecosystem.html | 105.00 B |
4. Encryption Crash Course/10.2 Cert Fingerprints.html | 97.00 B |
4. Encryption Crash Course/10.3 Certificate patrol.html | 127.00 B |
4. Encryption Crash Course/10.4 CA example mistake.html | 180.00 B |
4. Encryption Crash Course/10.5 SSL Sniff.html | 107.00 B |
4. Encryption Crash Course/11. End-to-End Encryption (E2EE).mp4 | 8.19 MB |
4. Encryption Crash Course/12. Steganography.mp4 | 104.31 MB |
4. Encryption Crash Course/12.1 OpenPuff Manual.html | 107.00 B |
4. Encryption Crash Course/12.2 httpwww.spammimic.com.html | 85.00 B |
4. Encryption Crash Course/12.3 OpenPuff.html | 116.00 B |
4. Encryption Crash Course/12.4 List of Steg Tools.html | 105.00 B |
4. Encryption Crash Course/13. How Security and Encryption is Really Attacked.mp4 | 17.37 MB |
4. Encryption Crash Course/13.1 Security Pitfalls.html | 135.00 B |
4. Encryption Crash Course/2. Symmetric Encryption.mp4 | 32.30 MB |
4. Encryption Crash Course/3. Asymmetric Encryption.mp4 | 72.32 MB |
4. Encryption Crash Course/4. Hash Functions.mp4 | 89.24 MB |
4. Encryption Crash Course/4.1 Example hashes.html | 104.00 B |
4. Encryption Crash Course/5. Digital Signatures.mp4 | 42.74 MB |
4. Encryption Crash Course/5.1 httpswww.symantec.comenukcode-signing.html | 107.00 B |
4. Encryption Crash Course/5.2 Windows 10 Device Guard using Digital Signatures.html | 174.00 B |
4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 | 160.85 MB |
4. Encryption Crash Course/6.1 Wikipedia Transport Layer Security (TLS) page.html | 115.00 B |
4. Encryption Crash Course/6.2 Weakdh Cipher Suite Recommendations.html | 93.00 B |
4. Encryption Crash Course/6.3 Mozilla Cipher Suite Recommendations.html | 110.00 B |
4. Encryption Crash Course/6.4 Steve Gibson's Cipher Suite Recommendations.html | 117.00 B |
4. Encryption Crash Course/7. SSL Stripping.mp4 | 114.52 MB |
4. Encryption Crash Course/7.1 sniffdet - Remote Sniffer Detection ToolLibrary.html | 93.00 B |
4. Encryption Crash Course/7.2 WIFI Pineapple.html | 91.00 B |
4. Encryption Crash Course/7.3 Intro to Sniffers.html | 127.00 B |
4. Encryption Crash Course/7.4 Cain & Abel.html | 89.00 B |
4. Encryption Crash Course/7.5 Arpwatch Tool to Monitor Ethernet Activity in Linux.html | 119.00 B |
4. Encryption Crash Course/7.6 SSL Strip tool By Moxie Marlinspike.html | 107.00 B |
4. Encryption Crash Course/8. HTTPS (HTTP Secure).mp4 | 81.90 MB |
4. Encryption Crash Course/8.1 Server Name Indication (SNI) Wiki.html | 113.00 B |
4. Encryption Crash Course/9. Digital Certificates.mp4 | 81.97 MB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/1. Goals and Learning Objectives.mp4 | 1.84 MB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.1 httpsen.wikipedia.orgwikiHypervisor.html | 101.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.10 Windows VMs here.html | 124.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.11 Virtualbox Network Adapter Settings.html | 104.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.2 httpwww.osboxes.orgvmware-images.html | 98.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.3 httpwww.osboxes.orgguide#!.html | 92.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.4 httpvirtual-machine.org.html | 88.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.5 httpwww.osboxes.orgvirtualbox-images.html | 102.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.7 httpsmarketplace.vmware.com.html | 92.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.8 httpvirtualboxes.orgimages.html | 92.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.9 Vmware Network Adapter Settings.html | 191.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4 | 110.48 MB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3.1 httpwww.vmware.comproductsworkstationcompare.html.html | 116.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3.2 httpwww.vmware.comproductsplayerfaqsfaqs.html.html | 113.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4 | 144.16 MB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4.1 httpswww.virtualbox.org.html | 88.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali Linux 2018.mp4 | 59.62 MB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.2 Kali on Microsoft App Store as an official WSL.html | 123.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.3 Kali AWS appliance.html | 109.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.4 Kali images for Virtualbox or VMware.html | 150.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.5 Kali Arm hardware.html | 118.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/1. Goals and Learning Objectives.mp4 | 2.44 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.mp4 | 59.76 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4 | 105.53 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11.2 GWX Control Panel.html | 100.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11.4 Never 10 by Steve Gibson (Use this!).html | 92.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Mac - Privacy & Tracking.mp4 | 57.98 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.2 httpsgithub.comkarek314macOS-home-call-drop.html | 109.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.3 Fix Mac OS X.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.4 httpsgithub.comfix-macosxyosemite-phone-home.html | 110.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.5 httpsgithub.comfix-macosxnet-monitor.html | 102.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. Linux and Unix “like” Operating systems.mp4 | 46.23 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.1 httpdistrowatch.com.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.2 httpswww.debian.org.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.3 httpswww.archlinux.org.html | 87.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.4 httpswww.openbsd.org.html | 85.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14.1 Manjaro - httpsmanjaro.org.html | 81.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14.2 Linux Mint - httpslinuxmint.com.html | 83.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14.3 Ubuntu - httpswww.ubuntu.com.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15.1 Debian - httpswww.debian.org.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15.2 Archlinux - httpswww.archlinux.org.html | 87.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15.3 OpenBSD - httpswww.openbsd.org.html | 85.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.1 Qubes OS - httpswww.qubes-os.org.html | 86.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.3 PureOS - httpswww.pureos.net.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.4 Trisquel OS - httpstrisquel.info.html | 83.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.5 Astra Linux - httpastralinux.ru.html | 82.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.6 Subgraph OS - httpssubgraph.comsgos.html | 87.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17.1 Tails OS - httpstails.boum.org.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17.2 Whonix - httpswww.whonix.org.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17.3 Qubes OS - httpswww.qubes-os.org.html | 86.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.1 Kali Linux - httpswww.kali.org.html | 82.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.2 BackBox Linux - httpsbackbox.org.html | 81.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.3 BlackArch Linux - httpsblackarch.org.html | 83.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.4 Pentoo - httpswww.pentoo.ch.html | 83.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.5 Parrot GNULinux - httpswww.parrotsec.org.html | 87.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.1 iOS - httpsdeveloper.apple.comios.html | 93.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.2 PureOS Librem 5 - httpspuri.smshoplibrem-5.html | 91.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.3 Android - httpswww.android.com.html | 85.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.4 OmniROM - httpswww.omnirom.org.html | 85.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.5 LineageOS - httpslineageos.org.html | 83.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.6 MicroG - httpsmicrog.org.html | 80.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.7 Replicant - Httpswww.replicant.us.html | 86.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/2. Security Features and Functionality.mp4 | 57.90 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20.1 Debian Live CDDVD.html | 92.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20.2 Free Debian Books and Guides.html | 93.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20.3 Download Debian.html | 92.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp4 | 83.90 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3.1 Top 50 products vs security bugs.html | 114.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. Usage Share.mp4 | 34.29 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4.1 OS usage share.html | 125.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp4 | 79.95 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5.1 Cortana privacy faq.html | 126.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5.2 Microsoft Privacy Statement.html | 114.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5.3 Microsoft Service Agreement.html | 123.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.mp4 | 67.88 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp4 | 98.43 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Windows 10 – Cortana.mp4 | 41.03 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8.2 How to disable cortana-on Windows 10.html | 147.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8.3 Cortana privacy faq.html | 126.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp4 | 86.47 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9.1 Complete guide windows 10 privacy settings.html | 134.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9.2 SmartScreen Filter FAQ.html | 145.00 B |
7. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.mp4 | 1.66 MB |
7. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.mp4 | 34.02 MB |
7. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.mp4 | 3.57 MB |
7. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.mp4 | 5.64 MB |
7. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.mp4 | 4.31 MB |
7. Security Bugs and Vulnerabilities/2. The Importance of Patching.mp4 | 11.66 MB |
7. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.mp4 | 4.95 MB |
7. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.mp4 | 6.55 MB |
7. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.mp4 | 4.94 MB |
7. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.mp4 | 41.82 MB |
7. Security Bugs and Vulnerabilities/6.1 Patch Tuesday may be dead, but Microsoft's not confessing to the crime.html | 197.00 B |
7. Security Bugs and Vulnerabilities/6.2 Windows 10 Ditches Patch Tuesday for Security's Sake.html | 178.00 B |
7. Security Bugs and Vulnerabilities/6.3 Common Vulnerabilities and Exposures.html | 85.00 B |
7. Security Bugs and Vulnerabilities/6.4 National vulnerability database.html | 85.00 B |
7. Security Bugs and Vulnerabilities/6.5 Microsoft Security Bulletins.html | 115.00 B |
7. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4 | 19.36 MB |
7. Security Bugs and Vulnerabilities/7.1 Flexera Personal Software Inspector - Previously Secunia PSI.html | 174.00 B |
7. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.mp4 | 38.50 MB |
7. Security Bugs and Vulnerabilities/8.1 Software distributions based on Debian.html | 105.00 B |
7. Security Bugs and Vulnerabilities/8.2 Automatic Security Updates.html | 119.00 B |
7. Security Bugs and Vulnerabilities/8.3 Debian Security Page.html | 93.00 B |
7. Security Bugs and Vulnerabilities/9. Mac - Patching.mp4 | 55.59 MB |
7. Security Bugs and Vulnerabilities/9.1 Mac Update.html | 86.00 B |
7. Security Bugs and Vulnerabilities/9.2 Apple security updates.html | 101.00 B |
7. Security Bugs and Vulnerabilities/9.3 igeekblogs - How to enable updates.html | 134.00 B |
7. Security Bugs and Vulnerabilities/9.4 httpbrew.sh.html | 76.00 B |
8. Reducing Threat Privilege/1. Goals and Learning Objectives - Removing Privilege.mp4 | 13.59 MB |
8. Reducing Threat Privilege/2. Windows 7 - Not using admin.mp4 | 11.00 MB |
8. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.mp4 | 18.25 MB |
8. Reducing Threat Privilege/4. Windows 10 - Not using admin.mp4 | 14.15 MB |
9. Social Engineering and Social Media Offence and Defence/1. Goals and Learning Objectives.mp4 | 1.73 MB |
9. Social Engineering and Social Media Offence and Defence/2.1 The complete guide to facebook privacy settings.html | 136.00 B |
9. Social Engineering and Social Media Offence and Defence/2.2 httpsdiasporafoundation.org.html | 92.00 B |
9. Social Engineering and Social Media Offence and Defence/2.3 Twitter Privacy Settings.html | 120.00 B |
9. Social Engineering and Social Media Offence and Defence/2.4 List of Personally Identifiable Information (PII).html | 134.00 B |
9. Social Engineering and Social Media Offence and Defence/2.5 httpsgnu.iosocialtry.html | 87.00 B |
9. Social Engineering and Social Media Offence and Defence/2.6 httpstosdr.org.html | 79.00 B |
9. Social Engineering and Social Media Offence and Defence/2.8 httpfriendica.com.html | 82.00 B |
9. Social Engineering and Social Media Offence and Defence/3. Identify Verification and Registration.mp4 | 23.40 MB |
9. Social Engineering and Social Media Offence and Defence/3.1 httpswww.guerrillamail.com.html | 92.00 B |
9. Social Engineering and Social Media Offence and Defence/3.10 httpwww.dispostable.com.html | 88.00 B |
9. Social Engineering and Social Media Offence and Defence/3.11 httpwww.migmail.net.html | 84.00 B |
9. Social Engineering and Social Media Offence and Defence/3.12 httpsanonbox.net.html | 81.00 B |
9. Social Engineering and Social Media Offence and Defence/3.13 httpgetairmail.com.html | 83.00 B |
9. Social Engineering and Social Media Offence and Defence/3.14 httpcrapmail.dken.html | 83.00 B |
9. Social Engineering and Social Media Offence and Defence/3.15 httpfreemail.ms.html | 80.00 B |
9. Social Engineering and Social Media Offence and Defence/3.16 http10minutemail.com10MinuteMailindex.html.html | 108.00 B |
9. Social Engineering and Social Media Offence and Defence/3.17 httpdontmail.net.html | 81.00 B |
9. Social Engineering and Social Media Offence and Defence/3.2 httpsmailinator.com.html | 84.00 B |
9. Social Engineering and Social Media Offence and Defence/3.3 httpbugmenot.com.html | 81.00 B |
9. Social Engineering and Social Media Offence and Defence/3.4 httpwww.tempinbox.com.html | 85.00 B |
9. Social Engineering and Social Media Offence and Defence/3.5 httpwww.mailexpire.com.html | 87.00 B |
9. Social Engineering and Social Media Offence and Defence/3.6 httpwww.mytrashmail.com.html | 88.00 B |
9. Social Engineering and Social Media Offence and Defence/3.7 httpswww.trash-mail.comen.html | 91.00 B |
9. Social Engineering and Social Media Offence and Defence/3.8 Top 10 sites receive sms online without phone.html | 135.00 B |
9. Social Engineering and Social Media Offence and Defence/3.9 Example SMS recieve online site.html | 96.00 B |
9. Social Engineering and Social Media Offence and Defence/4.1 httpwww.google.com.stationx.net.html | 95.00 B |
9. Social Engineering and Social Media Offence and Defence/4.2 httpwww.urlvoid.com.html | 84.00 B |
9. Social Engineering and Social Media Offence and Defence/5.1 httpswww.parsemail.org.html | 87.00 B |
9. Social Engineering and Social Media Offence and Defence/5.2 httpswhois.domaintools.combbc.co.uk.html | 100.00 B |
9. Social Engineering and Social Media Offence and Defence/5.3 httpswhois.domaintools.comblob.com.html | 99.00 B |
9. Social Engineering and Social Media Offence and Defence/5.4 httpswww.virustotal.comendocumentationemail-submissions.html | 123.00 B |
9. Social Engineering and Social Media Offence and Defence/5.5 How to Get Email Headers.html | 111.00 B |
9. Social Engineering and Social Media Offence and Defence/6.2 httpwww.actionfraud.police.uktypes_of_fraud.html | 108.00 B |
9. Social Engineering and Social Media Offence and Defence/6.3 httpwww.scambusters.org.html | 88.00 B |