Name: | [UDEMY] The Complete Cyber Security Course Hackers Exposed! [FTU] GloDLS |
Description: Volume 1 : Become a Cyber Security Specialist, Learn How to Stop Hackers, Prevent Hacking, Learn IT Security & INFOSEC Created by: Nathan House Last updated: 9/2018 Language: English Caption (CC) Included Torrent Contains: 545 Files, 13 Folders Course Source: https://www.udemy.com/the-complete-internet-security-privacy-course-volume-1/ What you'll learn • An advanced practical skillset in defeating all online threats - advanced hackers, trackers, malware and all Internet nastiness including mitigating government spying and mass surveillance. • Become a cyber security specialist. • The very latest up-to-date information and methods. • We cover operating system security, privacy, and patching - On Windows 7, Windows 8, Windows 10, MacOS and Linux. • Explore the threat landscape - Darknets, dark markets, zero day vulnerabilities, exploit kits, malware, phishing and much more. • You will master encryption in an easy to follow crash course. • Go in-depth into security through physical and virtual isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS. • You will learn about nation state secret tracking and hacking infrastructure. • A certificate of completion is available signed by the instructor Nathan House so CPE credits can be claimed. An off-site sign-up is required to provide your details for this optional certificate. Requirements • A basic understanding of using operating systems, networks, and the Internet. Be able to download and install software. A willingness to learn. • Please note this is Volume 1 of 4 of the complete course. After the completion of all 4 volumes, you will know more than 80% of security professionals, government and law enforcement agents and even expert hackers about maintaining security, privacy, and anonymity. Description Learn a practical skill-set in defeating all online threats, including - advanced hackers, trackers, malware, zero days, exploit kits, cybercriminals and more. Become a Cyber Security Specialist - Go from a beginner to advanced in this easy to follow expert course. Covering all major platforms - Windows 7, Windows 8, Windows 10, MacOS and Linux. This course covers the fundamental building blocks of your required skill set - You will understand the threat and vulnerability landscape through threat modeling and risk assessments. We explore the Darknet and mindset of the cyber criminal. Covering malware, exploit kits, phishing, zero-day vulnerabilities and much more. You will learn about the global tracking and hacking infrastructures that nation states run. Covering the NSA, FBI, CIA, GCHQ, China’s MSS and other intelligence agencies capabilities. You will understand the foundations of operating system security and privacy functionality. A close look at the new Windows 10 privacy issues and how to best mitigate them. There is a complete easy to follow crash course on encryption, how encryption can be bypassed and what you can do to mitigate the risks. Master defenses against phishing, SMShing, vishing, identity theft, scam, cons and other social engineering threats. Finally we cover the extremely important, but underused security control of isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS. This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity. Who this course is for: • This course is for anyone who wants to become an expert in security, privacy, and anonymity. This volume covers the required foundation building blocks of that skillset. • For anyone who would love to gain a practical skillset in mitigating the risk from, malware, Trojans, hackers, tracker, cyber criminals and all online threats. • This course is for anyone who wants to keep their precious files, emails, accounts and personal information out of the hands of the bad guys. • For beginners and intermediate Internet users who are interested in security, safety, and privacy. • For those who want privacy and anonymity online from hackers, corporations and governments. • This course is designed for personal and home Internet security, privacy, and anonymity. Most of the topics apply in the same way to a business, but the course is delivered as if to an individual for personal Internet security, privacy and anonymity. | |
YouTube Video: | |
Category: | Tutorials |
Language: | English |
Total Size: | 4.23 GB |
Info Hash: | 244C45C5163FAD90D78B705E219A6260B1DCA028 |
Added By: | Prom3th3uS |
Date Added: | 2019-02-27 14:30:04 |
Torrent Status: | Torrent Verified |
Ratings: | Not Yet Rated (Log in to rate it) |
URL | Seeders | Leechers | Completed |
---|---|---|---|
https://tracker.fastdownload.xyz:443/announce | 0 | 0 | 0 |
udp://tracker.torrent.eu.org:451/announce | 6 | 2 | 191 |
udp://tracker.cyberia.is:6969/announce | 0 | 0 | 0 |
udp://tracker.leechers-paradise.org:6969/announce | 0 | 0 | 0 |
udp://open.stealth.si:80/announce | 5 | 1 | 29 |
udp://hk1.opentracker.ga:6969/announce | 0 | 0 | 0 |
udp://tracker.cyberia.is:6969/announce | 0 | 0 | 0 |
https://opentracker.xyz:443/announce | 0 | 0 | 0 |
https://t.quic.ws:443/announce | 0 | 0 | 0 |
udp://9.rarbg.to:2710/announce | 0 | 0 | 0 |
udp://tracker.opentrackr.org:1337/announce | 5 | 1 | 159 |
udp://ipv4.tracker.harry.lu:80/announce | 0 | 0 | 0 |
udp://tracker.coppersurfer.tk:6969/announce | 0 | 0 | 0 |
udp://tracker.internetwarriors.net:1337/announce | 5 | 1 | 10 |
udp://open.demonii.si:1337/announce | 0 | 0 | 0 |
File | Size |
---|---|
1. Introduction/1. Welcome and Introduction to the Instructor!.mp4 | 22.95 MB |
1. Introduction/1. Welcome and Introduction to the Instructor!.vtt | 1.88 kB |
1. Introduction/1.1 Nathan's Cyber Security Blog.html | 99.00 B |
1. Introduction/1.2 Nathan's Twitter #GotoNathan.html | 91.00 B |
1. Introduction/2. Security Quick Win!.mp4 | 43.20 MB |
1. Introduction/2. Security Quick Win!.vtt | 15.27 kB |
1. Introduction/2.1 httpswww.stationx.netcanarytokens.html | 99.00 B |
1. Introduction/3. Goals and Learning Objectives - Volume 1.mp4 | 16.11 MB |
1. Introduction/3. Goals and Learning Objectives - Volume 1.vtt | 2.55 kB |
1. Introduction/4. Target Audience.mp4 | 7.33 MB |
1. Introduction/4. Target Audience.vtt | 3.23 kB |
1. Introduction/5. Study Recommendations.mp4 | 70.67 MB |
1. Introduction/5. Study Recommendations.vtt | 6.48 kB |
1. Introduction/6. Course updates.mp4 | 4.39 MB |
1. Introduction/6. Course updates.vtt | 787.00 B |
10. Security Domains/1. Goals and Learning Objectives.mp4 | 1.43 MB |
10. Security Domains/1. Goals and Learning Objectives.vtt | 463.00 B |
10. Security Domains/2. Security Domains.mp4 | 21.84 MB |
10. Security Domains/2. Security Domains.vtt | 15.14 kB |
11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.mp4 | 2.30 MB |
11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.vtt | 758.00 B |
11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.mp4 | 13.85 MB |
11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.vtt | 3.58 kB |
11. Security Through Isolation and Compartmentalization/10.1 Script Sandfox.html | 118.00 B |
11. Security Through Isolation and Compartmentalization/10.2 Linux Sandbox.html | 96.00 B |
11. Security Through Isolation and Compartmentalization/10.3 Trusted BSD.html | 87.00 B |
11. Security Through Isolation and Compartmentalization/10.4 Firejail.html | 92.00 B |
11. Security Through Isolation and Compartmentalization/10.5 Apparmor.html | 105.00 B |
11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.mp4 | 23.80 MB |
11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.vtt | 7.54 kB |
11. Security Through Isolation and Compartmentalization/11.1 Mac OS X - App Sandbox.html | 193.00 B |
11. Security Through Isolation and Compartmentalization/11.2 Buckle Up.html | 97.00 B |
11. Security Through Isolation and Compartmentalization/11.3 OSX-Sandbox--Seatbelt--Profiles.html | 119.00 B |
11. Security Through Isolation and Compartmentalization/11.4 Sandbox Man page.html | 165.00 B |
11. Security Through Isolation and Compartmentalization/11.5 Firefox profile.html | 132.00 B |
11. Security Through Isolation and Compartmentalization/11.6 Apple Sandbox Guide.html | 139.00 B |
11. Security Through Isolation and Compartmentalization/11.7 SuperDuper.html | 127.00 B |
11. Security Through Isolation and Compartmentalization/11.8 How to run your Applications in a Mac OS X sandbox to enhance security.html | 176.00 B |
11. Security Through Isolation and Compartmentalization/12. Virtual Machines.mp4 | 44.44 MB |
11. Security Through Isolation and Compartmentalization/12. Virtual Machines.vtt | 17.10 kB |
11. Security Through Isolation and Compartmentalization/12.1 Wikipedia - Hypervisor.html | 101.00 B |
11. Security Through Isolation and Compartmentalization/12.2 Wikipedia - Kernel-based Virtual Machine.html | 119.00 B |
11. Security Through Isolation and Compartmentalization/12.3 Virt Manager.html | 86.00 B |
11. Security Through Isolation and Compartmentalization/12.4 OpenVZ.html | 90.00 B |
11. Security Through Isolation and Compartmentalization/12.5 KVM Debian Jessie.html | 98.00 B |
11. Security Through Isolation and Compartmentalization/12.6 Turnkey Linux - Openvpn.html | 97.00 B |
11. Security Through Isolation and Compartmentalization/12.7 Wikipedia - Comparison of platform virtualization software.html | 137.00 B |
11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.mp4 | 22.74 MB |
11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.vtt | 14.92 kB |
11. Security Through Isolation and Compartmentalization/13.1 Exploiting dram rowhammer (Could be used on VMs in the future).html | 152.00 B |
11. Security Through Isolation and Compartmentalization/13.2 Example VMware security bug.html | 123.00 B |
11. Security Through Isolation and Compartmentalization/13.3 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html | 110.00 B |
11. Security Through Isolation and Compartmentalization/13.4 httpsen.wikipedia.orgwikiTiming_channel.html | 105.00 B |
11. Security Through Isolation and Compartmentalization/13.5 httpsen.wikipedia.orgwikiCovert_channel.html | 105.00 B |
11. Security Through Isolation and Compartmentalization/13.6 httpsen.wikipedia.orgwikiX86_virtualization.html | 109.00 B |
11. Security Through Isolation and Compartmentalization/13.7 Venom.html | 90.00 B |
11. Security Through Isolation and Compartmentalization/13.8 A look at malware with VM detection.html | 161.00 B |
11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.mp4 | 36.96 MB |
11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.vtt | 13.06 kB |
11. Security Through Isolation and Compartmentalization/14.1 Convert VM to ISO.html | 109.00 B |
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4 | 88.65 MB |
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.vtt | 27.52 kB |
11. Security Through Isolation and Compartmentalization/15.1 Whonix Features.html | 97.00 B |
11. Security Through Isolation and Compartmentalization/15.2 Whonix and virtualbox.html | 99.00 B |
11. Security Through Isolation and Compartmentalization/15.3 httpswww.whonix.org.html | 84.00 B |
11. Security Through Isolation and Compartmentalization/15.4 Whonix Stream Isolation.html | 105.00 B |
11. Security Through Isolation and Compartmentalization/15.5 ARM - Anonymizing relay monitor.html | 108.00 B |
11. Security Through Isolation and Compartmentalization/15.6 If setting up your own workstations - MUST READ.html | 112.00 B |
11. Security Through Isolation and Compartmentalization/15.7 How to implement physical isolation.html | 131.00 B |
11. Security Through Isolation and Compartmentalization/15.8 Whonix Check.html | 100.00 B |
11. Security Through Isolation and Compartmentalization/15.9 Whonix VM snapshots.html | 116.00 B |
11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.mp4 | 15.78 MB |
11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.vtt | 6.24 kB |
11. Security Through Isolation and Compartmentalization/16.1 Whonix - Warnings.html | 96.00 B |
11. Security Through Isolation and Compartmentalization/16.2 Whonix's lack of an Amnesic feature.html | 190.00 B |
11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4 | 78.73 MB |
11. Security Through Isolation and Compartmentalization/17. Qubes OS.vtt | 26.33 kB |
11. Security Through Isolation and Compartmentalization/17.1 Debian template(s).html | 107.00 B |
11. Security Through Isolation and Compartmentalization/17.10 Video Tour of Qubes.html | 91.00 B |
11. Security Through Isolation and Compartmentalization/17.2 Hardware Compatibility List (HCL).html | 90.00 B |
11. Security Through Isolation and Compartmentalization/17.3 Qubes docs.html | 90.00 B |
11. Security Through Isolation and Compartmentalization/17.4 Librem 13 laptop.html | 105.00 B |
11. Security Through Isolation and Compartmentalization/17.5 Qubes Download.html | 96.00 B |
11. Security Through Isolation and Compartmentalization/17.6 Whonix templates.html | 105.00 B |
11. Security Through Isolation and Compartmentalization/17.7 Windows templates.html | 108.00 B |
11. Security Through Isolation and Compartmentalization/17.8 Disposable VMs (DispVMs).html | 97.00 B |
11. Security Through Isolation and Compartmentalization/17.9 Split GPG.html | 100.00 B |
11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.mp4 | 14.97 MB |
11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.vtt | 6.55 kB |
11. Security Through Isolation and Compartmentalization/18.1 Partitioning my digital life into security domains.html | 145.00 B |
11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.mp4 | 5.66 MB |
11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.vtt | 3.04 kB |
11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.mp4 | 25.57 MB |
11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.vtt | 9.91 kB |
11. Security Through Isolation and Compartmentalization/3.1 Mac OS X - Macdaddyx.html | 109.00 B |
11. Security Through Isolation and Compartmentalization/3.2 Windows - Tmac.html | 89.00 B |
11. Security Through Isolation and Compartmentalization/3.3 Mac OS X - Wifispoof.html | 83.00 B |
11. Security Through Isolation and Compartmentalization/3.4 Diagram of Mac.html | 131.00 B |
11. Security Through Isolation and Compartmentalization/3.5 Mac OS X - How to change the mac address.html | 141.00 B |
11. Security Through Isolation and Compartmentalization/3.6 Linux - How to use macchanger.html | 132.00 B |
11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.mp4 | 50.25 MB |
11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.vtt | 15.96 kB |
11. Security Through Isolation and Compartmentalization/4.1 Mac OS X - Installing dmidecode with brew.html | 119.00 B |
11. Security Through Isolation and Compartmentalization/4.2 Windows - CPU Z.html | 103.00 B |
11. Security Through Isolation and Compartmentalization/4.3 Linux and Mac OS X - dmidecode.html | 93.00 B |
11. Security Through Isolation and Compartmentalization/4.4 Windows - dmidecode.html | 115.00 B |
11. Security Through Isolation and Compartmentalization/4.5 httpswww.nitrokey.com.html | 87.00 B |
11. Security Through Isolation and Compartmentalization/4.6 Mac OS X - Mac Cupid.html | 120.00 B |
11. Security Through Isolation and Compartmentalization/4.7 httpswww.yubico.com.html | 84.00 B |
11. Security Through Isolation and Compartmentalization/4.8 Linux - i-nex.html | 88.00 B |
11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.mp4 | 57.31 MB |
11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.vtt | 12.84 kB |
11. Security Through Isolation and Compartmentalization/5.1 Portable Apps.html | 85.00 B |
11. Security Through Isolation and Compartmentalization/5.2 Authentic8.html | 97.00 B |
11. Security Through Isolation and Compartmentalization/5.3 Maxthon.html | 84.00 B |
11. Security Through Isolation and Compartmentalization/5.4 Aegis Secure Key - USB 2.0 Flash Drive.html | 108.00 B |
11. Security Through Isolation and Compartmentalization/5.5 Spikes.html | 91.00 B |
11. Security Through Isolation and Compartmentalization/5.6 Pen Drive Apps.html | 89.00 B |
11. Security Through Isolation and Compartmentalization/5.7 Spoons.net.html | 88.00 B |
11. Security Through Isolation and Compartmentalization/6. Dual Boot.mp4 | 7.92 MB |
11. Security Through Isolation and Compartmentalization/6. Dual Boot.vtt | 4.42 kB |
11. Security Through Isolation and Compartmentalization/6.1 Dual Booting explained.html | 177.00 B |
11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.mp4 | 10.41 MB |
11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.vtt | 4.43 kB |
11. Security Through Isolation and Compartmentalization/7.1 Chromium sandbox design.html | 121.00 B |
11. Security Through Isolation and Compartmentalization/7.2 Mozilla Sandbox design.html | 102.00 B |
11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.mp4 | 26.36 MB |
11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.vtt | 8.78 kB |
11. Security Through Isolation and Compartmentalization/8.1 Deepfreeze Cloud Browser and Desktop.html | 129.00 B |
11. Security Through Isolation and Compartmentalization/8.2 BufferZone.html | 112.00 B |
11. Security Through Isolation and Compartmentalization/8.3 Comodo.html | 110.00 B |
11. Security Through Isolation and Compartmentalization/8.4 Shadowdefender.html | 91.00 B |
11. Security Through Isolation and Compartmentalization/8.5 f-sandbox.html | 92.00 B |
11. Security Through Isolation and Compartmentalization/8.6 Returnil.html | 118.00 B |
11. Security Through Isolation and Compartmentalization/8.7 Deepfreeze Standard.html | 121.00 B |
11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4 | 70.11 MB |
11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.vtt | 15.22 kB |
11. Security Through Isolation and Compartmentalization/9.1 Sandboxie How it Works.html | 106.00 B |
11. Security Through Isolation and Compartmentalization/9.2 Introduction and quick guide sandboxie.html | 143.00 B |
11. Security Through Isolation and Compartmentalization/9.3 Sandboxie forum.html | 96.00 B |
11. Security Through Isolation and Compartmentalization/9.4 Sandboxie guide.html | 118.00 B |
12. Wrap Up/1. Congratulations.mp4 | 14.30 MB |
12. Wrap Up/1. Congratulations.vtt | 1.43 kB |
12. Wrap Up/1.1 Link to The Complete Cyber Security Course - Volume II - Network security + discount coupon studentdiscount25.html | 136.00 B |
12. Wrap Up/2. Certificate Of Completion for CPEs.mp4 | 12.88 MB |
12. Wrap Up/2. Certificate Of Completion for CPEs.vtt | 1.12 kB |
12. Wrap Up/2.1 httpswww.stationx.netcertificate-request.html | 106.00 B |
12. Wrap Up/3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4 | 48.08 MB |
12. Wrap Up/3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).vtt | 21.59 kB |
12. Wrap Up/4. Sample from Vol 2 - Password cracking part 2.mp4 | 24.15 MB |
12. Wrap Up/4. Sample from Vol 2 - Password cracking part 2.vtt | 11.74 kB |
12. Wrap Up/5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4 | 31.75 MB |
12. Wrap Up/5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.vtt | 21.23 kB |
12. Wrap Up/6. Sample from Vol 4 - Email clients, protocols and authentication.mp4 | 38.19 MB |
12. Wrap Up/6. Sample from Vol 4 - Email clients, protocols and authentication.vtt | 19.41 kB |
13. BONUS Section/1. BONUS DISCOUNT COUPONS.html | 4.95 kB |
2. know Yourself - The Threat and Vulnerability Landscape/1. Theory and Practical.mp4 | 15.07 MB |
2. know Yourself - The Threat and Vulnerability Landscape/1. Theory and Practical.vtt | 1.35 kB |
2. know Yourself - The Threat and Vulnerability Landscape/10. Defense In Depth.mp4 | 2.99 MB |
2. know Yourself - The Threat and Vulnerability Landscape/10. Defense In Depth.vtt | 1.59 kB |
2. know Yourself - The Threat and Vulnerability Landscape/11. The Zero Trust Model.mp4 | 10.27 MB |
2. know Yourself - The Threat and Vulnerability Landscape/11. The Zero Trust Model.vtt | 4.27 kB |
2. know Yourself - The Threat and Vulnerability Landscape/2. Goals and Learning Objectives.mp4 | 6.99 MB |
2. know Yourself - The Threat and Vulnerability Landscape/2. Goals and Learning Objectives.vtt | 905.00 B |
2. know Yourself - The Threat and Vulnerability Landscape/3. Protect What You Value.mp4 | 23.67 MB |
2. know Yourself - The Threat and Vulnerability Landscape/3. Protect What You Value.vtt | 4.76 kB |
2. know Yourself - The Threat and Vulnerability Landscape/4. What is Privacy, Anonymity and Pseudonymity.mp4 | 11.87 MB |
2. know Yourself - The Threat and Vulnerability Landscape/4. What is Privacy, Anonymity and Pseudonymity.vtt | 5.07 kB |
2. know Yourself - The Threat and Vulnerability Landscape/5. Security, Vulnerabilities, Threats and Adversaries.mp4 | 11.24 MB |
2. know Yourself - The Threat and Vulnerability Landscape/5. Security, Vulnerabilities, Threats and Adversaries.vtt | 4.65 kB |
2. know Yourself - The Threat and Vulnerability Landscape/5.1 The Cyber Security Landscape Diagram.jpg.jpg | 777.15 kB |
2. know Yourself - The Threat and Vulnerability Landscape/6. Asset Selection.mp4 | 7.68 MB |
2. know Yourself - The Threat and Vulnerability Landscape/6. Asset Selection.vtt | 3.55 kB |
2. know Yourself - The Threat and Vulnerability Landscape/6.1 httpswww.stationx.netsabsa.html | 92.00 B |
2. know Yourself - The Threat and Vulnerability Landscape/6.2 httpswww.iso.orgstandard56742.html.html | 100.00 B |
2. know Yourself - The Threat and Vulnerability Landscape/6.3 httpswww.securityforum.org.html | 91.00 B |
2. know Yourself - The Threat and Vulnerability Landscape/7. Threat Modeling and Risk Assessments.mp4 | 18.03 MB |
2. know Yourself - The Threat and Vulnerability Landscape/7. Threat Modeling and Risk Assessments.vtt | 9.18 kB |
2. know Yourself - The Threat and Vulnerability Landscape/8. Security vs Privacy vs Anonymity - Can we have it all.mp4 | 5.43 MB |
2. know Yourself - The Threat and Vulnerability Landscape/8. Security vs Privacy vs Anonymity - Can we have it all.vtt | 2.52 kB |
2. know Yourself - The Threat and Vulnerability Landscape/9. Confidentiality, Integrity and Availability - (Security Attributes).mp4 | 19.34 MB |
2. know Yourself - The Threat and Vulnerability Landscape/9. Confidentiality, Integrity and Availability - (Security Attributes).vtt | 10.37 kB |
2. know Yourself - The Threat and Vulnerability Landscape/9.1 httpswww.stationx.netsabsa.html | 92.00 B |
2. know Yourself - The Threat and Vulnerability Landscape/9.2 httpsen.wikipedia.orgwikiAuthentication.html | 105.00 B |
2. know Yourself - The Threat and Vulnerability Landscape/9.3 httpsen.wikipedia.orgwikiParkerian_Hexad.html | 106.00 B |
2. know Yourself - The Threat and Vulnerability Landscape/9.4 httpwhatis.techtarget.comdefinitionConfidentiality-integrity-and-availability-CIA.html | 147.00 B |
2. know Yourself - The Threat and Vulnerability Landscape/9.5 httpsen.wikipedia.orgwikiNon-repudiation.html | 106.00 B |
2. know Yourself - The Threat and Vulnerability Landscape/9.6 httpsen.wikipedia.orgwikiAuthorization.html | 104.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/1. Goals and Learning Objectives.mp4 | 2.90 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/1. Goals and Learning Objectives.vtt | 1.09 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10. Social engineering - Scams, cons, tricks and fraud.mp4 | 11.91 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10. Social engineering - Scams, cons, tricks and fraud.vtt | 5.94 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.1 httpwww.actionfraud.police.uktypes_of_fraud.html | 108.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.2 Top 10 scams.html | 127.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.3 httpwww.consumerfraudreporting.org.html | 98.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 | 16.19 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.vtt | 9.64 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.1 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html | 136.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html | 116.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.5 httpsthehackernews.com201802cryptojacking-malware.html.html | 121.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.6 httpscoinhive.com.html | 82.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.7 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html | 122.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.8 httpsgithub.comhoshsadiqadblock-nocoin-list.html | 110.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. Darknets, Dark Markets and Exploit kits.mp4 | 32.43 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. Darknets, Dark Markets and Exploit kits.vtt | 8.24 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html | 121.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/13. Governments, spies and secret stuff part I.mp4 | 27.02 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/13. Governments, spies and secret stuff part I.vtt | 5.91 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Governments, spies and secret stuff part II.mp4 | 30.23 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Governments, spies and secret stuff part II.vtt | 10.72 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.1 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html | 104.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.2 httpsnsa.gov1.infodninsa-ant-catalog.html | 103.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.3 httpstheintercept.com.html | 86.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.4 httpscryptome.org201401nsa-codenames.htm.html | 107.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.5 httpswikileaks.org-Leaks-.html.html | 95.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.6 httpwww.nsaplayset.org.html | 87.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. Regulating encryption, mandating insecurity & legalizing spying.mp4 | 42.74 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. Regulating encryption, mandating insecurity & legalizing spying.vtt | 15.78 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.1 Clipper chip.html | 192.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.10 Matt Blaze Speaking to a US congressional committee.html | 107.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.11 httpwww.crypto.compapersgovernmentreform-blaze2015.pdf.html | 120.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.12 A Worldwide Survey of E ncryption Products - xls.html | 154.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.13 UK data communications bill.html | 121.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.2 WhatsApp was Banned for 48 Hours in Brazil.html | 112.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.4 The Case against Regulating Encryption Technology.html | 112.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.5 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html | 137.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.6 A Worldwide Survey of Encryption Products - pdf.html | 153.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.7 Kazakhstans new encryption law.html | 185.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.mp4 | 24.48 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.vtt | 11.01 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.1 Examples of backdoors.html | 123.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.3 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html | 133.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.4 httpsreproducible-builds.org.html | 93.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.5 Apple removes malware infected apps from the app store.html | 165.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.6 Apple backdoor order.html | 112.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.7 Formal methods.html | 105.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.8 Video on how to build your own software reproducibly.html | 142.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. Censorship.mp4 | 6.49 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. Censorship.vtt | 2.73 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17.1 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html | 129.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html | 132.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. Cyber Threat Intelligence – Stay Informed.mp4 | 2.62 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. Cyber Threat Intelligence – Stay Informed.vtt | 1.07 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18.1 httpwww.stationx.netalerts.html | 91.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. Why You Need Security – The Value Of A Hack.mp4 | 28.93 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. Why You Need Security – The Value Of A Hack.vtt | 5.90 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html | 137.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html | 132.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. The Top 3 Things You Need To Stay Safe Online.mp4 | 2.51 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. The Top 3 Things You Need To Stay Safe Online.vtt | 1.45 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3.1 httpsresearch.google.compubspub43963.html.html | 107.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 | 38.11 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.vtt | 10.62 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.1 Exploit Kit Landscape Map.html | 99.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.2 CVE details.html | 88.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.3 httpswww.exploit-db.comsearch.html | 95.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/5. Hackers, crackers and cyber criminals.mp4 | 7.70 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/5. Hackers, crackers and cyber criminals.vtt | 2.99 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware, viruses, rootkits and RATs.mp4 | 12.15 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware, viruses, rootkits and RATs.vtt | 7.27 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.1 SophosLabs 2018 Malware Forecast.html | 162.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.2 Chef Jamie Oliver’s website hacked for the third time.html | 106.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.3 Malware stats.html | 107.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.4 Report - Spotlight perils of malvertisements.html | 142.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.5 7 most common RATs.html | 149.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 | 10.78 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.vtt | 5.33 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/7.4 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html | 135.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. What is Phishing, Vishing and SMShing.mp4 | 25.98 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. What is Phishing, Vishing and SMShing.vtt | 15.35 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8.1 Homograph attack using internationalized domain name.html | 134.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8.2 XSS example vulnerability.html | 136.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8.3 Live phishing links.html | 87.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spamming & Doxing.mp4 | 4.79 MB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spamming & Doxing.vtt | 3.51 kB |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9.1 Spam stats.html | 104.00 B |
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9.2 Spam example.html | 142.00 B |
4. Encryption Crash Course/1. Goals and Learning Objectives.mp4 | 1.63 MB |
4. Encryption Crash Course/1. Goals and Learning Objectives.vtt | 592.00 B |
4. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4 | 199.30 MB |
4. Encryption Crash Course/10. Certificate Authorities and HTTPS.vtt | 16.46 kB |
4. Encryption Crash Course/10.1 CA example mistake.html | 180.00 B |
4. Encryption Crash Course/10.2 SSL Sniff.html | 107.00 B |
4. Encryption Crash Course/10.3 Cert Fingerprints.html | 97.00 B |
4. Encryption Crash Course/10.4 Certificate patrol.html | 127.00 B |
4. Encryption Crash Course/10.5 CA Ecosystem.html | 105.00 B |
4. Encryption Crash Course/11. End-to-End Encryption (E2EE).mp4 | 8.18 MB |
4. Encryption Crash Course/11. End-to-End Encryption (E2EE).vtt | 2.00 kB |
4. Encryption Crash Course/12. Steganography.mp4 | 104.31 MB |
4. Encryption Crash Course/12. Steganography.vtt | 8.60 kB |
4. Encryption Crash Course/12.1 OpenPuff Manual.html | 107.00 B |
4. Encryption Crash Course/12.2 List of Steg Tools.html | 105.00 B |
4. Encryption Crash Course/12.3 httpwww.spammimic.com.html | 85.00 B |
4. Encryption Crash Course/12.4 OpenPuff.html | 116.00 B |
4. Encryption Crash Course/13. How Security and Encryption is Really Attacked.mp4 | 17.37 MB |
4. Encryption Crash Course/13. How Security and Encryption is Really Attacked.vtt | 3.09 kB |
4. Encryption Crash Course/13.1 Security Pitfalls.html | 135.00 B |
4. Encryption Crash Course/2. Symmetric Encryption.mp4 | 32.30 MB |
4. Encryption Crash Course/2. Symmetric Encryption.vtt | 9.99 kB |
4. Encryption Crash Course/3. Asymmetric Encryption.mp4 | 72.31 MB |
4. Encryption Crash Course/3. Asymmetric Encryption.vtt | 11.46 kB |
4. Encryption Crash Course/4. Hash Functions.mp4 | 89.23 MB |
4. Encryption Crash Course/4. Hash Functions.vtt | 6.30 kB |
4. Encryption Crash Course/4.1 Example hashes.html | 104.00 B |
4. Encryption Crash Course/5. Digital Signatures.mp4 | 42.74 MB |
4. Encryption Crash Course/5. Digital Signatures.vtt | 5.08 kB |
4. Encryption Crash Course/5.1 httpswww.symantec.comenukcode-signing.html | 107.00 B |
4. Encryption Crash Course/5.2 Windows 10 Device Guard using Digital Signatures.html | 174.00 B |
4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 | 160.85 MB |
4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).vtt | 13.65 kB |
4. Encryption Crash Course/6.1 Weakdh Cipher Suite Recommendations.html | 93.00 B |
4. Encryption Crash Course/6.2 Mozilla Cipher Suite Recommendations.html | 110.00 B |
4. Encryption Crash Course/6.3 Wikipedia Transport Layer Security (TLS) page.html | 115.00 B |
4. Encryption Crash Course/6.4 Steve Gibson's Cipher Suite Recommendations.html | 117.00 B |
4. Encryption Crash Course/7. SSL Stripping.mp4 | 114.52 MB |
4. Encryption Crash Course/7. SSL Stripping.vtt | 13.34 kB |
4. Encryption Crash Course/7.1 SSL Strip tool By Moxie Marlinspike.html | 107.00 B |
4. Encryption Crash Course/7.2 sniffdet - Remote Sniffer Detection ToolLibrary.html | 93.00 B |
4. Encryption Crash Course/7.3 WIFI Pineapple.html | 91.00 B |
4. Encryption Crash Course/7.4 Arpwatch Tool to Monitor Ethernet Activity in Linux.html | 119.00 B |
4. Encryption Crash Course/7.5 Intro to Sniffers.html | 127.00 B |
4. Encryption Crash Course/7.6 Cain & Abel.html | 89.00 B |
4. Encryption Crash Course/8. HTTPS (HTTP Secure).mp4 | 81.90 MB |
4. Encryption Crash Course/8. HTTPS (HTTP Secure).vtt | 6.98 kB |
4. Encryption Crash Course/8.1 Server Name Indication (SNI) Wiki.html | 113.00 B |
4. Encryption Crash Course/9. Digital Certificates.mp4 | 81.96 MB |
4. Encryption Crash Course/9. Digital Certificates.vtt | 6.13 kB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/1. Goals and Learning Objectives.mp4 | 1.84 MB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/1. Goals and Learning Objectives.vtt | 704.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 | 113.36 MB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.vtt | 10.77 kB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.1 httpwww.osboxes.orgvmware-images.html | 98.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.10 Vmware Network Adapter Settings.html | 191.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.11 httpsen.wikipedia.orgwikiHypervisor.html | 101.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.2 Windows VMs here.html | 124.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.3 httpsen.wikipedia.orgwikiComparison_of_platform_virtualization_software.html | 137.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.4 httpwww.osboxes.orgguide#!.html | 92.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.5 httpwww.osboxes.orgvirtualbox-images.html | 102.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.6 httpvirtual-machine.org.html | 88.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.7 httpsmarketplace.vmware.com.html | 92.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.8 httpvirtualboxes.orgimages.html | 92.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.9 Virtualbox Network Adapter Settings.html | 104.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4 | 110.48 MB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.vtt | 10.66 kB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3.1 httpwww.vmware.comproductsworkstationcompare.html.html | 116.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3.2 httpwww.vmware.comproductsplayerfaqsfaqs.html.html | 113.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4 | 144.15 MB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.vtt | 10.82 kB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4.1 httpswww.virtualbox.org.html | 88.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali Linux 2018.mp4 | 59.62 MB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali Linux 2018.vtt | 4.77 kB |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.2 Kali on Microsoft App Store as an official WSL.html | 123.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.3 Kali Arm hardware.html | 118.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.4 Kali AWS appliance.html | 109.00 B |
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.5 Kali images for Virtualbox or VMware.html | 150.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/1. Goals and Learning Objectives.mp4 | 2.43 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/1. Goals and Learning Objectives.vtt | 852.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.mp4 | 59.76 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.vtt | 4.85 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4 | 105.53 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.vtt | 7.71 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11.1 Microsoft - How to manage Windows 10 notification and upgrade options.html | 107.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11.2 Never 10 by Steve Gibson (Use this!).html | 92.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11.3 GWX Control Panel.html | 100.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Mac - Privacy & Tracking.mp4 | 57.97 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Mac - Privacy & Tracking.vtt | 5.11 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.1 Fix Mac OS X.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.2 httpsgithub.comfix-macosxnet-monitor.html | 102.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.3 httpsgithub.comkarek314macOS-home-call-drop.html | 109.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.4 httpsgithub.comfix-macosxyosemite-phone-home.html | 110.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.5 Washingtonpost - How apples os x yosemite tracks-you.html | 213.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. Linux and Unix “like” Operating systems.mp4 | 46.23 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. Linux and Unix “like” Operating systems.vtt | 3.79 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.1 httpdistrowatch.com.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.2 httpswww.openbsd.org.html | 85.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.3 httpswww.debian.org.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.4 httpswww.archlinux.org.html | 87.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14. General Use Operating Systems (Windows, MacOS and Linux).mp4 | 46.91 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14. General Use Operating Systems (Windows, MacOS and Linux).vtt | 5.01 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14.1 Ubuntu - httpswww.ubuntu.com.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14.2 Manjaro - httpsmanjaro.org.html | 81.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14.3 Linux Mint - httpslinuxmint.com.html | 83.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15.1 OpenBSD - httpswww.openbsd.org.html | 85.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15.2 Debian - httpswww.debian.org.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15.3 Archlinux - httpswww.archlinux.org.html | 87.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.1 Security-Enhanced Linux (SELinux) - httpsgithub.comSELinuxProject.html | 94.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.2 Subgraph OS - httpssubgraph.comsgos.html | 87.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.3 Hardened Gentoo Linux - httpswiki.gentoo.orgwikiProjectHardened.html | 106.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.4 PureOS - httpswww.pureos.net.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.5 Astra Linux - httpastralinux.ru.html | 82.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.6 Trisquel OS - httpstrisquel.info.html | 83.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.7 Qubes OS - httpswww.qubes-os.org.html | 86.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4 | 21.55 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17. Anonymity Focused Operating Systems (Tails and Whonix OS).vtt | 3.53 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17.1 Qubes OS - httpswww.qubes-os.org.html | 86.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17.2 Tails OS - httpstails.boum.org.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17.3 Whonix - httpswww.whonix.org.html | 84.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4 | 13.38 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. Penetration Testing and Ethical Hacking Focused Operating Systems.vtt | 1.15 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.1 Kali Linux - httpswww.kali.org.html | 82.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.2 BackBox Linux - httpsbackbox.org.html | 81.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.3 Pentoo - httpswww.pentoo.ch.html | 83.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.4 Parrot GNULinux - httpswww.parrotsec.org.html | 87.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.5 BlackArch Linux - httpsblackarch.org.html | 83.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.1 Android - httpswww.android.com.html | 85.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.2 MicroG - httpsmicrog.org.html | 80.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.3 iOS - httpsdeveloper.apple.comios.html | 93.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.4 OmniROM - httpswww.omnirom.org.html | 85.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.5 LineageOS - httpslineageos.org.html | 83.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.6 PureOS Librem 5 - httpspuri.smshoplibrem-5.html | 91.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.7 Replicant - Httpswww.replicant.us.html | 86.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/2. Security Features and Functionality.mp4 | 57.89 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/2. Security Features and Functionality.vtt | 6.88 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 | 57.77 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.vtt | 5.78 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20.1 Debian Live CDDVD.html | 92.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20.2 Download Debian.html | 92.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20.3 Free Debian Books and Guides.html | 93.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp4 | 83.89 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.vtt | 6.17 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3.1 Top 50 products vs security bugs.html | 114.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3.2 Report - Buying Into the Bias Why Vulnerability Statistics Suck.html | 168.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. Usage Share.mp4 | 34.28 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. Usage Share.vtt | 5.53 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4.1 OS usage share.html | 125.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp4 | 79.95 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.vtt | 6.96 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5.2 Microsoft Privacy Statement.html | 114.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5.3 Microsoft Service Agreement.html | 123.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5.4 Cortana privacy faq.html | 126.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.mp4 | 67.89 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.vtt | 5.67 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html | 117.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp4 | 98.43 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.vtt | 7.63 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html | 117.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Windows 10 – Cortana.mp4 | 41.02 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Windows 10 – Cortana.vtt | 3.80 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8.1 How to disable cortana-on Windows 10.html | 147.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8.2 Cortana privacy faq.html | 126.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8.3 How to Disable Cortana in Windows 10’s Anniversary Update.html | 130.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp4 | 86.46 MB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.vtt | 9.65 kB |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9.1 Complete guide windows 10 privacy settings.html | 134.00 B |
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9.2 SmartScreen Filter FAQ.html | 145.00 B |
7. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.mp4 | 1.66 MB |
7. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.vtt | 584.00 B |
7. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.mp4 | 34.01 MB |
7. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.vtt | 5.96 kB |
7. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.mp4 | 3.57 MB |
7. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.vtt | 1.75 kB |
7. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.mp4 | 8.66 MB |
7. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.vtt | 1.02 kB |
7. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.mp4 | 4.30 MB |
7. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.vtt | 2.67 kB |
7. Security Bugs and Vulnerabilities/2. The Importance of Patching.mp4 | 43.71 MB |
7. Security Bugs and Vulnerabilities/2. The Importance of Patching.vtt | 5.84 kB |
7. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.mp4 | 4.94 MB |
7. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.vtt | 1.63 kB |
7. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.mp4 | 6.54 MB |
7. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.vtt | 1.84 kB |
7. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.mp4 | 4.93 MB |
7. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.vtt | 1.73 kB |
7. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.mp4 | 41.81 MB |
7. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.vtt | 4.09 kB |
7. Security Bugs and Vulnerabilities/6.1 Windows 10 Ditches Patch Tuesday for Security's Sake.html | 178.00 B |
7. Security Bugs and Vulnerabilities/6.2 Microsoft Security Bulletins.html | 115.00 B |
7. Security Bugs and Vulnerabilities/6.3 Patch Tuesday may be dead, but Microsoft's not confessing to the crime.html | 197.00 B |
7. Security Bugs and Vulnerabilities/6.4 National vulnerability database.html | 85.00 B |
7. Security Bugs and Vulnerabilities/6.5 Common Vulnerabilities and Exposures.html | 85.00 B |
7. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4 | 19.35 MB |
7. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.vtt | 10.96 kB |
7. Security Bugs and Vulnerabilities/7.1 Flexera Personal Software Inspector - Previously Secunia PSI.html | 174.00 B |
7. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.mp4 | 38.50 MB |
7. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.vtt | 15.21 kB |
7. Security Bugs and Vulnerabilities/8.1 Software distributions based on Debian.html | 105.00 B |
7. Security Bugs and Vulnerabilities/8.2 Debian Security Page.html | 93.00 B |
7. Security Bugs and Vulnerabilities/8.3 Automatic Security Updates.html | 119.00 B |
7. Security Bugs and Vulnerabilities/9. Mac - Patching.mp4 | 55.58 MB |
7. Security Bugs and Vulnerabilities/9. Mac - Patching.vtt | 9.23 kB |
7. Security Bugs and Vulnerabilities/9.1 httpbrew.sh.html | 76.00 B |
7. Security Bugs and Vulnerabilities/9.2 igeekblogs - How to enable updates.html | 134.00 B |
7. Security Bugs and Vulnerabilities/9.3 Apple security updates.html | 101.00 B |
7. Security Bugs and Vulnerabilities/9.4 Mac Update.html | 86.00 B |
8. Reducing Threat Privilege/1. Goals and Learning Objectives - Removing Privilege.mp4 | 13.59 MB |
8. Reducing Threat Privilege/1. Goals and Learning Objectives - Removing Privilege.vtt | 3.72 kB |
8. Reducing Threat Privilege/2. Windows 7 - Not using admin.mp4 | 10.99 MB |
8. Reducing Threat Privilege/2. Windows 7 - Not using admin.vtt | 4.98 kB |
8. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.mp4 | 18.24 MB |
8. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.vtt | 5.58 kB |
8. Reducing Threat Privilege/4. Windows 10 - Not using admin.mp4 | 14.15 MB |
8. Reducing Threat Privilege/4. Windows 10 - Not using admin.vtt | 4.58 kB |
9. Social Engineering and Social Media Offence and Defence/1. Goals and Learning Objectives.mp4 | 1.73 MB |
9. Social Engineering and Social Media Offence and Defence/1. Goals and Learning Objectives.vtt | 639.00 B |
9. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.mp4 | 83.81 MB |
9. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.vtt | 22.48 kB |
9. Social Engineering and Social Media Offence and Defence/2.1 httpstosdr.org.html | 79.00 B |
9. Social Engineering and Social Media Offence and Defence/2.2 httpswww.eff.orgwho-has-your-back-government-data-requests-2015.html | 128.00 B |
9. Social Engineering and Social Media Offence and Defence/2.4 httpsgnu.iosocialtry.html | 87.00 B |
9. Social Engineering and Social Media Offence and Defence/2.5 Twitter Privacy Settings.html | 120.00 B |
9. Social Engineering and Social Media Offence and Defence/2.6 The complete guide to facebook privacy settings.html | 136.00 B |
9. Social Engineering and Social Media Offence and Defence/2.7 httpsdiasporafoundation.org.html | 92.00 B |
9. Social Engineering and Social Media Offence and Defence/2.8 httpfriendica.com.html | 82.00 B |
9. Social Engineering and Social Media Offence and Defence/2.9 List of Personally Identifiable Information (PII).html | 134.00 B |
9. Social Engineering and Social Media Offence and Defence/3. Identify Verification and Registration.mp4 | 23.40 MB |
9. Social Engineering and Social Media Offence and Defence/3. Identify Verification and Registration.vtt | 8.44 kB |
9. Social Engineering and Social Media Offence and Defence/3.1 httpwww.migmail.net.html | 84.00 B |
9. Social Engineering and Social Media Offence and Defence/3.10 httpfreemail.ms.html | 80.00 B |
9. Social Engineering and Social Media Offence and Defence/3.11 httpwww.dispostable.com.html | 88.00 B |
9. Social Engineering and Social Media Offence and Defence/3.12 httpsmailinator.com.html | 84.00 B |
9. Social Engineering and Social Media Offence and Defence/3.13 httpbugmenot.com.html | 81.00 B |
9. Social Engineering and Social Media Offence and Defence/3.14 httpsanonbox.net.html | 81.00 B |
9. Social Engineering and Social Media Offence and Defence/3.15 Top 10 sites receive sms online without phone.html | 135.00 B |
9. Social Engineering and Social Media Offence and Defence/3.16 httpwww.tempinbox.com.html | 85.00 B |
9. Social Engineering and Social Media Offence and Defence/3.17 httpwww.mailexpire.com.html | 87.00 B |
9. Social Engineering and Social Media Offence and Defence/3.2 httpswww.trash-mail.comen.html | 91.00 B |
9. Social Engineering and Social Media Offence and Defence/3.3 Example SMS recieve online site.html | 96.00 B |
9. Social Engineering and Social Media Offence and Defence/3.4 httpcrapmail.dken.html | 83.00 B |
9. Social Engineering and Social Media Offence and Defence/3.5 httpswww.guerrillamail.com.html | 92.00 B |
9. Social Engineering and Social Media Offence and Defence/3.6 http10minutemail.com10MinuteMailindex.html.html | 108.00 B |
9. Social Engineering and Social Media Offence and Defence/3.7 httpdontmail.net.html | 81.00 B |
9. Social Engineering and Social Media Offence and Defence/3.8 httpgetairmail.com.html | 83.00 B |
9. Social Engineering and Social Media Offence and Defence/3.9 httpwww.mytrashmail.com.html | 88.00 B |
9. Social Engineering and Social Media Offence and Defence/4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4 | 23.29 MB |
9. Social Engineering and Social Media Offence and Defence/4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.vtt | 12.95 kB |
9. Social Engineering and Social Media Offence and Defence/4.1 httpwww.urlvoid.com.html | 84.00 B |
9. Social Engineering and Social Media Offence and Defence/4.2 httpwww.google.com.stationx.net.html | 95.00 B |
9. Social Engineering and Social Media Offence and Defence/5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4 | 49.31 MB |
9. Social Engineering and Social Media Offence and Defence/5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.vtt | 17.75 kB |
9. Social Engineering and Social Media Offence and Defence/5.1 httpswww.virustotal.comendocumentationemail-submissions.html | 123.00 B |
9. Social Engineering and Social Media Offence and Defence/5.2 How to Get Email Headers.html | 111.00 B |
9. Social Engineering and Social Media Offence and Defence/5.3 httpswww.parsemail.org.html | 87.00 B |
9. Social Engineering and Social Media Offence and Defence/5.4 httpswhois.domaintools.combbc.co.uk.html | 100.00 B |
9. Social Engineering and Social Media Offence and Defence/5.5 httpswhois.domaintools.comblob.com.html | 99.00 B |
9. Social Engineering and Social Media Offence and Defence/6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp4 | 14.52 MB |
9. Social Engineering and Social Media Offence and Defence/6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).vtt | 8.29 kB |
9. Social Engineering and Social Media Offence and Defence/6.1 httpwww.actionfraud.police.uktypes_of_fraud.html | 108.00 B |
9. Social Engineering and Social Media Offence and Defence/6.2 httpwww.scambusters.org.html | 88.00 B |
9. Social Engineering and Social Media Offence and Defence/6.3 httpwww.consumerfraudreporting.orgcredit_freeze_summary.php.html | 124.00 B |
Discuss.FreeTutorials.Eu.html | 31.34 kB |
FreeCoursesOnline.Me.html | 108.30 kB |
FreeTutorials.Eu.html | 102.23 kB |
How you can help Team-FTU.txt | 259.00 B |
Torrent Downloaded From GloDls.to.txt | 84.00 B |
[TGx]Downloaded from torrentgalaxy.org.txt | 524.00 B |