种子简介
种子名称:
Cyber Security FULL 4 Courses
文件类型:
视频
文件数目:
454个文件
文件大小:
11.45 GB
收录时间:
2021-3-22 22:39
已经下载:
3次
资源热度:
120
最近下载:
2024-12-26 09:13
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:2e5a4dedf2279f0a93cf0392a4deb7458f83d646&dn=Cyber Security FULL 4 Courses
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Cyber Security FULL 4 Courses.torrent
Cyber Security - VOLUME 1/4. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4199.31MB
Cyber Security - VOLUME 1/1. Introduction/2. Security Quick Win!.mp443.19MB
Cyber Security - VOLUME 1/1. Introduction/3. Goals and Learning Objectives - Volume 1.mp416.11MB
Cyber Security - VOLUME 1/1. Introduction/4. Target Audience.mp47.34MB
Cyber Security - VOLUME 1/1. Introduction/5. Study Recommendations.mp417.95MB
Cyber Security - VOLUME 1/1. Introduction/6. Course updates.mp44.4MB
Cyber Security - VOLUME 1/2. know Yourself - The Threat and Vulnerability Landscape/1. Theory and Practical.mp42.25MB
Cyber Security - VOLUME 1/2. know Yourself - The Threat and Vulnerability Landscape/2. Goals and Learning Objectives.mp42.71MB
Cyber Security - VOLUME 1/2. know Yourself - The Threat and Vulnerability Landscape/3. Protect What You Value.mp48.94MB
Cyber Security - VOLUME 1/2. know Yourself - The Threat and Vulnerability Landscape/4. What is Privacy, Anonymity and Pseudonymity.mp411.88MB
Cyber Security - VOLUME 1/2. know Yourself - The Threat and Vulnerability Landscape/5. Security, Vulnerabilities, Threats and Adversaries.mp411.24MB
Cyber Security - VOLUME 1/2. know Yourself - The Threat and Vulnerability Landscape/6. Asset Selection.mp47.69MB
Cyber Security - VOLUME 1/2. know Yourself - The Threat and Vulnerability Landscape/7. Threat Modeling and Risk Assessments.mp418.04MB
Cyber Security - VOLUME 1/2. know Yourself - The Threat and Vulnerability Landscape/8. Security vs Privacy vs Anonymity - Can we have it all.mp45.44MB
Cyber Security - VOLUME 1/2. know Yourself - The Threat and Vulnerability Landscape/10. Defense In Depth.mp42.99MB
Cyber Security - VOLUME 1/2. know Yourself - The Threat and Vulnerability Landscape/11. The Zero Trust Model.mp410.28MB
Cyber Security - VOLUME 1/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/1. Goals and Learning Objectives.mp42.89MB
Cyber Security - VOLUME 1/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. Why You Need Security – The Value Of A Hack.mp428.93MB
Cyber Security - VOLUME 1/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. The Top 3 Things You Need To Stay Safe Online.mp42.51MB
Cyber Security - VOLUME 1/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/5. Hackers, crackers and cyber criminals.mp47.71MB
Cyber Security - VOLUME 1/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware, viruses, rootkits and RATs.mp412.15MB
Cyber Security - VOLUME 1/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. What is Phishing, Vishing and SMShing.mp425.99MB
Cyber Security - VOLUME 1/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spamming & Doxing.mp44.79MB
Cyber Security - VOLUME 1/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. Darknets, Dark Markets and Exploit kits.mp432.43MB
Cyber Security - VOLUME 1/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/13. Governments, spies and secret stuff part I.mp427.03MB
Cyber Security - VOLUME 1/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Governments, spies and secret stuff part II.mp430.24MB
Cyber Security - VOLUME 1/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.mp424.49MB
Cyber Security - VOLUME 1/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. Censorship.mp46.49MB
Cyber Security - VOLUME 1/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. Cyber Threat Intelligence – Stay Informed.mp42.62MB
Cyber Security - VOLUME 1/4. Encryption Crash Course/1. Goals and Learning Objectives.mp41.63MB
Cyber Security - VOLUME 1/4. Encryption Crash Course/2. Symmetric Encryption.mp432.3MB
Cyber Security - VOLUME 1/4. Encryption Crash Course/3. Asymmetric Encryption.mp472.32MB
Cyber Security - VOLUME 1/4. Encryption Crash Course/4. Hash Functions.mp489.24MB
Cyber Security - VOLUME 1/4. Encryption Crash Course/5. Digital Signatures.mp442.74MB
Cyber Security - VOLUME 1/4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4160.85MB
Cyber Security - VOLUME 1/4. Encryption Crash Course/7. SSL Stripping.mp4114.52MB
Cyber Security - VOLUME 1/4. Encryption Crash Course/8. HTTPS (HTTP Secure).mp481.9MB
Cyber Security - VOLUME 1/4. Encryption Crash Course/9. Digital Certificates.mp481.97MB
Cyber Security - VOLUME 1/1. Introduction/1. Welcome and Introduction to the Instructor!.mp419.9MB
Cyber Security - VOLUME 1/4. Encryption Crash Course/11. End-to-End Encryption (E2EE).mp48.19MB
Cyber Security - VOLUME 1/4. Encryption Crash Course/12. Steganography.mp4104.31MB
Cyber Security - VOLUME 1/4. Encryption Crash Course/13. How Security and Encryption is Really Attacked.mp417.37MB
Cyber Security - VOLUME 1/5. Setting up a Testing Environment Using Virtual Machines (Lab)/1. Goals and Learning Objectives.mp41.84MB
Cyber Security - VOLUME 1/5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4110.48MB
Cyber Security - VOLUME 1/5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4144.16MB
Cyber Security - VOLUME 1/5. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali Linux 2018.mp459.62MB
Cyber Security - VOLUME 1/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/1. Goals and Learning Objectives.mp42.44MB
Cyber Security - VOLUME 1/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/2. Security Features and Functionality.mp457.9MB
Cyber Security - VOLUME 1/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp483.9MB
Cyber Security - VOLUME 1/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. Usage Share.mp434.29MB
Cyber Security - VOLUME 1/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp479.95MB
Cyber Security - VOLUME 1/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.mp467.88MB
Cyber Security - VOLUME 1/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp498.43MB
Cyber Security - VOLUME 1/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Windows 10 – Cortana.mp441.03MB
Cyber Security - VOLUME 1/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp486.47MB
Cyber Security - VOLUME 1/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.mp459.76MB
Cyber Security - VOLUME 1/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4105.53MB
Cyber Security - VOLUME 1/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Mac - Privacy & Tracking.mp457.98MB
Cyber Security - VOLUME 1/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. Linux and Unix “like” Operating systems.mp446.23MB
Cyber Security - VOLUME 1/7. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.mp41.66MB
Cyber Security - VOLUME 1/7. Security Bugs and Vulnerabilities/2. The Importance of Patching.mp411.66MB
Cyber Security - VOLUME 1/7. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.mp44.95MB
Cyber Security - VOLUME 1/7. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.mp46.55MB
Cyber Security - VOLUME 1/7. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.mp44.94MB
Cyber Security - VOLUME 1/7. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.mp441.82MB
Cyber Security - VOLUME 1/7. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp419.36MB
Cyber Security - VOLUME 1/7. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.mp438.5MB
Cyber Security - VOLUME 1/7. Security Bugs and Vulnerabilities/9. Mac - Patching.mp455.59MB
Cyber Security - VOLUME 1/7. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.mp434.02MB
Cyber Security - VOLUME 1/7. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.mp43.57MB
Cyber Security - VOLUME 1/7. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.mp45.64MB
Cyber Security - VOLUME 1/7. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.mp44.31MB
Cyber Security - VOLUME 1/8. Reducing Threat Privilege/1. Goals and Learning Objectives - Removing Privilege.mp413.59MB
Cyber Security - VOLUME 1/8. Reducing Threat Privilege/2. Windows 7 - Not using admin.mp411MB
Cyber Security - VOLUME 1/8. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.mp418.25MB
Cyber Security - VOLUME 1/8. Reducing Threat Privilege/4. Windows 10 - Not using admin.mp414.15MB
Cyber Security - VOLUME 1/9. Social Engineering and Social Media Offence and Defence/1. Goals and Learning Objectives.mp41.73MB
Cyber Security - VOLUME 1/9. Social Engineering and Social Media Offence and Defence/3. Identify Verification and Registration.mp423.4MB
Cyber Security - VOLUME 1/10. Security Domains/1. Goals and Learning Objectives.mp41.43MB
Cyber Security - VOLUME 1/10. Security Domains/2. Security Domains.mp421.85MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.mp42.3MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.mp45.67MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.mp425.58MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.mp450.25MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.mp457.32MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/6. Dual Boot.mp47.93MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.mp410.41MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.mp426.37MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp470.12MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.mp413.86MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.mp423.8MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/12. Virtual Machines.mp444.44MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.mp422.74MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.mp436.97MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp488.64MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.mp415.79MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp478.73MB
Cyber Security - VOLUME 1/11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.mp414.98MB
Cyber Security - VOLUME 1/12. Wrap Up/1. Congratulations.mp45.29MB
Cyber Security - VOLUME 2/[VIEH©]01 Introduction/001 Welcome to Volume 2.mp42.74MB
Cyber Security - VOLUME 2/[VIEH©]01 Introduction/002 Introduction to the Instructor.mp417.13MB
Cyber Security - VOLUME 2/[VIEH©]01 Introduction/003 Security Quick Win.mp444.61MB
Cyber Security - VOLUME 2/[VIEH©]01 Introduction/004 Target Audience.mp48.67MB
Cyber Security - VOLUME 2/[VIEH©]01 Introduction/005 Study Recommendations.mp427.89MB
Cyber Security - VOLUME 2/[VIEH©]01 Introduction/006 Course updates.mp42.56MB
Cyber Security - VOLUME 2/[VIEH©]02 Goals and Learning Objectives/007 Goals and Learning Objectives - Volume 2.mp415.91MB
Cyber Security - VOLUME 2/[VIEH©]03 Routers - Port and Vulnerability scanning/008 Goals and Learning Objectives.mp42.32MB
Cyber Security - VOLUME 2/[VIEH©]03 Routers - Port and Vulnerability scanning/009 The Home Router.mp460.63MB
Cyber Security - VOLUME 2/[VIEH©]03 Routers - Port and Vulnerability scanning/012 Open Source Custom Router Firmware.mp455.99MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/013 Goals and Learning Objectives.mp42.26MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/014 Firewalls Host-based network-based and virtual Part 1.mp444.78MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/015 Firewalls Host-based network-based and virtual Part 2.mp416.33MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/016 Windows - Host Based Firewalls - Windows Firewall.mp462.66MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/017 Windows - Host Based Firewalls - Windows Firewall Control WFC.mp435.68MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/018 Windows - Host Based Firewalls - Third Party.mp435.26MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/019 Linux - Host Based Firewalls - iptables.mp460.78MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/020 Linux - Host Based Firewalls - UFW gufw nftables.mp449.49MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/021 Mac - Host based Firewalls - Application Firewall PF.mp443.19MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/022 Mac - Host based Firewalls - pflist Icefloor Murus.mp438.14MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/023 Mac - Host based Firewalls - Little Snitch.mp425.19MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/024 Network based firewalls - Routers - DD-WRT.mp415.08MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/025 Network based firewalls - Hardware.mp419.69MB
Cyber Security - VOLUME 2/[VIEH©]04 Firewalls/026 Network based firewalls - pfSense Smoothwall and Vyos.mp428.55MB
Cyber Security - VOLUME 2/[VIEH©]05 Network Attacks Architecture and Isolation/027 Goals and Learning Objectives.mp41.58MB
Cyber Security - VOLUME 2/[VIEH©]05 Network Attacks Architecture and Isolation/030 Effective Network Isolation Part 1.mp434.97MB
Cyber Security - VOLUME 2/[VIEH©]05 Network Attacks Architecture and Isolation/031 Effective Network Isolation Part 2.mp423.77MB
Cyber Security - VOLUME 2/[VIEH©]06 Wireless and Wi-Fi Security/032 Goals and Learning Objectives.mp42.09MB
Cyber Security - VOLUME 2/[VIEH©]06 Wireless and Wi-Fi Security/033 Wi-Fi Weaknesses - WEP.mp48.14MB
Cyber Security - VOLUME 2/[VIEH©]06 Wireless and Wi-Fi Security/034 Wi-Fi Weaknesses - WPA WPA2 TKIP and CCMP.mp436.99MB
Cyber Security - VOLUME 2/[VIEH©]06 Wireless and Wi-Fi Security/036 Wi-Fi Security Testing.mp421.72MB
Cyber Security - VOLUME 2/[VIEH©]06 Wireless and Wi-Fi Security/037 Wireless Security - Secure Configuration and Network Isolation.mp431.6MB
Cyber Security - VOLUME 2/[VIEH©]06 Wireless and Wi-Fi Security/038 Wireless security - RF Isolation and Reduction.mp49.41MB
Cyber Security - VOLUME 2/[VIEH©]06 Wireless and Wi-Fi Security/039 Wireless security - Who is on my Wi-Fi Network.mp411.7MB
Cyber Security - VOLUME 2/[VIEH©]07 Network Monitoring for Threats/040 Goals and Learning Objectives.mp41.38MB
Cyber Security - VOLUME 2/[VIEH©]07 Network Monitoring for Threats/041 Syslog.mp480.07MB
Cyber Security - VOLUME 2/[VIEH©]07 Network Monitoring for Threats/044 Wireshark - Finding malware and hackers - Part 1.mp491MB
Cyber Security - VOLUME 2/[VIEH©]07 Network Monitoring for Threats/045 Wireshark - Finding malware and hackers - Part 2.mp456.03MB
Cyber Security - VOLUME 2/[VIEH©]07 Network Monitoring for Threats/046 Network Monitoring - Wincap NST Netminer and NetWorx.mp418.81MB
Cyber Security - VOLUME 2/[VIEH©]08 How We Are Tracked Online/047 Goals and Learning Objectives.mp41.98MB
Cyber Security - VOLUME 2/[VIEH©]08 How We Are Tracked Online/048 Types of Tracking.mp489.84MB
Cyber Security - VOLUME 2/[VIEH©]08 How We Are Tracked Online/049 IP Address.mp446.36MB
Cyber Security - VOLUME 2/[VIEH©]08 How We Are Tracked Online/050 3rd Party Connections.mp436.55MB
Cyber Security - VOLUME 2/[VIEH©]08 How We Are Tracked Online/051 HTTP Referer.mp414.41MB
Cyber Security - VOLUME 2/[VIEH©]08 How We Are Tracked Online/052 Cookies and Scripts.mp433.75MB
Cyber Security - VOLUME 2/[VIEH©]08 How We Are Tracked Online/053 Super Cookies.mp428.72MB
Cyber Security - VOLUME 2/[VIEH©]08 How We Are Tracked Online/054 Browser Fingerprinting and Browser Volunteered Information.mp437.15MB
Cyber Security - VOLUME 2/[VIEH©]08 How We Are Tracked Online/055 Browser and Browser Functionality.mp412.98MB
Cyber Security - VOLUME 2/[VIEH©]08 How We Are Tracked Online/056 More Tracking.mp452.05MB
Cyber Security - VOLUME 2/[VIEH©]08 How We Are Tracked Online/057 Browser and Internet Profiling.mp441.77MB
Cyber Security - VOLUME 2/[VIEH©]09 Search Engines and Privacy/058 Goals and Learning Objectives.mp41.63MB
Cyber Security - VOLUME 2/[VIEH©]09 Search Engines and Privacy/059 Search Engine Tracking Censorship and Privacy.mp453.63MB
Cyber Security - VOLUME 2/[VIEH©]09 Search Engines and Privacy/060 Ixquick and Startpage.mp433.71MB
Cyber Security - VOLUME 2/[VIEH©]09 Search Engines and Privacy/061 DuckDuckGo.mp411.94MB
Cyber Security - VOLUME 2/[VIEH©]09 Search Engines and Privacy/062 Disconnect search.mp416.43MB
Cyber Security - VOLUME 2/[VIEH©]09 Search Engines and Privacy/063 YaCy.mp442.14MB
Cyber Security - VOLUME 2/[VIEH©]09 Search Engines and Privacy/064 Private and Anonymous Searching.mp454.33MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/065 Goals and Learning Objectives.mp41.85MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/066 Which Browser Choice of Browser.mp416.95MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/067 Reducing the Browser Attack Surface.mp487.74MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/068 Browser Hacking Demo.mp446.74MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/069 Browser Isolation and Compartmentalization.mp424.84MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/070 Firefox Security Privacy and Tracking.mp441.11MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/072 uMatrix - HTTP Filters ad and track blockers.mp429.36MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/075 No-script - HTTP Filters ad and track blockers.mp423.08MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/077 History Cookies and Super cookies Part 1.mp466.66MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/078 History Cookies and Super cookies Part 2.mp466.02MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/079 HTTP Referer.mp47.55MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/080 Browser Fingerprinting.mp498MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/081 Certificates and Encryption.mp455.5MB
Cyber Security - VOLUME 2/[VIEH©]10 Browser Security and Tracking Prevention/082 Firefox Hardening.mp4142.27MB
Cyber Security - VOLUME 2/[VIEH©]11 Passwords and Authentication Methods/083 Goals and Learning Objectives.mp42.6MB
Cyber Security - VOLUME 2/[VIEH©]11 Passwords and Authentication Methods/084 Password Attacks.mp47.48MB
Cyber Security - VOLUME 2/[VIEH©]11 Passwords and Authentication Methods/085 How Passwords are Cracked - Hashes - Part 1.mp441.14MB
Cyber Security - VOLUME 2/[VIEH©]11 Passwords and Authentication Methods/086 How Passwords are Cracked - Hashcat - Part 2.mp424.15MB
Cyber Security - VOLUME 2/[VIEH©]11 Passwords and Authentication Methods/087 Operating System Passwords.mp47.01MB
Cyber Security - VOLUME 2/[VIEH©]11 Passwords and Authentication Methods/088 Password Managers - An Introduction.mp44.15MB
Cyber Security - VOLUME 2/[VIEH©]11 Passwords and Authentication Methods/089 Password Managers - Master Password.mp411.49MB
Cyber Security - VOLUME 2/[VIEH©]11 Passwords and Authentication Methods/090 Password Managers - KeePass and KeePassX.mp413.5MB
Cyber Security - VOLUME 2/[VIEH©]11 Passwords and Authentication Methods/091 Password Managers - LastPass.mp426.47MB
Cyber Security - VOLUME 2/[VIEH©]11 Passwords and Authentication Methods/092 Password Managers - Hardening Lastpass.mp415.55MB
Cyber Security - VOLUME 2/[VIEH©]11 Passwords and Authentication Methods/097 Choosing a Method of Multi-Factor Authentication.mp46.23MB
Cyber Security - VOLUME 2/[VIEH©]11 Passwords and Authentication Methods/099 The Future of Password and Authentication.mp44.04MB
Cyber Security - VOLUME 2/[VIEH©]12 Wrap Up/100 Congratulations.mp411.53MB
Cyber Security - VOLUME 2/[VIEH©]12 Wrap Up/102 Which VPN protocol is best to use and why.mp434.6MB
Cyber Security - VOLUME 2/[VIEH©]12 Wrap Up/103 Email Tracking and Hacking.mp426.77MB
Cyber Security - VOLUME 2/[VIEH©]12 Wrap Up/104 Security Vulnerabilities Threats and Adversaries.mp411.83MB
Cyber Security - VOLUME 3/1. Introduction/1. Welcome to Volume III.mp43.3MB
Cyber Security - VOLUME 3/1. Introduction/2. Introduction to the Instructor!.mp417.13MB
Cyber Security - VOLUME 3/1. Introduction/3. Security Quick Win!.mp444.61MB
Cyber Security - VOLUME 3/1. Introduction/4. Target Audience.mp48.67MB
Cyber Security - VOLUME 3/1. Introduction/5. Study Recommendations.mp427.89MB
Cyber Security - VOLUME 3/1. Introduction/6. Course updates.mp42.57MB
Cyber Security - VOLUME 3/2. Goals and Objectives for Volume III/1. Goals and Learning Objectives.mp419.57MB
Cyber Security - VOLUME 3/3. OPSEC (Operational Security)/1. Goals and Learning Objectives.mp44.23MB
Cyber Security - VOLUME 3/3. OPSEC (Operational Security)/2. Introduction to OPSEC.mp410.41MB
Cyber Security - VOLUME 3/3. OPSEC (Operational Security)/3. Identities, pseudonyms and aliases (Identity Strategies).mp414.46MB
Cyber Security - VOLUME 3/3. OPSEC (Operational Security)/4. Establishing Cover.mp460.05MB
Cyber Security - VOLUME 3/3. OPSEC (Operational Security)/5. Identify Cross Contamination.mp451.11MB
Cyber Security - VOLUME 3/3. OPSEC (Operational Security)/6. 10 Rules of OPSEC.mp4185.34MB
Cyber Security - VOLUME 3/3. OPSEC (Operational Security)/7. Authorship Recognition and Evasion Methods.mp418.8MB
Cyber Security - VOLUME 3/3. OPSEC (Operational Security)/8. The knock.mp412.93MB
Cyber Security - VOLUME 3/3. OPSEC (Operational Security)/9. Case Studies of OPSEC Failures.mp429.58MB
Cyber Security - VOLUME 3/4. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/1. Goals and Learning Objectives.mp41.23MB
Cyber Security - VOLUME 3/4. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/2. Introduction to live operating systems.mp446.12MB
Cyber Security - VOLUME 3/4. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/3. Knoppix, Puppy linux, Jondo live, Tiny core linux, Window To Go.mp463.89MB
Cyber Security - VOLUME 3/4. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/4. Tails.mp463.64MB
Cyber Security - VOLUME 3/4. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/5. Tails Demo.mp444.24MB
Cyber Security - VOLUME 3/5. Virtual Private Networks (VPNs)/1. Goals and Learning Objectives.mp43.69MB
Cyber Security - VOLUME 3/5. Virtual Private Networks (VPNs)/2. Introduction to VPNs.mp423.8MB
Cyber Security - VOLUME 3/5. Virtual Private Networks (VPNs)/3. Which VPN protocol is best to use and why.mp434.6MB
Cyber Security - VOLUME 3/5. Virtual Private Networks (VPNs)/4. VPN Weaknesses.mp430.85MB
Cyber Security - VOLUME 3/5. Virtual Private Networks (VPNs)/5. Can you trust VPN providers.mp433.88MB
Cyber Security - VOLUME 3/5. Virtual Private Networks (VPNs)/6. VPNs and Domain Name System (DNS) Leaks.mp440.14MB
Cyber Security - VOLUME 3/5. Virtual Private Networks (VPNs)/7. Setting up an OpenVPN client in Windows, Mac, iPhone and Android.mp486.84MB
Cyber Security - VOLUME 3/5. Virtual Private Networks (VPNs)/8. Setting up an OpenVPN client on Linux.mp458.6MB
Cyber Security - VOLUME 3/5. Virtual Private Networks (VPNs)/9. Preventing VPN Leaks - Firewalls and kill switches.mp454.65MB
Cyber Security - VOLUME 3/5. Virtual Private Networks (VPNs)/10. Choosing the right VPN provider.mp437.1MB
Cyber Security - VOLUME 3/5. Virtual Private Networks (VPNs)/11. Setting up an OpenVPN server Part 1 - The fast and easy way.mp455.3MB
Cyber Security - VOLUME 3/5. Virtual Private Networks (VPNs)/12. Setting up an OpenVPN server Part 2 - Debian client.mp424.14MB
Cyber Security - VOLUME 3/5. Virtual Private Networks (VPNs)/13. Setting up an OpenVPN server Part 3 - Home VPN.mp418.26MB
Cyber Security - VOLUME 3/6. Tor/1. Goals and Learning Objectives.mp41.84MB
Cyber Security - VOLUME 3/6. Tor/2. What is Tor.mp417.57MB
Cyber Security - VOLUME 3/6. Tor/3. The Tor Network and Browser.mp456.68MB
Cyber Security - VOLUME 3/6. Tor/4. What should Tor be used for.mp423.33MB
Cyber Security - VOLUME 3/6. Tor/5. Directory Authorities and Relays.mp416.29MB
Cyber Security - VOLUME 3/6. Tor/6. Tor Bridges.mp414.66MB
Cyber Security - VOLUME 3/6. Tor/7. Tor Pluggable Transports and Traffic Obfuscation.mp417.86MB
Cyber Security - VOLUME 3/6. Tor/8. Torrc Configuration File.mp445.99MB
Cyber Security - VOLUME 3/6. Tor/9. Running other applications through Tor.mp433.05MB
Cyber Security - VOLUME 3/6. Tor/10. Tor Weaknesses Part 1.mp487.27MB
Cyber Security - VOLUME 3/6. Tor/11. Tor Weaknesses Part 2.mp415.12MB
Cyber Security - VOLUME 3/6. Tor/12. Conclusions on Tor and mitigation to reduce risk.mp4122.64MB
Cyber Security - VOLUME 3/6. Tor/13. Attacking Tor how the NSA targets users' online anonymity.mp426.24MB
Cyber Security - VOLUME 3/6. Tor/14. Hidden services – The Tor darknet.mp47.88MB
Cyber Security - VOLUME 3/6. Tor/15. Finding Tor hidden services.mp49.74MB
Cyber Security - VOLUME 3/6. Tor/16. Other Tor Apps.mp46.48MB
Cyber Security - VOLUME 3/7. VPN and Tor Routers/1. Goals and Learning Objectives.mp41.33MB
Cyber Security - VOLUME 3/7. VPN and Tor Routers/2. Introduction to VPN and Tor Routers.mp410.82MB
Cyber Security - VOLUME 3/7. VPN and Tor Routers/3. Custom Router Firmware for VPN & TOR Tunneling.mp421.43MB
Cyber Security - VOLUME 3/7. VPN and Tor Routers/4. Off the shelf VPN and TOR Routers.mp418.77MB
Cyber Security - VOLUME 3/7. VPN and Tor Routers/5. DIY Hardware TOR Routers.mp47.3MB
Cyber Security - VOLUME 3/7. VPN and Tor Routers/6. TOR and VPN Gateway Virtual Machines.mp416.31MB
Cyber Security - VOLUME 3/8. Proxies – HTTP, HTTPS, SOCKs and Web/1. Goals and Learning Objectives.mp41.64MB
Cyber Security - VOLUME 3/8. Proxies – HTTP, HTTPS, SOCKs and Web/2. Proxies – HTTP, HTTPS and SOCKS Part 1.mp417.16MB
Cyber Security - VOLUME 3/8. Proxies – HTTP, HTTPS, SOCKs and Web/3. Proxies – HTTP, HTTPS and SOCKS Part 2.mp416.33MB
Cyber Security - VOLUME 3/8. Proxies – HTTP, HTTPS, SOCKs and Web/4. CGI proxies - Web proxy or web form proxy.mp49.15MB
Cyber Security - VOLUME 3/9. SSH Secure Shell/1. Goals and Learning Objectives.mp41.65MB
Cyber Security - VOLUME 3/9. SSH Secure Shell/2. Introduction & How to Login.mp411.43MB
Cyber Security - VOLUME 3/9. SSH Secure Shell/3. SSH Remote Port Forwarding.mp418.49MB
Cyber Security - VOLUME 3/9. SSH Secure Shell/4. SSH Local Port Forwarding.mp48.18MB
Cyber Security - VOLUME 3/9. SSH Secure Shell/5. SSH Socks5 Proxy Tunneling with Dynamic Ports.mp421.84MB
Cyber Security - VOLUME 3/9. SSH Secure Shell/6. SSH Public private key authentication.mp421.86MB
Cyber Security - VOLUME 3/9. SSH Secure Shell/7. SSH Hardening.mp416.21MB
Cyber Security - VOLUME 3/10. I2P - The Invisible Internet Project/1. Goals and Learning Objectives.mp41.55MB
Cyber Security - VOLUME 3/10. I2P - The Invisible Internet Project/2. I2P - Introduction.mp430.33MB
Cyber Security - VOLUME 3/10. I2P - The Invisible Internet Project/3. I2P Installing and Secure Configuration Part 1.mp458.88MB
Cyber Security - VOLUME 3/10. I2P - The Invisible Internet Project/4. I2P Installing and Secure Configuration Part 2.mp446.99MB
Cyber Security - VOLUME 3/10. I2P - The Invisible Internet Project/5. I2P Strengths and Weaknesses.mp410.19MB
Cyber Security - VOLUME 3/11. Other Privacy and Anonymising Services/1. Goals and Learning Objectives.mp41.43MB
Cyber Security - VOLUME 3/11. Other Privacy and Anonymising Services/2. JonDonym - Introduction.mp420.98MB
Cyber Security - VOLUME 3/11. Other Privacy and Anonymising Services/3. JonDonym - Installing and Secure Configuration.mp414.33MB
Cyber Security - VOLUME 3/11. Other Privacy and Anonymising Services/4. Bullet Proof Hosting Services (BPHS).mp431.1MB
Cyber Security - VOLUME 3/11. Other Privacy and Anonymising Services/5. Botnets and Hacked Boxes.mp418.55MB
Cyber Security - VOLUME 3/12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/1. Goals and Learning Objectives.mp41.39MB
Cyber Security - VOLUME 3/12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/2. Outbound Firewall Bypassing - The Fundamentals Part 1.mp419.28MB
Cyber Security - VOLUME 3/12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/3. Outbound Firewall Bypassing - The Fundamentals Part 2.mp420.14MB
Cyber Security - VOLUME 3/12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/4. Outbound Bypassing - Tunneling through HTTP proxies.mp431.76MB
Cyber Security - VOLUME 3/12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/5. Outbound Bypassing - Port Sharing and Knocking.mp420.81MB
Cyber Security - VOLUME 3/12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/6. Outbound Bypassing – Cloaking and Obfuscating.mp418.13MB
Cyber Security - VOLUME 3/12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/7. Outbound Bypassing - Remote login - VNC and RDP.mp411.03MB
Cyber Security - VOLUME 3/12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/8. Inbound Bypassing - Reverse shells, SSH remote tunneling and remote login.mp417.05MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/1. Goals and Learning Objectives.mp42.51MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/2. Introduction to nesting and chaining - Proxies, VPN, SSH, JonDonym and Tor.mp413.59MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/3. Strengths and Weaknesses (User - SSH-VPN-JonDonym - Tor - Internet).mp421.07MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/4. Strengths and Weaknesses (User - Tor - SSH-VPN-JonDonym - Internet).mp419.76MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/5. Nested VPNs - Strength and Weaknesses.mp416.21MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/6. How to setup nested VPNs.mp414.52MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/7. How to setup nested SSH.mp419.34MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/8. How to setup proxy chains.mp419.56MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/9. How to setup - (User - VPN - Tor - Internet).mp44.84MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/10. How to setup - (User - SSH - Tor - Internet).mp412.68MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/11. How to setup - (User - JonDonym - Tor - Internet).mp44.33MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/12. How to setup - (User - Tor - SSHVPNJonDoym - Internet) with transproxy.mp450.4MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/13. How to setup - (User - Tor - SSHVPNJonDoym - Internet) with Whonix.mp421.67MB
Cyber Security - VOLUME 3/13. ChainingNesting Privacy and Anonymising Services/14. Setting up nested services (3 + hops).mp410.8MB
Cyber Security - VOLUME 3/14. Off-site Internet Connections - Hotspots and Cafes/1. Goals and Learning Objectives.mp41.9MB
Cyber Security - VOLUME 3/14. Off-site Internet Connections - Hotspots and Cafes/2. Staying safe while on public Wi-Fi hotspots.mp48.29MB
Cyber Security - VOLUME 3/14. Off-site Internet Connections - Hotspots and Cafes/3. Using Internet Cafés for security, privacy and anonymity safely.mp434.63MB
Cyber Security - VOLUME 3/14. Off-site Internet Connections - Hotspots and Cafes/4. Using public Wi-Fi hotspots for security, privacy and anonymity safely.mp418.41MB
Cyber Security - VOLUME 3/14. Off-site Internet Connections - Hotspots and Cafes/5. Finding public Wi-Fi hotspots.mp418.03MB
Cyber Security - VOLUME 3/14. Off-site Internet Connections - Hotspots and Cafes/6. Boosting Wi-Fi range.mp432.23MB
Cyber Security - VOLUME 3/14. Off-site Internet Connections - Hotspots and Cafes/7. How are Wi-Fi users geo located.mp412.43MB
Cyber Security - VOLUME 3/15. Mobile, Cell Phones & Cellular Networks/1. Goals and Learning Objectives.mp41.75MB
Cyber Security - VOLUME 3/15. Mobile, Cell Phones & Cellular Networks/2. Cellular Network Weaknesses - The Network Operator.mp412.42MB
Cyber Security - VOLUME 3/15. Mobile, Cell Phones & Cellular Networks/3. Cellular Networks Weaknesses - IMSI catchers.mp411.12MB
Cyber Security - VOLUME 3/15. Mobile, Cell Phones & Cellular Networks/4. Cellular Networks Weaknesses - Signaling System No7 (SS7).mp412.22MB
Cyber Security - VOLUME 3/15. Mobile, Cell Phones & Cellular Networks/5. Mobile and Cell Phone Weaknesses.mp422.15MB
Cyber Security - VOLUME 3/15. Mobile, Cell Phones & Cellular Networks/6. How to use a laptop and cellular networks for Internet privacy and anonymity.mp418.59MB
Cyber Security - VOLUME 3/15. Mobile, Cell Phones & Cellular Networks/7. How you are geo located when using a cellular network.mp412.7MB
Cyber Security - VOLUME 3/16. Wrap Up/1. Congratulations.mp48.23MB
Cyber Security - VOLUME 3/16. Wrap Up/3. Intro to Isolation & Compartmentalization.mp45.66MB
Cyber Security - VOLUME 3/16. Wrap Up/4. Firefox Hardening.mp4142.28MB
Cyber Security - VOLUME 3/16. Wrap Up/5. Email Tracking & Exploits.mp426.77MB
Cyber Security - VOLUME 4/1. Introduction/1. Welcome to Volume 4.mp47.2MB
Cyber Security - VOLUME 4/1. Introduction/2. Introduction to the Instructor!.mp417.14MB
Cyber Security - VOLUME 4/1. Introduction/3. Security Quick Win!.mp444.62MB
Cyber Security - VOLUME 4/1. Introduction/4. Target Audience.mp47.33MB
Cyber Security - VOLUME 4/1. Introduction/5. Study Recommendations.mp427.9MB
Cyber Security - VOLUME 4/1. Introduction/6. Course updates.mp42.57MB
Cyber Security - VOLUME 4/2. Goals and Learning Objectives - Volume 4/1. What is End Point Protection and why is it important.mp434.32MB
Cyber Security - VOLUME 4/2. Goals and Learning Objectives - Volume 4/2. Goals and Learning Objectives - Volume 4.mp425.4MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/1. Goals and Learning Objectives.mp47.2MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.mp416.79MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/4. Disk Encryption Attacks - Physical.mp438.32MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/5. Disk Encryption Attacks - Containers, Volumes and Partitions.mp47.19MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/6. Windows - Disk Encryption - An Introduction.mp47.52MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/7. Windows - Disk Encryption - Bitlocker.mp430.21MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/8. Windows - Setting Up BitLocker.mp423.64MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/9. Windows - Disk Encryption - VeraCrypt.mp425.06MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.mp46.76MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/11. Windows, Mac & Linux - Setting up VeraCrypt.mp429.81MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/12. Mac - Filevault2.mp413.17MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/14. Linux Whole Disk Encryption - Dm-crypt and LUKS.mp413.76MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/15. Linux - Setting up DMCryptLUKS.mp413.19MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/16. Linux - Encrypting the boot partition with Grub2.mp411.72MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/17. Self Encrypting Drives (SEDs).mp43.17MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/18. Defense Against Disk Decryption Attacks.mp420.86MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/19. File Encryption.mp411.11MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/20. Mandatory Key Disclosure & Plausible Deniability.mp420.54MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/21. Nesting Crypto Systems & Obfuscation.mp48.89MB
Cyber Security - VOLUME 4/3. File and Disk Encryption/22. Case Studies in Disk Decryption.mp45.88MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/1. Goals and Learning Objectives.mp45.62MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/2. Is Anti-Virus dead - The Threat Landscape.mp411.34MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/3. Is Anti-Virus dead - Protection Methods.mp436.61MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/4. Ransomware.mp48.5MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/5. Anti-Virus and End-Point-Protection Testing.mp412.9MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/6. The Problem With AV and EPP Testing.mp46.66MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/7. The Best of Business End-Point-Protection (EPP).mp49.41MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/8. Windows - The Best of Anti-Virus and End-Point-Protection.mp410.29MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/9. Business End Point Protection (EPP).mp45.15MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/10. Mac - XProtect.mp413.5MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/11. Mac - The Best of Anti-Virus and End-Point-Protection.mp46.53MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/12. Linux - The Best of Anti-Virus and End-Point-Protection.mp46.18MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/13. Online and Second Opinion - Anti-Virus and End-Point-Protection.mp49.97MB
Cyber Security - VOLUME 4/4. Anti-Virus and End-Point-Protection/14. Is Anti-Virus and End-Point-Protection Dangerous.mp413.33MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/1. Goals and Learning Objectives.mp45.78MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/4. Windows - Application control - User Account Control (UAC).mp415.37MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/5. Windows - Application control - Software Restriction Policies.mp411.29MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/6. Windows - Application control - AppLocker.mp432.16MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/7. Windows - Application Control - Parental controls.mp44.87MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/9. Windows - Exploitation Prevention - EMET.mp437.37MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/10. Windows - Exploitation Prevention - Traps, MBEA and HMPA.mp411.25MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/11. Windows 10 - Device Guard.mp427.85MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/12. Windows - Defender Application Guard for Microsoft Edge.mp49.08MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/13. Linux - Access Control Models.mp413.36MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/14. Linux - Security frameworks - AppArmor.mp44.4MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/15. Linux - Security frameworks - SElinux.mp46.68MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/16. Linux - Security frameworks - Grsecurity.mp412.79MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/17. Linux - Security frameworks - PaX and more.mp43.85MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/18. Linux & Mac - File permissions, POSIX and ACLs.mp419.04MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/19. Mac - Application control - Parental controls.mp48.01MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/20. Mac - Application control - Gatekeeper.mp410.21MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/21. Mac - Application control - System Integrity Protection.mp412.03MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/22. Mac - Application control - Santa.mp47.05MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/23. Mac - Application control - Xfence (Previously Little Flocker).mp420.39MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/24. Mac - Other Stuff!.mp43.7MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/25. The New Normal For End-Point-Protection Technology.mp422.42MB
Cyber Security - VOLUME 4/6. End-Point-Protection Technology/26. Cylance.mp49.55MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/1. Goals and Learning Objectives.mp47.16MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/2. A Complete Failure to Detect Threats.mp411.45MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/3. Rethinking Honeypots.mp48.9MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/4. CanaryTokens.mp470.27MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/5. OpenCanary.mp438.8MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/6. Artillery - Binary Defense.mp411.11MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/7. Honey Drive.mp42.53MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/8. Intrusion Detection Systems (IDS) Part 1 - Methods.mp413.25MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/10. Host-Based Intrusion Detection - OSSEC.mp417.69MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/11. Network Analysis - Sguil, Xplico & NetworkMiner.mp48.86MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/12. File Integrity Monitoring (FIM) and Checking Part 1.mp47.75MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/14. Network Security Toolkit (NST).mp44.81MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/15. Security Onion.mp45.78MB
Cyber Security - VOLUME 4/7. Threat Detection and Monitoring/16. Security Information and Event Management Software (SIEM).mp46.16MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/1. Goals and Learning Objectives.mp47.21MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/2. Introduction to Malware and Hacker Hunting.mp416.35MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/3. Windows - Farbar Recovery Scanner.mp438.06MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/4. Automated Malware Removal Tools.mp439.97MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/5. Live Rescue Operating Systems, CDs, and USBs.mp418.33MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.mp457.78MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.mp446.72MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/8. Windows - Malware Seek & Destroy - Process Tools.mp48.79MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/9. Windows - Malware Seek & Destroy - Sigcheck.mp44.55MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/10. Windows - Malware Seek & Destroy - Autoruns.mp448.31MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/11. Windows - Malware Seek & Destroy - Process Monitor.mp476.22MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/12. Windows - Malware Seek & Destroy - Network Connections.mp423.97MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/13. Malware Seek & Destroy - Networkx.mp45.42MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/14. Linux - Malware Seek & Destroy - Sysdig.mp429.65MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/15. Linux - Seek & Destroy Malware and Hackers - Csysdig.mp443.66MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/18. Linux & Mac OS X - Malware Seek & Destroy - lsof.mp422.23MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/19. Linux - Malware Seek & Destroy - rkhunter.mp417.23MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/21. Linux - Malware Seek & Destroy - Linux - Persistence Part 1.mp49.22MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/22. Linux - Malware Seek & Destroy - Linux - Persistence Part 2.mp427.61MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/23. Linux - Malware Seek & Destroy - Linux - Persistence Part 3.mp45.23MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/26. Mac, Linux & Windows - OSquery.mp442.3MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/27. Firmware Rootkits – Seek and Destroy Part 1.mp415.96MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/28. Firmware Rootkits – Seek and Destroy Part 2.mp48.89MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/29. End-Point-Protection Recovery and Remediation Technology.mp410.5MB
Cyber Security - VOLUME 4/8. Malware and Hacker Hunting on the End-Point/30. Encrypted Backup and Cloud Storage.mp414.14MB
Cyber Security - VOLUME 4/9. Operating System and Application Hardening/1. Goals and Learning Objectives.mp47.19MB
Cyber Security - VOLUME 4/9. Operating System and Application Hardening/2. An Introduction to Hardening.mp48.9MB
Cyber Security - VOLUME 4/9. Operating System and Application Hardening/3. Hardening Standards.mp441.53MB
Cyber Security - VOLUME 4/9. Operating System and Application Hardening/4. OpenSCAP.mp431.25MB
Cyber Security - VOLUME 4/9. Operating System and Application Hardening/5. Baseline Auditing.mp412.43MB
Cyber Security - VOLUME 4/9. Operating System and Application Hardening/6. Windows - Hardening.mp49.31MB
Cyber Security - VOLUME 4/9. Operating System and Application Hardening/7. Windows - Security Compliance Manager (SCM).mp444.88MB
Cyber Security - VOLUME 4/9. Operating System and Application Hardening/8. Mac – Hardening.mp43.52MB
Cyber Security - VOLUME 4/9. Operating System and Application Hardening/9. Linux – Hardening.mp49.04MB
Cyber Security - VOLUME 4/9. Operating System and Application Hardening/10. Security Focused Operating Systems.mp49.85MB
Cyber Security - VOLUME 4/9. Operating System and Application Hardening/11. Monitoring for Security Drift.mp42.55MB
Cyber Security - VOLUME 4/10. Secure Deleting, Evidence Elimination and Anti-Forensics/1. Goals and Learning Objectives.mp46.5MB
Cyber Security - VOLUME 4/10. Secure Deleting, Evidence Elimination and Anti-Forensics/2. Secure File Deletion - Mechanical drives.mp419.69MB
Cyber Security - VOLUME 4/10. Secure Deleting, Evidence Elimination and Anti-Forensics/3. Secure File Deletion - Solid Sate Drives.mp412.1MB
Cyber Security - VOLUME 4/10. Secure Deleting, Evidence Elimination and Anti-Forensics/5. Evidence Elimination - CCleaner and Bleachit.mp418.27MB
Cyber Security - VOLUME 4/10. Secure Deleting, Evidence Elimination and Anti-Forensics/7. Disk Wiping - Mechanical Drives.mp411.44MB
Cyber Security - VOLUME 4/10. Secure Deleting, Evidence Elimination and Anti-Forensics/8. Disk Wiping - Solid State Drives (SSD).mp423.13MB
Cyber Security - VOLUME 4/10. Secure Deleting, Evidence Elimination and Anti-Forensics/9. Scrubbing EXIF & Metadata Part 1 - Introduction.mp416.24MB
Cyber Security - VOLUME 4/10. Secure Deleting, Evidence Elimination and Anti-Forensics/10. Scrubbing EXIF & Metadata Part 2 - Tools.mp420.45MB
Cyber Security - VOLUME 4/10. Secure Deleting, Evidence Elimination and Anti-Forensics/11. Scrubbing EXIF & Metadata Part 3 - Guidance.mp48.42MB
Cyber Security - VOLUME 4/10. Secure Deleting, Evidence Elimination and Anti-Forensics/12. Sensor Noise Camera Identification.mp49.02MB
Cyber Security - VOLUME 4/11. Email Security, Privacy and Anonymity/1. Goals and Learning Objectives.mp49.5MB
Cyber Security - VOLUME 4/11. Email Security, Privacy and Anonymity/2. Clients, Protocols and Authentication.mp438.18MB
Cyber Security - VOLUME 4/11. Email Security, Privacy and Anonymity/3. Email Weaknesses.mp430.78MB
Cyber Security - VOLUME 4/11. Email Security, Privacy and Anonymity/4. PGP, GPG & Privacy.mp412.99MB
Cyber Security - VOLUME 4/11. Email Security, Privacy and Anonymity/6. Windows - PGP & GPG.mp458.31MB
Cyber Security - VOLUME 4/11. Email Security, Privacy and Anonymity/7. Tail - PGP & GPG.mp49.67MB
Cyber Security - VOLUME 4/11. Email Security, Privacy and Anonymity/9. Improving OpenPGP Security - Best Practices - Part 1.mp45.57MB
Cyber Security - VOLUME 4/11. Email Security, Privacy and Anonymity/10. Improving OpenPGP Security - Primary and Subkeys - Part 2.mp428.71MB
Cyber Security - VOLUME 4/11. Email Security, Privacy and Anonymity/12. Email Tracking & Exploits.mp426.77MB
Cyber Security - VOLUME 4/11. Email Security, Privacy and Anonymity/13. Email Anonymity & Pseudonymity.mp415.9MB
Cyber Security - VOLUME 4/11. Email Security, Privacy and Anonymity/16. Choosing an Email Provider.mp437.38MB
Cyber Security - VOLUME 4/11. Email Security, Privacy and Anonymity/17. Email Alternatives.mp47.42MB
Cyber Security - VOLUME 4/12. Messengers - Security, Privacy and Anonymity/1. Goals and Learning Objectives.mp42.81MB
Cyber Security - VOLUME 4/12. Messengers - Security, Privacy and Anonymity/2. An Introduction to Instant Messengers.mp425.2MB
Cyber Security - VOLUME 4/12. Messengers - Security, Privacy and Anonymity/3. Instant Messenger - Signal.mp45.89MB
Cyber Security - VOLUME 4/12. Messengers - Security, Privacy and Anonymity/4. Instant Messengers - Chatsecure.mp44MB
Cyber Security - VOLUME 4/12. Messengers - Security, Privacy and Anonymity/5. Instant Messengers - Cryptocat.mp41.46MB
Cyber Security - VOLUME 4/12. Messengers - Security, Privacy and Anonymity/6. Instant Messengers - Ricochet.mp41.47MB
Cyber Security - VOLUME 4/12. Messengers - Security, Privacy and Anonymity/7. Instant Messengers - Other.mp41.54MB
Cyber Security - VOLUME 4/12. Messengers - Security, Privacy and Anonymity/8. Video and Voice Messengers - Linphone.mp411.51MB
Cyber Security - VOLUME 4/12. Messengers - Security, Privacy and Anonymity/9. Video and Voice Messengers - Jitsi.mp43.74MB
Cyber Security - VOLUME 4/12. Messengers - Security, Privacy and Anonymity/10. Video and Voice Messengers - Other.mp42.63MB
Cyber Security - VOLUME 4/13. Wrap Up/1. Congratulations!!.mp44.31MB
Cyber Security - VOLUME 4/13. Wrap Up/3. Qubes OS.mp456.32MB
Cyber Security - VOLUME 4/13. Wrap Up/4. Effective Network Isolation.mp428.05MB
Cyber Security - VOLUME 4/13. Wrap Up/5. Socks5 proxy tunneling.mp423MB