TorBT - Torrents and Magnet Links Search Engine

Udemy - The Complete Cyber Security Course Hackers Exposed! (3.2024)

File Name
Size
01. Introduction/5. Study Recommendations.mp4
64 MB
01. Introduction/3. Goals and Learning Objectives - Volume 1.mp4
48 MB
01. Introduction/2. Security Quick Win!.mp4
34 MB
01. Introduction/7. Cyber Security and Ethical Hacking Careers.mp4
33 MB
01. Introduction/4. Target Audience.mp4
28 MB
01. Introduction/6. Course updates.mp4
14 MB
01. Introduction/1. Welcome and Introduction to the Instructor!.mp4
13 MB
01. Introduction/2. Security Quick Win!.vtt
19 kB
01. Introduction/5. Study Recommendations.vtt
7.7 kB
01. Introduction/7. Cyber Security and Ethical Hacking Careers.vtt
5.3 kB
01. Introduction/4. Target Audience.vtt
3.2 kB
01. Introduction/3. Goals and Learning Objectives - Volume 1.vtt
3.1 kB
01. Introduction/1. Welcome and Introduction to the Instructor!.vtt
2.6 kB
01. Introduction/6. Course updates.vtt
956 B
01. Introduction/1. LinkedIn-Join-my-network.txt
40 B
01. Introduction/1. Nathans-Cyber-Security-Blog.txt
38 B
01. Introduction/2. https-www.stationx.net-canarytokens-.txt
38 B
01. Introduction/1. Nathans-Twitter-GotoNathan.txt
30 B
02. know Yourself - The Threat and Vulnerability Landscape/9. Confidentiality, Integrity and Availability - (Security Attributes).mp4
94 MB
02. know Yourself - The Threat and Vulnerability Landscape/7. Threat Modeling and Risk Assessments.mp4
61 MB
02. know Yourself - The Threat and Vulnerability Landscape/4. What is Privacy, Anonymity and Pseudonymity.mp4
43 MB
02. know Yourself - The Threat and Vulnerability Landscape/11. The Zero Trust Model.mp4
40 MB
02. know Yourself - The Threat and Vulnerability Landscape/5. Security, Vulnerabilities, Threats and Adversaries.mp4
36 MB
02. know Yourself - The Threat and Vulnerability Landscape/6. Asset Selection.mp4
25 MB
02. know Yourself - The Threat and Vulnerability Landscape/8. Security vs Privacy vs Anonymity - Can we have it all.mp4
16 MB
02. know Yourself - The Threat and Vulnerability Landscape/3. Protect What You Value.mp4
14 MB
02. know Yourself - The Threat and Vulnerability Landscape/10. Defense In Depth.mp4
6.0 MB
02. know Yourself - The Threat and Vulnerability Landscape/1. Theory and Practical.mp4
3.4 MB
02. know Yourself - The Threat and Vulnerability Landscape/2. Goals and Learning Objectives.mp4
1.8 MB
02. know Yourself - The Threat and Vulnerability Landscape/5. The Cyber Security Landscape Diagram.jpg
777 kB
02. know Yourself - The Threat and Vulnerability Landscape/9. Confidentiality, Integrity and Availability - (Security Attributes).vtt
12 kB
02. know Yourself - The Threat and Vulnerability Landscape/7. Threat Modeling and Risk Assessments.vtt
12 kB
02. know Yourself - The Threat and Vulnerability Landscape/4. What is Privacy, Anonymity and Pseudonymity.vtt
6.1 kB
02. know Yourself - The Threat and Vulnerability Landscape/3. Protect What You Value.vtt
6.1 kB
02. know Yourself - The Threat and Vulnerability Landscape/5. Security, Vulnerabilities, Threats and Adversaries.vtt
5.6 kB
02. know Yourself - The Threat and Vulnerability Landscape/11. The Zero Trust Model.vtt
5.1 kB
02. know Yourself - The Threat and Vulnerability Landscape/6. Asset Selection.vtt
4.4 kB
02. know Yourself - The Threat and Vulnerability Landscape/8. Security vs Privacy vs Anonymity - Can we have it all.vtt
2.9 kB
02. know Yourself - The Threat and Vulnerability Landscape/10. Defense In Depth.vtt
1.9 kB
02. know Yourself - The Threat and Vulnerability Landscape/1. Theory and Practical.vtt
1.7 kB
02. know Yourself - The Threat and Vulnerability Landscape/2. Goals and Learning Objectives.vtt
905 B
02. know Yourself - The Threat and Vulnerability Landscape/9. http-whatis.techtarget.com-definition-Confidentiality-integrity-and-availability-CIA.txt
86 B
02. know Yourself - The Threat and Vulnerability Landscape/9. https-en.wikipedia.org-wiki-Non-repudiation.txt
45 B
02. know Yourself - The Threat and Vulnerability Landscape/9. https-en.wikipedia.org-wiki-Parkerian-Hexad.txt
45 B
02. know Yourself - The Threat and Vulnerability Landscape/9. https-en.wikipedia.org-wiki-Authentication.txt
44 B
02. know Yourself - The Threat and Vulnerability Landscape/9. https-en.wikipedia.org-wiki-Authorization.txt
43 B
02. know Yourself - The Threat and Vulnerability Landscape/6. https-www.iso.org-standard-56742.html.txt
39 B
02. know Yourself - The Threat and Vulnerability Landscape/9. https-www.stationx.net-sabsa-.txt
31 B
02. know Yourself - The Threat and Vulnerability Landscape/6. https-www.stationx.net-sabsa-.txt
31 B
02. know Yourself - The Threat and Vulnerability Landscape/6. https-www.securityforum.org-.txt
30 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. Regulating encryption, mandating insecurity & legalizing spying.mp4
202 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4
112 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. Darknets, Dark Markets and Exploit kits.mp4
111 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. What is Phishing, Vishing and SMShing.mp4
98 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.mp4
97 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/13. Governments, spies and secret stuff part I.mp4
90 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4
89 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Governments, spies and secret stuff part II.mp4
70 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/10. Social engineering - Scams, cons, tricks and fraud.mp4
64 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. Why You Need Security – The Value Of A Hack.mp4
62 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware, viruses, rootkits and RATs.mp4
39 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4
38 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/5. Hackers, crackers and cyber criminals.mp4
32 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. Censorship.mp4
31 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spamming & Doxing.mp4
19 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. Cyber Threat Intelligence – Stay Informed.mp4
12 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. The Top 3 Things You Need To Stay Safe Online.mp4
6.5 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/1. Goals and Learning Objectives.mp4
2.8 MB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. Regulating encryption, mandating insecurity & legalizing spying.vtt
19 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. What is Phishing, Vishing and SMShing.vtt
18 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.vtt
14 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Governments, spies and secret stuff part II.vtt
13 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.vtt
13 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.vtt
12 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. Darknets, Dark Markets and Exploit kits.vtt
10 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware, viruses, rootkits and RATs.vtt
9.1 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. Why You Need Security – The Value Of A Hack.vtt
7.4 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/10. Social engineering - Scams, cons, tricks and fraud.vtt
7.3 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/13. Governments, spies and secret stuff part I.vtt
7.1 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.vtt
6.3 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spamming & Doxing.vtt
4.3 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/5. Hackers, crackers and cyber criminals.vtt
3.6 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. Censorship.vtt
3.3 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. The Top 3 Things You Need To Stay Safe Online.vtt
1.8 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. Cyber Threat Intelligence – Stay Informed.vtt
1.3 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/1. Goals and Learning Objectives.vtt
1.1 kB
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. NSA-Admits-It-Collects-Too-MUCH-Info-to-Stop-Terror-Attacks.txt
143 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/7. http-www.slate.com-articles-technology-bitwise-2015-02-lenovo-superfish-scandal-why-it-s-one-of-the-worst-consumer-computing-screw.html.txt
137 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/7. http-www.telegraph.co.uk-news-worldnews-northamerica-usa-11416985-Millions-of-computers-may-be-compromised-by-US-spyware-report.html.txt
134 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. https-www.csoonline.com-article-3213033-security-nsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.txt
132 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. Clipper-chip.txt
131 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. Kazakhstans-new-encryption-law.txt
124 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. https-arstechnica.com-information-technology-2018-01-now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners-.txt
123 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. http-searchenginewatch.com-sew-news-2351154-google-censorship-ruling-in-canada-has-worldwide-implications.txt
107 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Apple-removes-malware-infected-apps-from-the-app-store.txt
104 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. SophosLabs-2018-Malware-Forecast.txt
101 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. MATT-BLAZE-DECIPHERING-THE-DEBATE-OVER-ENCRYPTION.txt
99 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/7. https-securelist.com-analysis-quarterly-malware-reports-72493-it-threat-evolution-in-q3-2015-.txt
95 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. https-blog.torproject.org-blog-deterministic-builds-part-one-cyberwar-and-global-compromise.txt
93 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. A-Worldwide-Survey-of-E-ncryption-Products-xls.txt
93 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. https-www.engadget.com-2018-02-13-attackers-telegram-deliver-cryptocurrency-mining-malware-.txt
93 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. A-Worldwide-Survey-of-Encryption-Products-pdf.txt
92 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. Report-Keys-Under-Doormats-Mandating-insecurity-by-requiring-government-access-to-all-data-and-communication.txt
89 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. 7-most-common-RATs.txt
88 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. https-torrentfreak.com-pirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011-.txt
85 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Video-on-how-to-build-your-own-software-reproducibly.txt
81 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spam-example.txt
81 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Report-Spotlight-perils-of-malvertisements.txt
81 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. http-krebsonsecurity.com-2012-10-the-scrap-value-of-a-hacked-pc-revisited-.txt
76 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. http-cis-india.org-internet-governance-blog-how-india-regulates-encryption.txt
76 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. XSS-example-vulnerability.txt
75 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. http-bgr.com-2018-02-13-android-malware-mining-cryptocurrency-monero-xmr-.txt
75 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/7. http-www.mcafee.com-us-resources-reports-rp-quarterly-threat-q4-2014.pdf.txt
74 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. Homograph-attack-using-internationalized-domain-name.txt
73 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. http-blog.cryptographyengineering.com-2015-12-on-juniper-backdoor.html.txt
72 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. https-www.google.com-transparencyreport-removals-europeprivacy-hl-en.txt
71 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. http-krebsonsecurity.com-2013-06-the-value-of-a-hacked-email-account-.txt
71 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. https-www.google.com-transparencyreport-removals-government-hl-en.txt
68 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. Cryptocurrency-Mining-Malware-Infected-Over-Half-Million-PCs-Using-an-NSA-Exploit.txt
68 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/10. Top-10-scams.txt
66 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Examples-of-backdoors.txt
62 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. https-addons.mozilla.org-en-US-firefox-addon-ublock-origin-.txt
61 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. UK-data-communications-bill.txt
60 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. https-www.deepdotweb.com-dark-net-market-comparison-chart-.txt
60 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. https-thehackernews.com-2018-02-cryptojacking-malware.html.txt
60 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. https-addons.mozilla.org-en-GB-firefox-addon-no-coin-.txt
55 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Apple-backdoor-order.txt
51 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. WhatsApp-was-Banned-for-48-Hours-in-Brazil.txt
51 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. The-Case-against-Regulating-Encryption-Technology.txt
51 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. https-github.com-hoshsadiq-adblock-nocoin-list-.txt
49 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/10. http-www.actionfraud.police.uk-types-of-fraud.txt
47 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. https-cryptome.org-2014-01-nsa-codenames.htm.txt
46 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. Matt-Blaze-Speaking-to-a-US-congressional-committee.txt
46 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware-stats.txt
46 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. https-research.google.com-pubs-pub43963.html.txt
46 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Chef-Jamie-Oliver-s-website-hacked-for-the-third-time.txt
45 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Formal-methods.txt
44 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spam-stats.txt
43 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Through-a-PRISM-Darkly-Everything-we-know-about-NSA-spying-30c3-.txt
43 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. https-nsa.gov1.info-dni-nsa-ant-catalog-.txt
42 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/4. Exploit-Kit-Landscape-Map.txt
38 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/10. http-www.consumerfraudreporting.org.txt
37 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. https-wikileaks.org-Leaks.html.txt
34 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/4. https-www.exploit-db.com-search-.txt
34 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. https-reproducible-builds.org-.txt
32 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. http-www.stationx.net-alerts.txt
30 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/4. CVE-details.txt
27 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. Live-phishing-links.txt
26 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. http-www.nsaplayset.org-.txt
26 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. https-theintercept.com-.txt
25 B
03. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. https-coinhive.com-.txt
21 B
04. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4
139 MB
04. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4
119 MB
04. Encryption Crash Course/2. Symmetric Encryption.mp4
91 MB
04. Encryption Crash Course/12. Steganography.mp4
80 MB
04. Encryption Crash Course/7. SSL Stripping.mp4
66 MB
04. Encryption Crash Course/8. HTTPS (HTTP Secure).mp4
56 MB
04. Encryption Crash Course/4. Hash Functions.mp4
47 MB
04. Encryption Crash Course/3. Asymmetric Encryption.mp4
39 MB
04. Encryption Crash Course/9. Digital Certificates.mp4
31 MB
04. Encryption Crash Course/5. Digital Signatures.mp4
28 MB
04. Encryption Crash Course/13. How Security and Encryption is Really Attacked.mp4
12 MB
04. Encryption Crash Course/11. End-to-End Encryption (E2EE).mp4
3.3 MB
04. Encryption Crash Course/1. Goals and Learning Objectives.mp4
1.1 MB
04. Encryption Crash Course/10. Certificate Authorities and HTTPS.vtt
20 kB
04. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).vtt
17 kB
04. Encryption Crash Course/7. SSL Stripping.vtt
16 kB
04. Encryption Crash Course/3. Asymmetric Encryption.vtt
14 kB
04. Encryption Crash Course/2. Symmetric Encryption.vtt
12 kB
04. Encryption Crash Course/12. Steganography.vtt
11 kB
04. Encryption Crash Course/8. HTTPS (HTTP Secure).vtt
8.5 kB
04. Encryption Crash Course/9. Digital Certificates.vtt
7.5 kB
04. Encryption Crash Course/4. Hash Functions.vtt
7.4 kB
04. Encryption Crash Course/5. Digital Signatures.vtt
6.0 kB
04. Encryption Crash Course/13. How Security and Encryption is Really Attacked.vtt
3.7 kB
04. Encryption Crash Course/11. End-to-End Encryption (E2EE).vtt
2.6 kB
04. Encryption Crash Course/1. Goals and Learning Objectives.vtt
592 B
04. Encryption Crash Course/10. CA-example-mistake.txt
119 B
04. Encryption Crash Course/5. Windows-10-Device-Guard-using-Digital-Signatures.txt
113 B
04. Encryption Crash Course/13. Security-Pitfalls.txt
74 B
04. Encryption Crash Course/10. Certificate-patrol.txt
66 B
04. Encryption Crash Course/7. Intro-to-Sniffers.txt
66 B
04. Encryption Crash Course/7. Arpwatch-Tool-to-Monitor-Ethernet-Activity-in-Linux.txt
58 B
04. Encryption Crash Course/6. Steve-Gibsons-Cipher-Suite-Recommendations.txt
56 B
04. Encryption Crash Course/12. OpenPuff.txt
55 B
04. Encryption Crash Course/6. Wikipedia-Transport-Layer-Security-TLS-page.txt
54 B
04. Encryption Crash Course/8. Server-Name-Indication-SNI-Wiki.txt
52 B
04. Encryption Crash Course/6. Mozilla-Cipher-Suite-Recommendations.txt
49 B
04. Encryption Crash Course/7. SSL-Strip-tool-By-Moxie-Marlinspike.txt
46 B
04. Encryption Crash Course/12. OpenPuff-Manual.txt
46 B
04. Encryption Crash Course/5. https-www.symantec.com-en-uk-code-signing-.txt
46 B
04. Encryption Crash Course/10. SSL-Sniff.txt
46 B
04. Encryption Crash Course/10. CA-Ecosystem.txt
44 B
04. Encryption Crash Course/12. List-of-Steg-Tools.txt
44 B
04. Encryption Crash Course/4. Example-hashes.txt
43 B
04. Encryption Crash Course/10. Cert-Fingerprints.txt
36 B
04. Encryption Crash Course/6. Weakdh-Cipher-Suite-Recommendations.txt
32 B
04. Encryption Crash Course/7. sniffdet-Remote-Sniffer-Detection-Tool-Library.txt
32 B
04. Encryption Crash Course/7. WIFI-Pineapple.txt
30 B
04. Encryption Crash Course/7. Cain-Abel.txt
28 B
04. Encryption Crash Course/12. http-www.spammimic.com.txt
24 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4
98 MB
05. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4
88 MB
05. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4
74 MB
05. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali Linux 2018.mp4
41 MB
05. Setting up a Testing Environment Using Virtual Machines (Lab)/1. Goals and Learning Objectives.mp4
1.2 MB
05. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.vtt
13 kB
05. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.vtt
13 kB
05. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.vtt
13 kB
05. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali Linux 2018.vtt
6.0 kB
05. Setting up a Testing Environment Using Virtual Machines (Lab)/1. Goals and Learning Objectives.vtt
704 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Vmware-Network-Adapter-Settings.txt
130 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali-images-for-Virtualbox-or-VMware.txt
89 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/2. https-en.wikipedia.org-wiki-Comparison-of-platform-virtualization-software.txt
76 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Windows-VMs-here.txt
63 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali-on-Microsoft-App-Store-as-an-official-WSL.txt
62 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali-Arm-hardware.txt
57 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/3. http-www.vmware.com-products-workstation-compare.html.txt
55 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/3. http-www.vmware.com-products-player-faqs-faqs.html.txt
52 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali-AWS-appliance.txt
48 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Virtualbox-Network-Adapter-Settings.txt
43 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/2. http-www.osboxes.org-virtualbox-images-.txt
41 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/2. https-en.wikipedia.org-wiki-Hypervisor.txt
40 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/2. http-www.osboxes.org-vmware-images-.txt
37 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/2. https-marketplace.vmware.com-.txt
31 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/2. http-www.osboxes.org-guide-.txt
31 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali-iso-here-if-you-want-to-install-on-a-computers-hard-disk-or-live-boot-it.txt
31 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/2. http-virtualboxes.org-images-.txt
31 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/2. http-virtual-machine.org-.txt
27 B
05. Setting up a Testing Environment Using Virtual Machines (Lab)/4. https-www.virtualbox.org-.txt
27 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4
85 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp4
73 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp4
64 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp4
62 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4
55 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp4
45 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.mp4
43 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14. General Use Operating Systems (Windows, MacOS and Linux).mp4
36 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Mac - Privacy & Tracking.mp4
35 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.mp4
32 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).mp4
30 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. Linux and Unix “like” Operating systems.mp4
29 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).mp4
26 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Windows 10 – Cortana.mp4
22 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/2. Security Features and Functionality.mp4
19 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).mp4
16 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. Usage Share.mp4
15 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4
8.5 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4
7.4 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/1. Goals and Learning Objectives.mp4
1.6 MB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.vtt
12 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.vtt
9.2 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.vtt
9.1 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.vtt
8.4 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/2. Security Features and Functionality.vtt
8.2 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.vtt
7.3 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).vtt
7.3 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.vtt
7.0 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.vtt
6.8 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. Usage Share.vtt
6.5 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Mac - Privacy & Tracking.vtt
6.2 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14. General Use Operating Systems (Windows, MacOS and Linux).vtt
6.1 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.vtt
5.8 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Windows 10 – Cortana.vtt
4.7 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. Linux and Unix “like” Operating systems.vtt
4.6 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17. Anonymity Focused Operating Systems (Tails and Whonix OS).vtt
4.4 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).vtt
4.2 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).vtt
3.7 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. Penetration Testing and Ethical Hacking Focused Operating Systems.vtt
1.3 kB
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/1. Goals and Learning Objectives.vtt
852 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Washingtonpost-How-apples-os-x-yosemite-tracks-you.txt
152 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. https-blogs.windows.com-windowsexperience-2016-05-10-announcing-windows-10-insider-preview-build-14342-31Zq2yELkheC9HyV.99.txt
125 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. With-Windows-10-Microsoft-Blatantly-Disregards-User-Choice-and-Privacy-A-Deep-Dive.txt
113 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Report-Buying-Into-the-Bias-Why-Vulnerability-Statistics-Suck.txt
107 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. http-www.zdnet.com-article-how-to-block-windows-10-upgrades-on-your-business-network-and-at-home-too-.txt
103 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. How-to-disable-cortana-on-Windows-10.txt
86 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. SmartScreen-Filter-FAQ.txt
84 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Complete-guide-windows-10-privacy-settings.txt
73 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. How-to-Disable-Cortana-in-Windows-10-s-Anniversary-Update.txt
69 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Cortana-privacy-faq.txt
65 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Cortana-privacy-faq.txt
65 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. OS-usage-share.txt
64 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Microsoft-Service-Agreement.txt
62 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. https-github.com-10se1ucgo-DisableWinTracking-releases.txt
56 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Top-50-products-vs-security-bugs.txt
53 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Microsoft-Privacy-Statement.txt
53 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. https-github.com-fix-macosx-yosemite-phone-home.txt
49 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. https-github.com-karek314-macOS-home-call-drop.txt
48 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Microsoft-How-to-manage-Windows-10-notification-and-upgrade-options.txt
46 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16. Hardened-Gentoo-Linux-https-wiki.gentoo.org-wiki-Project-Hardened.txt
45 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. https-github.com-bitlog2-DisableWinTracking.txt
45 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. https-github.com-fix-macosx-net-monitor.txt
41 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. GWX-Control-Panel.txt
39 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16. Security-Enhanced-Linux-SELinux-https-github.com-SELinuxProject.txt
33 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19. iOS-https-developer.apple.com-ios-.txt
32 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20. Free-Debian-Books-and-Guides.txt
32 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20. Download-Debian.txt
31 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20. Debian-Live-CD-DVD.txt
31 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Never-10-by-Steve-Gibson-Use-this-.txt
31 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19. PureOS-Librem-5-https-puri.sm-shop-librem-5-.txt
30 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. Parrot-GNU-Linux-https-www.parrotsec.org-.txt
26 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16. Subgraph-OS-https-subgraph.com-sgos-.txt
26 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15. Archlinux-https-www.archlinux.org-.txt
26 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. https-www.archlinux.org-.txt
26 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16. Qubes-OS-https-www.qubes-os.org-.txt
25 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19. Replicant-Https-www.replicant.us-.txt
25 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17. Qubes-OS-https-www.qubes-os.org-.txt
25 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19. Android-https-www.android.com-.txt
24 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15. OpenBSD-https-www.openbsd.org-.txt
24 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19. OmniROM-https-www.omnirom.org-.txt
24 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. https-www.openbsd.org-.txt
24 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Fix-Mac-OS-X.txt
23 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. http-distrowatch.com-.txt
23 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15. Debian-https-www.debian.org-.txt
23 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. https-www.debian.org-.txt
23 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17. Whonix-https-www.whonix.org-.txt
23 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14. Ubuntu-https-www.ubuntu.com-.txt
23 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16. PureOS-https-www.pureos.net-.txt
23 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17. Tails-OS-https-tails.boum.org-.txt
23 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. Pentoo-https-www.pentoo.ch-.txt
22 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16. Trisquel-OS-https-trisquel.info-.txt
22 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14. Linux-Mint-https-linuxmint.com-.txt
22 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19. LineageOS-https-lineageos.org-.txt
22 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. BlackArch-Linux-https-blackarch.org-.txt
22 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. Kali-Linux-https-www.kali.org-.txt
21 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16. Astra-Linux-http-astralinux.ru-.txt
21 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. BackBox-Linux-https-backbox.org-.txt
20 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14. Manjaro-https-manjaro.org-.txt
20 B
06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19. MicroG-https-microg.org-.txt
19 B
07. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.mp4
81 MB
07. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4
57 MB
07. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.mp4
48 MB
07. Security Bugs and Vulnerabilities/9. Mac - Patching.mp4
47 MB
07. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.mp4
43 MB
07. Security Bugs and Vulnerabilities/2. The Importance of Patching.mp4
20 MB
07. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.mp4
6.0 MB
07. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.mp4
5.6 MB
07. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.mp4
4.2 MB
07. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.mp4
3.9 MB
07. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.mp4
3.9 MB
07. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.mp4
3.2 MB
07. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.mp4
1.1 MB
07. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.vtt
15 kB
07. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.vtt
11 kB
07. Security Bugs and Vulnerabilities/9. Mac - Patching.vtt
9.2 kB
07. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.vtt
6.0 kB
07. Security Bugs and Vulnerabilities/2. The Importance of Patching.vtt
5.8 kB
07. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.vtt
4.1 kB
07. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.vtt
2.7 kB
07. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.vtt
1.8 kB
07. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.vtt
1.8 kB
07. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.vtt
1.7 kB
07. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.vtt
1.6 kB
07. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.vtt
1.0 kB
07. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.vtt
584 B
07. Security Bugs and Vulnerabilities/6. Patch-Tuesday-may-be-dead-but-Microsofts-not-confessing-to-the-crime.txt
136 B
07. Security Bugs and Vulnerabilities/6. Windows-10-Ditches-Patch-Tuesday-for-Securitys-Sake.txt
117 B
07. Security Bugs and Vulnerabilities/7. Flexera-Personal-Software-Inspector-Previously-Secunia-PSI.txt
113 B
07. Security Bugs and Vulnerabilities/9. igeekblogs-How-to-enable-updates.txt
73 B
07. Security Bugs and Vulnerabilities/8. Automatic-Security-Updates.txt
58 B
07. Security Bugs and Vulnerabilities/6. Microsoft-Security-Bulletins.txt
54 B
07. Security Bugs and Vulnerabilities/8. Software-distributions-based-on-Debian.txt
44 B
07. Security Bugs and Vulnerabilities/9. Apple-security-updates.txt
40 B
07. Security Bugs and Vulnerabilities/8. Debian-Security-Page.txt
32 B
07. Security Bugs and Vulnerabilities/9. Mac-Update.txt
25 B
07. Security Bugs and Vulnerabilities/6. Common-Vulnerabilities-and-Exposures.txt
24 B
07. Security Bugs and Vulnerabilities/6. National-vulnerability-database.txt
24 B
07. Security Bugs and Vulnerabilities/9. http-brew.sh-.txt
15 B
08. Reducing Threat Privilege/1. Goals and Learning Objectives - Removing Privilege.mp4
31 MB
08. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.mp4
17 MB
08. Reducing Threat Privilege/2. Windows 7 - Not using admin.mp4
14 MB
08. Reducing Threat Privilege/4. Windows 10 - Not using admin.mp4
10 MB
08. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.vtt
5.6 kB
08. Reducing Threat Privilege/2. Windows 7 - Not using admin.vtt
5.0 kB
08. Reducing Threat Privilege/4. Windows 10 - Not using admin.vtt
4.6 kB
08. Reducing Threat Privilege/1. Goals and Learning Objectives - Removing Privilege.vtt
3.7 kB
09. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.mp4
112 MB
09. Social Engineering and Social Media Offence and Defence/5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4
60 MB
09. Social Engineering and Social Media Offence and Defence/3. Identify Verification and Registration.mp4
35 MB
09. Social Engineering and Social Media Offence and Defence/4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4
22 MB
09. Social Engineering and Social Media Offence and Defence/6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp4
19 MB
09. Social Engineering and Social Media Offence and Defence/1. Goals and Learning Objectives.mp4
1.7 MB
09. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.vtt
22 kB
09. Social Engineering and Social Media Offence and Defence/5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.vtt
18 kB
09. Social Engineering and Social Media Offence and Defence/4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.vtt
13 kB
09. Social Engineering and Social Media Offence and Defence/3. Identify Verification and Registration.vtt
8.4 kB
09. Social Engineering and Social Media Offence and Defence/6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).vtt
8.3 kB
09. Social Engineering and Social Media Offence and Defence/1. Goals and Learning Objectives.vtt
639 B
09. Social Engineering and Social Media Offence and Defence/2. http-www.telegraph.co.uk-technology-social-media-9780565-Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html.txt
127 B
09. Social Engineering and Social Media Offence and Defence/2. The-complete-guide-to-facebook-privacy-settings.txt
75 B
09. Social Engineering and Social Media Offence and Defence/3. Top-10-sites-receive-sms-online-without-phone.txt
74 B
09. Social Engineering and Social Media Offence and Defence/2. List-of-Personally-Identifiable-Information-PII-.txt
73 B
09. Social Engineering and Social Media Offence and Defence/2. https-www.eff.org-who-has-your-back-government-data-requests-2015.txt
67 B
09. Social Engineering and Social Media Offence and Defence/6. http-www.consumerfraudreporting.org-credit-freeze-summary.php.txt
63 B
09. Social Engineering and Social Media Offence and Defence/5. https-www.virustotal.com-en-documentation-email-submissions-.txt
62 B
09. Social Engineering and Social Media Offence and Defence/2. Twitter-Privacy-Settings.txt
59 B
09. Social Engineering and Social Media Offence and Defence/5. How-to-Get-Email-Headers.txt
50 B
09. Social Engineering and Social Media Offence and Defence/6. http-www.actionfraud.police.uk-types-of-fraud.txt
47 B
09. Social Engineering and Social Media Offence and Defence/3. http-10minutemail.com-10MinuteMail-index.html.txt
47 B
09. Social Engineering and Social Media Offence and Defence/5. https-whois.domaintools.com-bbc.co.uk.txt
39 B
09. Social Engineering and Social Media Offence and Defence/5. https-whois.domaintools.com-blob.com.txt
38 B
09. Social Engineering and Social Media Offence and Defence/3. Example-SMS-recieve-online-site.txt
35 B
09. Social Engineering and Social Media Offence and Defence/4. http-www.google.com.stationx.net.txt
34 B
09. Social Engineering and Social Media Offence and Defence/3. https-www.guerrillamail.com-.txt
31 B
09. Social Engineering and Social Media Offence and Defence/2. https-diasporafoundation.org-.txt
31 B
09. Social Engineering and Social Media Offence and Defence/3. https-www.trash-mail.com-en-.txt
30 B
09. Social Engineering and Social Media Offence and Defence/6. http-www.scambusters.org-.txt
27 B
09. Social Engineering and Social Media Offence and Defence/3. http-www.mytrashmail.com-.txt
27 B
09. Social Engineering and Social Media Offence and Defence/3. http-www.dispostable.com-.txt
27 B
09. Social Engineering and Social Media Offence and Defence/2. https-gnu.io-social-try-.txt
26 B
09. Social Engineering and Social Media Offence and Defence/5. https-www.parsemail.org-.txt
26 B
09. Social Engineering and Social Media Offence and Defence/3. http-www.mailexpire.com-.txt
26 B
09. Social Engineering and Social Media Offence and Defence/3. http-www.tempinbox.com.txt
24 B
09. Social Engineering and Social Media Offence and Defence/3. https-mailinator.com-.txt
23 B
09. Social Engineering and Social Media Offence and Defence/4. http-www.urlvoid.com-.txt
23 B
09. Social Engineering and Social Media Offence and Defence/3. http-www.migmail.net-.txt
23 B
09. Social Engineering and Social Media Offence and Defence/3. http-getairmail.com-.txt
22 B
09. Social Engineering and Social Media Offence and Defence/3. http-crapmail.dk-en-.txt
22 B
09. Social Engineering and Social Media Offence and Defence/2. http-friendica.com-.txt
21 B
09. Social Engineering and Social Media Offence and Defence/3. http-dontmail.net-.txt
20 B
09. Social Engineering and Social Media Offence and Defence/3. http-bugmenot.com-.txt
20 B
09. Social Engineering and Social Media Offence and Defence/3. https-anonbox.net-.txt
20 B
09. Social Engineering and Social Media Offence and Defence/3. http-freemail.ms-.txt
19 B
09. Social Engineering and Social Media Offence and Defence/2. https-tosdr.org-.txt
18 B
10. Security Domains/2. Security Domains.mp4
26 MB
10. Security Domains/1. Goals and Learning Objectives.mp4
935 kB
10. Security Domains/2. Security Domains.vtt
15 kB
10. Security Domains/1. Goals and Learning Objectives.vtt
463 B
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4
163 MB
11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4
123 MB
11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.mp4
86 MB
11. Security Through Isolation and Compartmentalization/12. Virtual Machines.mp4
84 MB
11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4
77 MB
11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.mp4
68 MB
11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.mp4
54 MB
11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.mp4
44 MB
11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.mp4
40 MB
11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.mp4
38 MB
11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.mp4
33 MB
11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.mp4
31 MB
11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.mp4
29 MB
11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.mp4
24 MB
11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.mp4
18 MB
11. Security Through Isolation and Compartmentalization/6. Dual Boot.mp4
10 MB
11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.mp4
5.8 MB
11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.mp4
1.6 MB
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.vtt
28 kB
11. Security Through Isolation and Compartmentalization/17. Qubes OS.vtt
26 kB
11. Security Through Isolation and Compartmentalization/12. Virtual Machines.vtt
17 kB
11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.vtt
16 kB
11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.vtt
15 kB
11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.vtt
15 kB
11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.vtt
13 kB
11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.vtt
13 kB
11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.vtt
9.9 kB
11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.vtt
8.8 kB
11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.vtt
7.5 kB
11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.vtt
6.6 kB
11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.vtt
6.2 kB
11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.vtt
4.4 kB
11. Security Through Isolation and Compartmentalization/6. Dual Boot.vtt
4.4 kB
11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.vtt
3.6 kB
11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.vtt
3.0 kB
11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.vtt
758 B
11. Security Through Isolation and Compartmentalization/11. Mac-OS-X-App-Sandbox.txt
132 B
11. Security Through Isolation and Compartmentalization/16. Whonixs-lack-of-an-Amnesic-feature.txt
129 B
11. Security Through Isolation and Compartmentalization/6. Dual-Booting-explained.txt
116 B
11. Security Through Isolation and Compartmentalization/11. How-to-run-your-Applications-in-a-Mac-OS-X-sandbox-to-enhance-security.txt
115 B
11. Security Through Isolation and Compartmentalization/11. Sandbox-Man-page.txt
104 B
11. Security Through Isolation and Compartmentalization/13. A-look-at-malware-with-VM-detection.txt
100 B
11. Security Through Isolation and Compartmentalization/13. Exploiting-dram-rowhammer-Could-be-used-on-VMs-in-the-future-.txt
91 B
11. Security Through Isolation and Compartmentalization/18. Partitioning-my-digital-life-into-security-domains.txt
84 B
11. Security Through Isolation and Compartmentalization/9. Introduction-and-quick-guide-sandboxie.txt
82 B
11. Security Through Isolation and Compartmentalization/3. Mac-OS-X-How-to-change-the-mac-address.txt
80 B
11. Security Through Isolation and Compartmentalization/11. Apple-Sandbox-Guide.txt
78 B
11. Security Through Isolation and Compartmentalization/12. Wikipedia-Comparison-of-platform-virtualization-software.txt
76 B
11. Security Through Isolation and Compartmentalization/3. Linux-How-to-use-macchanger.txt
71 B
11. Security Through Isolation and Compartmentalization/11. Firefox-profile.txt
71 B
11. Security Through Isolation and Compartmentalization/3. Diagram-of-Mac.txt
70 B
11. Security Through Isolation and Compartmentalization/15. How-to-implement-physical-isolation.txt
70 B
11. Security Through Isolation and Compartmentalization/8. Deepfreeze-Cloud-Browser-and-Desktop.txt
68 B
11. Security Through Isolation and Compartmentalization/11. SuperDuper.txt
66 B
11. Security Through Isolation and Compartmentalization/13. Example-VMware-security-bug.txt
62 B
11. Security Through Isolation and Compartmentalization/8. Deepfreeze-Standard.txt
60 B
11. Security Through Isolation and Compartmentalization/7. Chromium-sandbox-design.txt
60 B
11. Security Through Isolation and Compartmentalization/4. Mac-OS-X-Mac-Cupid.txt
59 B
11. Security Through Isolation and Compartmentalization/4. Mac-OS-X-Installing-dmidecode-with-brew.txt
58 B
11. Security Through Isolation and Compartmentalization/11. OSX-Sandbox-Seatbelt-Profiles.txt
58 B
11. Security Through Isolation and Compartmentalization/12. Wikipedia-Kernel-based-Virtual-Machine.txt
58 B
11. Security Through Isolation and Compartmentalization/8. Returnil.txt
57 B
11. Security Through Isolation and Compartmentalization/10. Script-Sandfox.txt
57 B
11. Security Through Isolation and Compartmentalization/9. Sandboxie-guide.txt
57 B
11. Security Through Isolation and Compartmentalization/15. Whonix-VM-snapshots.txt
55 B
11. Security Through Isolation and Compartmentalization/4. Windows-dmidecode.txt
54 B
11. Security Through Isolation and Compartmentalization/8. BufferZone.txt
51 B
11. Security Through Isolation and Compartmentalization/15. If-setting-up-your-own-workstations-MUST-READ.txt
51 B
11. Security Through Isolation and Compartmentalization/13. Report-Cross-VM-Side-Channels-and-Their-Use-to-Extract-Pr-ivate-Keys.txt
49 B
11. Security Through Isolation and Compartmentalization/8. Comodo.txt
49 B
11. Security Through Isolation and Compartmentalization/14. Convert-VM-to-ISO.txt
48 B
11. Security Through Isolation and Compartmentalization/13. https-en.wikipedia.org-wiki-X86-virtualization.txt
48 B
11. Security Through Isolation and Compartmentalization/3. Mac-OS-X-Macdaddyx.txt
48 B
11. Security Through Isolation and Compartmentalization/5. Aegis-Secure-Key-USB-2.0-Flash-Drive.txt
47 B
11. Security Through Isolation and Compartmentalization/15. ARM-Anonymizing-relay-monitor.txt
47 B
11. Security Through Isolation and Compartmentalization/17. Windows-templates.txt
47 B
11. Security Through Isolation and Compartmentalization/17. Debian-template-s-.txt
46 B
11. Security Through Isolation and Compartmentalization/9. Sandboxie-How-it-Works.txt
45 B
11. Security Through Isolation and Compartmentalization/17. Whonix-templates.txt
44 B
11. Security Through Isolation and Compartmentalization/17. Librem-13-laptop.txt
44 B
11. Security Through Isolation and Compartmentalization/10. Apparmor.txt
44 B
11. Security Through Isolation and Compartmentalization/13. https-en.wikipedia.org-wiki-Timing-channel.txt
44 B
11. Security Through Isolation and Compartmentalization/15. Whonix-Stream-Isolation.txt
44 B
11. Security Through Isolation and Compartmentalization/13. https-en.wikipedia.org-wiki-Covert-channel.txt
44 B
11. Security Through Isolation and Compartmentalization/4. Windows-CPU-Z.txt
42 B
11. Security Through Isolation and Compartmentalization/7. Mozilla-Sandbox-design.txt
41 B
11. Security Through Isolation and Compartmentalization/12. Wikipedia-Hypervisor.txt
40 B
11. Security Through Isolation and Compartmentalization/17. Split-GPG.txt
39 B
11. Security Through Isolation and Compartmentalization/15. Whonix-Check.txt
39 B
11. Security Through Isolation and Compartmentalization/15. Whonix-and-virtualbox.txt
38 B
11. Security Through Isolation and Compartmentalization/12. KVM-Debian-Jessie.txt
37 B
11. Security Through Isolation and Compartmentalization/5. Authentic8.txt
36 B
11. Security Through Isolation and Compartmentalization/11. Buckle-Up.txt
36 B
11. Security Through Isolation and Compartmentalization/15. Whonix-Features.txt
36 B
11. Security Through Isolation and Compartmentalization/12. Turnkey-Linux-Openvpn.txt
36 B
11. Security Through Isolation and Compartmentalization/17. Disposable-VMs-DispVMs-.txt
36 B
11. Security Through Isolation and Compartmentalization/9. Sandboxie-forum.txt
35 B
11. Security Through Isolation and Compartmentalization/16. Whonix-Warnings.txt
35 B
11. Security Through Isolation and Compartmentalization/10. Linux-Sandbox.txt
35 B
11. Security Through Isolation and Compartmentalization/17. Qubes-Download.txt
35 B
11. Security Through Isolation and Compartmentalization/4. Linux-and-Mac-OS-X-dmidecode.txt
32 B
11. Security Through Isolation and Compartmentalization/10. Firejail.txt
31 B
11. Security Through Isolation and Compartmentalization/8. f-sandbox.txt
31 B
11. Security Through Isolation and Compartmentalization/8. Shadowdefender.txt
30 B
11. Security Through Isolation and Compartmentalization/17. Video-Tour-of-Qubes.txt
30 B
11. Security Through Isolation and Compartmentalization/5. Spikes.txt
30 B
11. Security Through Isolation and Compartmentalization/17. Qubes-docs.txt
29 B
11. Security Through Isolation and Compartmentalization/12. OpenVZ.txt
29 B
11. Security Through Isolation and Compartmentalization/17. Hardware-Compatibility-List-HCL-.txt
29 B
11. Security Through Isolation and Compartmentalization/13. Venom.txt
29 B
11. Security Through Isolation and Compartmentalization/5. Pen-Drive-Apps.txt
28 B
11. Security Through Isolation and Compartmentalization/3. Windows-Tmac.txt
28 B
11. Security Through Isolation and Compartmentalization/5. Spoons.net.txt
27 B
11. Security Through Isolation and Compartmentalization/4. Linux-i-nex.txt
27 B
11. Security Through Isolation and Compartmentalization/10. Trusted-BSD.txt
26 B
11. Security Through Isolation and Compartmentalization/4. https-www.nitrokey.com-.txt
26 B
11. Security Through Isolation and Compartmentalization/12. Virt-Manager.txt
25 B
11. Security Through Isolation and Compartmentalization/5. Portable-Apps.txt
24 B
11. Security Through Isolation and Compartmentalization/15. https-www.whonix.org-.txt
23 B
11. Security Through Isolation and Compartmentalization/4. https-www.yubico.com-.txt
23 B
11. Security Through Isolation and Compartmentalization/5. Maxthon.txt
23 B
11. Security Through Isolation and Compartmentalization/3. Mac-OS-X-Wifispoof.txt
22 B
12. Wrap Up/3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4
127 MB
12. Wrap Up/6. Sample from Vol 4 - Email clients, protocols and authentication.mp4
110 MB
12. Wrap Up/4. Sample from Vol 2 - Password cracking part 2.mp4
78 MB
12. Wrap Up/5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4
60 MB
12. Wrap Up/1. Congratulations.mp4
10 MB
12. Wrap Up/2. Certificate Of Completion for CPEs.mp4
4.4 MB
12. Wrap Up/3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).vtt
22 kB
12. Wrap Up/5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.vtt
21 kB
12. Wrap Up/6. Sample from Vol 4 - Email clients, protocols and authentication.vtt
19 kB
12. Wrap Up/4. Sample from Vol 2 - Password cracking part 2.vtt
12 kB
12. Wrap Up/1. Congratulations.vtt
1.4 kB
12. Wrap Up/2. Certificate Of Completion for CPEs.vtt
1.3 kB
12. Wrap Up/1. Link-to-The-Complete-Cyber-Security-Course-Volume-II-Network-security-discount-coupon-studentdiscount25.txt
75 B
12. Wrap Up/2. https-www.stationx.net-certificate-request-.txt
45 B
13. BONUS Section/1. 2020-08-06_11-48-05-d0d12b6c3a68728281c4fa068994059e.png
240 kB
13. BONUS Section/1. BONUS.html
1.2 kB