TorBT - Torrents and Magnet Links Search Engine
Linkedin - Complete Guide to Open Source Security
- Date: 2026-03-18
- Size: 925 MB
- Files: 186
File Name
Size
11 - 10. Threat Intelligence/05 - Connecting threat intelligence sources to OpenCTI.mp4
27 MB
01 - Introduction/01 - Introduction to complete open source security.srt
1.5 kB
01 - Introduction/02 - What you should know.mp4
1.0 MB
01 - Introduction/02 - What you should know.srt
1.3 kB
01 - Introduction/03 - Disclaimer.mp4
1.1 MB
01 - Introduction/03 - Disclaimer.srt
1.3 kB
02 - 1. Open Source Software/01 - Open source security software.mp4
4.4 MB
02 - 1. Open Source Software/01 - Open source security software.srt
4.4 kB
02 - 1. Open Source Software/02 - Open source software licensing.mp4
3.9 MB
02 - 1. Open Source Software/02 - Open source software licensing.srt
4.1 kB
02 - 1. Open Source Software/03 - Installing and testing open source security tools.mp4
2.1 MB
02 - 1. Open Source Software/03 - Installing and testing open source security tools.srt
2.1 kB
02 - 1. Open Source Software/04 - The Proxmox virtualization system.mp4
12 MB
02 - 1. Open Source Software/04 - The Proxmox virtualization system.srt
8.0 kB
02 - 1. Open Source Software/05 - Installing Kali Linux.mp4
15 MB
02 - 1. Open Source Software/05 - Installing Kali Linux.srt
8.2 kB
02 - 1. Open Source Software/06 - Using the application menu.mp4
12 MB
02 - 1. Open Source Software/06 - Using the application menu.srt
8.4 kB
02 - 1. Open Source Software/07 - Installing additional tools.mp4
6.4 MB
02 - 1. Open Source Software/07 - Installing additional tools.srt
2.7 kB
02 - 1. Open Source Software/08 - Introduction to the Kali Purple workstation.mp4
16 MB
02 - 1. Open Source Software/08 - Introduction to the Kali Purple workstation.srt
11 kB
02 - 1. Open Source Software/09 - Introduction to the Kali Purple server.mp4
8.2 MB
02 - 1. Open Source Software/09 - Introduction to the Kali Purple server.srt
8.8 kB
02 - 1. Open Source Software/10 - Creating a Kali Purple server template.mp4
4.6 MB
02 - 1. Open Source Software/10 - Creating a Kali Purple server template.srt
4.0 kB
02 - 1. Open Source Software/11 - Software component security.mp4
12 MB
02 - 1. Open Source Software/11 - Software component security.srt
9.1 kB
02 - 1. Open Source Software/12 - Scanning with an automated SCA tool.mp4
4.5 MB
02 - 1. Open Source Software/12 - Scanning with an automated SCA tool.srt
3.2 kB
03 - 2. Governance and Risk Tools/01 - Introduction to GRC.mp4
1.7 MB
03 - 2. Governance and Risk Tools/01 - Introduction to GRC.srt
1.9 kB
03 - 2. Governance and Risk Tools/02 - Architecting with ArchiMate.mp4
12 MB
03 - 2. Governance and Risk Tools/02 - Architecting with ArchiMate.srt
5.5 kB
03 - 2. Governance and Risk Tools/03 - Modelling security with Archi.mp4
5.9 MB
03 - 2. Governance and Risk Tools/03 - Modelling security with Archi.srt
3.5 kB
03 - 2. Governance and Risk Tools/04 - Adding security to the model.mp4
7.6 MB
03 - 2. Governance and Risk Tools/04 - Adding security to the model.srt
2.5 kB
03 - 2. Governance and Risk Tools/05 - Security risk management with SimpleRisk.mp4
6.1 MB
03 - 2. Governance and Risk Tools/05 - Security risk management with SimpleRisk.srt
3.7 kB
03 - 2. Governance and Risk Tools/06 - Taking SimpleRisk for a spin.mp4
16 MB
03 - 2. Governance and Risk Tools/06 - Taking SimpleRisk for a spin.srt
8.0 kB
03 - 2. Governance and Risk Tools/07 - Using eramba for GRC.mp4
8.6 MB
03 - 2. Governance and Risk Tools/07 - Using eramba for GRC.srt
3.6 kB
03 - 2. Governance and Risk Tools/08 - Configuring the eramba system.mp4
19 MB
03 - 2. Governance and Risk Tools/08 - Configuring the eramba system.srt
7.8 kB
03 - 2. Governance and Risk Tools/09 - Preparing your risk context.mp4
19 MB
03 - 2. Governance and Risk Tools/09 - Preparing your risk context.srt
6.9 kB
03 - 2. Governance and Risk Tools/10 - Setting up your assets.mp4
6.9 MB
03 - 2. Governance and Risk Tools/10 - Setting up your assets.srt
3.2 kB
03 - 2. Governance and Risk Tools/11 - Entering risks into eramba.mp4
7.5 MB
03 - 2. Governance and Risk Tools/11 - Entering risks into eramba.srt
3.0 kB
04 - 3. Identity Solutions/01 - Introduction to identities.mp4
5.0 MB
04 - 3. Identity Solutions/01 - Introduction to identities.srt
4.4 kB
04 - 3. Identity Solutions/02 - Installing ZITADEL.mp4
13 MB
04 - 3. Identity Solutions/02 - Installing ZITADEL.srt
3.3 kB
04 - 3. Identity Solutions/03 - Setting up the ZITADEL directory.mp4
10 MB
04 - 3. Identity Solutions/03 - Setting up the ZITADEL directory.srt
5.7 kB
04 - 3. Identity Solutions/04 - Authorizing access with ZITADEL.mp4
7.3 MB
04 - 3. Identity Solutions/04 - Authorizing access with ZITADEL.srt
3.6 kB
05 - 4. Firewalls/01 - A survey of open source firewalls.mp4
11 MB
05 - 4. Firewalls/01 - A survey of open source firewalls.srt
4.9 kB
05 - 4. Firewalls/02 - The basics of firewall operation.mp4
2.8 MB
05 - 4. Firewalls/02 - The basics of firewall operation.srt
3.2 kB
05 - 4. Firewalls/03 - Installing pfSense.mp4
14 MB
05 - 4. Firewalls/03 - Installing pfSense.srt
5.6 kB
05 - 4. Firewalls/04 - Accessing the DMZ via pfSense.mp4
12 MB
05 - 4. Firewalls/04 - Accessing the DMZ via pfSense.srt
5.6 kB
05 - 4. Firewalls/05 - Installing the IPFire firewall.mp4
14 MB
05 - 4. Firewalls/05 - Installing the IPFire firewall.srt
5.6 kB
05 - 4. Firewalls/06 - Up and running with IPFire.mp4
4.7 MB
05 - 4. Firewalls/06 - Up and running with IPFire.srt
2.9 kB
05 - 4. Firewalls/07 - Installing NethSecurity.mp4
21 MB
05 - 4. Firewalls/07 - Installing NethSecurity.srt
5.2 kB
05 - 4. Firewalls/08 - Configuring the zones.mp4
7.0 MB
05 - 4. Firewalls/08 - Configuring the zones.srt
4.2 kB
05 - 4. Firewalls/09 - Configuring the NethSecurity lab.mp4
4.9 MB
05 - 4. Firewalls/09 - Configuring the NethSecurity lab.srt
2.8 kB
05 - 4. Firewalls/10 - Opening up the file server.mp4
7.3 MB
05 - 4. Firewalls/10 - Opening up the file server.srt
3.7 kB
05 - 4. Firewalls/11 - Activating the LAN DHCP.mp4
3.1 MB
05 - 4. Firewalls/11 - Activating the LAN DHCP.srt
1.9 kB
06 - 5. Proxy, IDS, and Web Services/01 - Setting up Nginx as a proxy server.mp4
15 MB
06 - 5. Proxy, IDS, and Web Services/01 - Setting up Nginx as a proxy server.srt
6.4 kB
06 - 5. Proxy, IDS, and Web Services/02 - Adding Suricata IDS to the proxy.mp4
7.0 MB
06 - 5. Proxy, IDS, and Web Services/02 - Adding Suricata IDS to the proxy.srt
2.4 kB
06 - 5. Proxy, IDS, and Web Services/03 - Setting up a public web server.mp4
9.2 MB
06 - 5. Proxy, IDS, and Web Services/03 - Setting up a public web server.srt
3.5 kB
06 - 5. Proxy, IDS, and Web Services/04 - Testing the efficacy of web protection.mp4
5.6 MB
06 - 5. Proxy, IDS, and Web Services/04 - Testing the efficacy of web protection.srt
2.3 kB
07 - 6. Vulnerability Scanning/01 - Installing GVM.mp4
8.8 MB
07 - 6. Vulnerability Scanning/01 - Installing GVM.srt
4.1 kB
07 - 6. Vulnerability Scanning/02 - Running a vulnerability scan with GVM.mp4
8.9 MB
07 - 6. Vulnerability Scanning/02 - Running a vulnerability scan with GVM.srt
5.3 kB
08 - 7. Security Assurance/01 - Installing the Wazuh SIEM.mp4
13 MB
08 - 7. Security Assurance/01 - Installing the Wazuh SIEM.srt
5.5 kB
08 - 7. Security Assurance/02 - Installing a Wazuh Linux agent.mp4
8.5 MB
08 - 7. Security Assurance/02 - Installing a Wazuh Linux agent.srt
3.9 kB
08 - 7. Security Assurance/03 - Installing a Wazuh Windows agent.mp4
3.1 MB
08 - 7. Security Assurance/03 - Installing a Wazuh Windows agent.srt
1.3 kB
08 - 7. Security Assurance/04 - Collecting Nginx logs in Wazuh.mp4
12 MB
08 - 7. Security Assurance/04 - Collecting Nginx logs in Wazuh.srt
7.1 kB
08 - 7. Security Assurance/05 - Monitoring an attack with Wazuh.mp4
9.9 MB
08 - 7. Security Assurance/05 - Monitoring an attack with Wazuh.srt
5.9 kB
08 - 7. Security Assurance/06 - Detecting web shells with Wazuh.mp4
18 MB
08 - 7. Security Assurance/06 - Detecting web shells with Wazuh.srt
9.2 kB
08 - 7. Security Assurance/07 - Activating vulnerability scanning.mp4
10 MB
08 - 7. Security Assurance/07 - Activating vulnerability scanning.srt
3.5 kB
09 - 8. Security Log Monitoring/01 - Installing the ELK Stack SIEM.mp4
21 MB
09 - 8. Security Log Monitoring/01 - Installing the ELK Stack SIEM.srt
8.1 kB
09 - 8. Security Log Monitoring/02 - Upgrading Kibana to HTTPS.mp4
14 MB
09 - 8. Security Log Monitoring/02 - Upgrading Kibana to HTTPS.srt
5.3 kB
09 - 8. Security Log Monitoring/03 - Configuring log integrations.mp4
9.4 MB
09 - 8. Security Log Monitoring/03 - Configuring log integrations.srt
4.5 kB
09 - 8. Security Log Monitoring/04 - Installing the Fleet server.mp4
6.6 MB
09 - 8. Security Log Monitoring/04 - Installing the Fleet server.srt
3.0 kB
09 - 8. Security Log Monitoring/05 - Enrolling hosts into the Fleet server.mp4
14 MB
09 - 8. Security Log Monitoring/05 - Enrolling hosts into the Fleet server.srt
7.4 kB
09 - 8. Security Log Monitoring/06 - Enhancing your logs.mp4
18 MB
09 - 8. Security Log Monitoring/06 - Enhancing your logs.srt
7.6 kB
09 - 8. Security Log Monitoring/07 - Detecting reconnaissance with the ELK Stack.mp4
19 MB
09 - 8. Security Log Monitoring/07 - Detecting reconnaissance with the ELK Stack.srt
8.5 kB
09 - 8. Security Log Monitoring/08 - Detecting exploitation with the ELK Stack.mp4
12 MB
09 - 8. Security Log Monitoring/08 - Detecting exploitation with the ELK Stack.srt
5.4 kB
09 - 8. Security Log Monitoring/09 - Monitoring alerts with the ELK Stack.mp4
10 MB
09 - 8. Security Log Monitoring/09 - Monitoring alerts with the ELK Stack.srt
5.2 kB
10 - 9. Security Analytics/01 - Installing Sirius CE.mp4
8.6 MB
10 - 9. Security Analytics/01 - Installing Sirius CE.srt
4.6 kB
10 - 9. Security Analytics/02 - Solving the Unit 42 quiz with SELKS.mp4
11 MB
10 - 9. Security Analytics/02 - Solving the Unit 42 quiz with SELKS.srt
6.0 kB
10 - 9. Security Analytics/03 - Installing NetWitness.mp4
3.9 MB
10 - 9. Security Analytics/03 - Installing NetWitness.srt
3.0 kB
10 - 9. Security Analytics/04 - Taking NetWitness for a spin.mp4
4.3 MB
10 - 9. Security Analytics/04 - Taking NetWitness for a spin.srt
2.7 kB
11 - 10. Threat Intelligence/01 - Exchanging threat intelligence.mp4
4.5 MB
11 - 10. Threat Intelligence/01 - Exchanging threat intelligence.srt
3.2 kB
11 - 10. Threat Intelligence/02 - Installing OpenTAXII.mp4
18 MB
11 - 10. Threat Intelligence/02 - Installing OpenTAXII.srt
7.1 kB
11 - 10. Threat Intelligence/03 - Working with the Cabby client library.mp4
17 MB
11 - 10. Threat Intelligence/03 - Working with the Cabby client library.srt
8.0 kB
11 - 10. Threat Intelligence/04 - Installing the OpenCTI threat intelligence system.mp4
15 MB
11 - 10. Threat Intelligence/04 - Installing the OpenCTI threat intelligence system.srt
5.8 kB
01 - Introduction/01 - Introduction to complete open source security.mp4
2.0 MB
11 - 10. Threat Intelligence/05 - Connecting threat intelligence sources to OpenCTI.srt
10 kB
12 - 11. Managing Incidents/01 - Installing the IRIS incident management system.mp4
5.2 MB
12 - 11. Managing Incidents/01 - Installing the IRIS incident management system.srt
2.1 kB
12 - 11. Managing Incidents/02 - Managing incidents with IRIS.mp4
10 MB
12 - 11. Managing Incidents/02 - Managing incidents with IRIS.srt
6.9 kB
12 - 11. Managing Incidents/03 - Installing Velociraptor.mp4
15 MB
12 - 11. Managing Incidents/03 - Installing Velociraptor.srt
5.6 kB
12 - 11. Managing Incidents/04 - Connecting Linux hosts to Velociraptor.mp4
8.5 MB
12 - 11. Managing Incidents/04 - Connecting Linux hosts to Velociraptor.srt
4.6 kB
12 - 11. Managing Incidents/05 - Connecting Windows hosts to Velociraptor.mp4
4.2 MB
12 - 11. Managing Incidents/05 - Connecting Windows hosts to Velociraptor.srt
2.3 kB
12 - 11. Managing Incidents/06 - Running commands remotely from Velociraptor.mp4
2.5 MB
12 - 11. Managing Incidents/06 - Running commands remotely from Velociraptor.srt
1.5 kB
12 - 11. Managing Incidents/07 - Accessing client files with VFS.mp4
5.7 MB
12 - 11. Managing Incidents/07 - Accessing client files with VFS.srt
3.5 kB
12 - 11. Managing Incidents/08 - Hunting with Velociraptor.mp4
12 MB
12 - 11. Managing Incidents/08 - Hunting with Velociraptor.srt
7.1 kB
13 - 12. Threat Hunting/01 - Understanding Malcolm for threat hunting.mp4
3.1 MB
13 - 12. Threat Hunting/01 - Understanding Malcolm for threat hunting.srt
2.4 kB
13 - 12. Threat Hunting/02 - Installing Malcolm.mp4
5.2 MB
13 - 12. Threat Hunting/02 - Installing Malcolm.srt
4.2 kB
13 - 12. Threat Hunting/03 - A tour of Cyberville with Malcolm.mp4
15 MB
13 - 12. Threat Hunting/03 - A tour of Cyberville with Malcolm.srt
7.2 kB
13 - 12. Threat Hunting/04 - Threat hunting with Malcolm.mp4
22 MB
13 - 12. Threat Hunting/04 - Threat hunting with Malcolm.srt
8.4 kB
13 - 12. Threat Hunting/05 - Deep diving with Malcolm's Arkime.mp4
17 MB
13 - 12. Threat Hunting/05 - Deep diving with Malcolm's Arkime.srt
5.8 kB
14 - 13. Dev and Support Tools/01 - Installing the Kiwi TCMS test management system.mp4
6.0 MB
14 - 13. Dev and Support Tools/01 - Installing the Kiwi TCMS test management system.srt
2.0 kB
14 - 13. Dev and Support Tools/02 - Security testing with Kiwi TCMS.mp4
16 MB
14 - 13. Dev and Support Tools/02 - Security testing with Kiwi TCMS.srt
8.7 kB
14 - 13. Dev and Support Tools/03 - Installing the osTicket web app.mp4
13 MB
14 - 13. Dev and Support Tools/03 - Installing the osTicket web app.srt
5.6 kB
14 - 13. Dev and Support Tools/04 - Managing trouble tickets.mp4
19 MB
14 - 13. Dev and Support Tools/04 - Managing trouble tickets.srt
10 kB
14 - 13. Dev and Support Tools/05 - Mind mapping with Freeplane.mp4
16 MB
14 - 13. Dev and Support Tools/05 - Mind mapping with Freeplane.srt
8.4 kB
14 - 13. Dev and Support Tools/06 - Introducing the Valkey datastore.mp4
6.2 MB
14 - 13. Dev and Support Tools/06 - Introducing the Valkey datastore.srt
2.8 kB
14 - 13. Dev and Support Tools/07 - Scripting with Valkey.mp4
4.7 MB
14 - 13. Dev and Support Tools/07 - Scripting with Valkey.srt
2.9 kB
15 - Conclusion/01 - Next steps.mp4
2.2 MB
15 - Conclusion/01 - Next steps.srt
2.2 kB