FileMood

Download Cyber Security-Hackers Exposed![UDEMY]

Cyber Security Hackers Exposed UDEMY

Name

Cyber Security-Hackers Exposed![UDEMY]

 DOWNLOAD Copy Link

Total Size

4.5 GB

Total Files

561

Hash

18255C8FF7351DF6CB7DDBAEDCE2F978D0B9A728

/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/

7.1 httpwww.slate.comarticlestechnologybitwise201502lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html.html

0.0 KB

7.3 httpwww.telegraph.co.uknewsworldnewsnorthamericausa11416985Millions-of-computers-may-be-compromised-by-US-spyware-report.html.html

0.0 KB

15.3 httpswww.csoonline.comarticle3213033securitynsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.html

0.0 KB

1. Goals and Learning Objectives.mp4

3.0 MB

1. Goals and Learning Objectives.vtt

1.1 KB

2. Why You Need Security – The Value Of A Hack.mp4

30.3 MB

2. Why You Need Security – The Value Of A Hack.vtt

6.0 KB

2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html

0.1 KB

2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html

0.1 KB

3. The Top 3 Things You Need To Stay Safe Online.mp4

2.6 MB

3. The Top 3 Things You Need To Stay Safe Online.vtt

1.5 KB

3.1 httpsresearch.google.compubspub43963.html.html

0.1 KB

4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4

40.0 MB

4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.vtt

10.9 KB

4.1 Exploit Kit Landscape Map.html

0.1 KB

4.2 CVE details.html

0.1 KB

4.3 httpswww.exploit-db.comsearch.html

0.1 KB

5. Hackers, crackers and cyber criminals.mp4

8.1 MB

5. Hackers, crackers and cyber criminals.vtt

3.1 KB

6. Malware, viruses, rootkits and RATs.mp4

12.7 MB

6. Malware, viruses, rootkits and RATs.vtt

7.4 KB

6.1 SophosLabs 2018 Malware Forecast.html

0.2 KB

6.2 Chef Jamie Oliver’s website hacked for the third time.html

0.1 KB

6.3 Malware stats.html

0.1 KB

6.4 Report - Spotlight perils of malvertisements.html

0.1 KB

6.5 7 most common RATs.html

0.1 KB

7. Spyware, Adware, Scareware, PUPs _ Browser hijacking.mp4

11.3 MB

7. Spyware, Adware, Scareware, PUPs _ Browser hijacking.vtt

5.5 KB

7.2 httpssecurelist.comanalysisquarterly-malware-reports72493it-threat-evolution-in-q3-2015.html

0.2 KB

7.4 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html

0.1 KB

8. What is Phishing, Vishing and SMShing.mp4

27.2 MB

8. What is Phishing, Vishing and SMShing.vtt

15.7 KB

8.1 Homograph attack using internationalized domain name.html

0.1 KB

8.2 XSS example vulnerability.html

0.1 KB

8.3 Live phishing links.html

0.1 KB

9. Spamming _ Doxing.mp4

5.0 MB

9. Spamming _ Doxing.vtt

3.6 KB

9.1 Spam stats.html

0.1 KB

9.2 Spam example.html

0.1 KB

10. Social engineering - Scams, cons, tricks and fraud.mp4

12.5 MB

10. Social engineering - Scams, cons, tricks and fraud.vtt

6.1 KB

10.1 httpwww.actionfraud.police.uktypes_of_fraud.html

0.1 KB

10.2 Top 10 scams.html

0.1 KB

10.3 httpwww.consumerfraudreporting.org.html

0.1 KB

11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4

17.0 MB

11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.vtt

9.9 KB

11.1 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html

0.1 KB

11.2 Cryptocurrency Mining Malware Infected Over Half-Million PCs Using an NSA Exploit.html

0.1 KB

11.3 httpsarstechnica.cominformation-technology201801now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners.html

0.2 KB

11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html

0.1 KB

11.5 httpsthehackernews.com201802cryptojacking-malware.html.html

0.1 KB

11.6 httpscoinhive.com.html

0.1 KB

11.7 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html

0.1 KB

11.8 httpsgithub.comhoshsadiqadblock-nocoin-list.html

0.1 KB

11.9 httpswww.engadget.com20180213attackers-telegram-deliver-cryptocurrency-mining-malware.html

0.2 KB

11.10 httpstorrentfreak.compirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011.html

0.1 KB

12. Darknets, Dark Markets and Exploit kits.mp4

34.0 MB

12. Darknets, Dark Markets and Exploit kits.vtt

8.4 KB

12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html

0.1 KB

13. Governments, spies and secret stuff part I.mp4

28.3 MB

13. Governments, spies and secret stuff part I.vtt

6.1 KB

14. Governments, spies and secret stuff part II.mp4

31.7 MB

14. Governments, spies and secret stuff part II.vtt

11.0 KB

14.1 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html

0.1 KB

14.2 httpsnsa.gov1.infodninsa-ant-catalog.html

0.1 KB

14.3 httpstheintercept.com.html

0.1 KB

14.4 httpscryptome.org201401nsa-codenames.htm.html

0.1 KB

14.5 httpswikileaks.org-Leaks-.html.html

0.1 KB

14.6 httpwww.nsaplayset.org.html

0.1 KB

15. Regulating encryption, mandating insecurity _ legalizing spying.mp4

44.8 MB

15. Regulating encryption, mandating insecurity _ legalizing spying.vtt

16.2 KB

15.1 Clipper chip.html

0.2 KB

15.2 WhatsApp was Banned for 48 Hours in Brazil.html

0.1 KB

15.4 The Case against Regulating Encryption Technology.html

0.1 KB

15.5 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html

0.1 KB

15.6 A Worldwide Survey of Encryption Products - pdf.html

0.2 KB

15.7 Kazakhstans new encryption law.html

0.2 KB

15.8 httpwww.washingtonsblog.com201505nsa-admits-it-collects-too-much-info-to-stop-terror-attacks.html.html

0.2 KB

15.9 Report - Keys Under Doormats Mandating insecurity by requiring government access to all data and communication.html

0.2 KB

15.10 Matt Blaze Speaking to a US congressional committee.html

0.1 KB

15.11 httpwww.crypto.compapersgovernmentreform-blaze2015.pdf.html

0.1 KB

15.12 A Worldwide Survey of E ncryption Products - xls.html

0.2 KB

15.13 UK data communications bill.html

0.1 KB

16. Trust _ Backdoors.mp4

25.7 MB

16. Trust _ Backdoors.vtt

11.3 KB

16.1 Examples of backdoors.html

0.1 KB

16.2 httpsblog.torproject.orgblogdeterministic-builds-part-one-cyberwar-and-global-compromise.html

0.2 KB

16.3 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html

0.1 KB

16.4 httpsreproducible-builds.org.html

0.1 KB

16.5 Apple removes malware infected apps from the app store.html

0.2 KB

16.6 Apple backdoor order.html

0.1 KB

16.7 Formal methods.html

0.1 KB

16.8 Video on how to build your own software reproducibly.html

0.1 KB

17. Censorship.mp4

6.8 MB

17. Censorship.vtt

2.8 KB

17.1 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html

0.1 KB

17.2 httpsearchenginewatch.comsewnews2351154google-censorship-ruling-in-canada-has-worldwide-implications.html

0.2 KB

17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html

0.1 KB

18. Cyber Threat Intelligence – Stay Informed.mp4

2.7 MB

18. Cyber Threat Intelligence – Stay Informed.vtt

1.1 KB

18.1 httpwww.stationx.netalerts.html

0.1 KB

/6. Operating System Security _ Privacy (Windows vs Mac OS X vs Linux)/

10.1 httpsblogs.windows.comwindowsexperience20160510announcing-windows-10-insider-preview-build-14342#31Zq2yELkheC9HyV.99.html

0.0 KB

1. Goals and Learning Objectives.mp4

2.5 MB

1. Goals and Learning Objectives.vtt

0.9 KB

2. Security Features and Functionality.mp4

60.7 MB

2. Security Features and Functionality.vtt

7.0 KB

3. Security Bugs and Vulnerabilities.mp4

88.0 MB

3. Security Bugs and Vulnerabilities.vtt

6.3 KB

3.1 Top 50 products vs security bugs.html

0.1 KB

3.2 Report - Buying Into the Bias Why Vulnerability Statistics Suck.html

0.2 KB

4. Usage Share.mp4

35.9 MB

4. Usage Share.vtt

5.7 KB

4.1 OS usage share.html

0.1 KB

5. Windows 10 - Privacy _ Tracking.mp4

83.8 MB

5. Windows 10 - Privacy _ Tracking.vtt

7.1 KB

5.1 With Windows 10, Microsoft Blatantly Disregards User Choice and Privacy A Deep Dive.html

0.2 KB

5.2 Microsoft Privacy Statement.html

0.1 KB

5.3 Microsoft Service Agreement.html

0.1 KB

5.4 Cortana privacy faq.html

0.1 KB

6. Windows 10 - Disable tracking automatically.mp4

71.2 MB

6. Windows 10 - Disable tracking automatically.vtt

5.8 KB

6.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html

0.1 KB

7. Windows 10 - Tool Disable Windows 10 Tracking.mp4

103.2 MB

7. Windows 10 - Tool Disable Windows 10 Tracking.vtt

7.8 KB

7.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html

0.1 KB

8. Windows 10 – Cortana.mp4

43.0 MB

8. Windows 10 – Cortana.vtt

3.9 KB

8.1 How to disable cortana-on Windows 10.html

0.1 KB

8.2 Cortana privacy faq.html

0.1 KB

8.3 How to Disable Cortana in Windows 10’s Anniversary Update.html

0.1 KB

9. Windows 10 – Privacy Settings.mp4

90.7 MB

9. Windows 10 – Privacy Settings.vtt

9.9 KB

9.1 Complete guide windows 10 privacy settings.html

0.1 KB

9.2 SmartScreen Filter FAQ.html

0.1 KB

10. Windows 10 - WiFi Sense.mp4

62.7 MB

10. Windows 10 - WiFi Sense.vtt

5.0 KB

11. Windows 7, 8 and 8.1 - Privacy _ Tracking.mp4

110.7 MB

11. Windows 7, 8 and 8.1 - Privacy _ Tracking.vtt

7.9 KB

11.1 Microsoft - How to manage Windows 10 notification and upgrade options.html

0.1 KB

11.2 Never 10 by Steve Gibson (Use this!).html

0.1 KB

11.3 GWX Control Panel.html

0.1 KB

11.4 httpwww.zdnet.comarticlehow-to-block-windows-10-upgrades-on-your-business-network-and-at-home-too.html

0.2 KB

12. Mac - Privacy _ Tracking.mp4

60.8 MB

12. Mac - Privacy _ Tracking.vtt

5.2 KB

12.1 Fix Mac OS X.html

0.1 KB

12.2 httpsgithub.comfix-macosxnet-monitor.html

0.1 KB

12.3 httpsgithub.comkarek314macOS-home-call-drop.html

0.1 KB

12.4 httpsgithub.comfix-macosxyosemite-phone-home.html

0.1 KB

12.5 Washingtonpost - How apples os x yosemite tracks-you.html

0.2 KB

13. Linux and Unix “like” Operating systems.mp4

48.5 MB

13. Linux and Unix “like” Operating systems.vtt

3.9 KB

13.1 httpdistrowatch.com.html

0.1 KB

13.2 httpswww.openbsd.org.html

0.1 KB

13.3 httpswww.debian.org.html

0.1 KB

13.4 httpswww.archlinux.org.html

0.1 KB

14. General Use Operating Systems (Windows, MacOS and Linux).mp4

49.2 MB

14. General Use Operating Systems (Windows, MacOS and Linux).vtt

5.1 KB

14.1 Ubuntu - httpswww.ubuntu.com.html

0.1 KB

14.2 Manjaro - httpsmanjaro.org.html

0.1 KB

14.3 Linux Mint - httpslinuxmint.com.html

0.1 KB

15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).mp4

41.3 MB

15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).vtt

6.2 KB

15.1 OpenBSD - httpswww.openbsd.org.html

0.1 KB

15.2 Debian - httpswww.debian.org.html

0.1 KB

15.3 Archlinux - httpswww.archlinux.org.html

0.1 KB

16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).mp4

33.9 MB

16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).vtt

3.6 KB

16.1 Security-Enhanced Linux (SELinux) - httpsgithub.comSELinuxProject.html

0.1 KB

16.2 Subgraph OS - httpssubgraph.comsgos.html

0.1 KB

16.3 Hardened Gentoo Linux - httpswiki.gentoo.orgwikiProjectHardened.html

0.1 KB

16.4 PureOS - httpswww.pureos.net.html

0.1 KB

16.5 Astra Linux - httpastralinux.ru.html

0.1 KB

16.6 Trisquel OS - httpstrisquel.info.html

0.1 KB

16.7 Qubes OS - httpswww.qubes-os.org.html

0.1 KB

17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4

22.6 MB

17. Anonymity Focused Operating Systems (Tails and Whonix OS).vtt

3.6 KB

17.1 Qubes OS - httpswww.qubes-os.org.html

0.1 KB

17.2 Tails OS - httpstails.boum.org.html

0.1 KB

17.3 Whonix - httpswww.whonix.org.html

0.1 KB

18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4

14.0 MB

18. Penetration Testing and Ethical Hacking Focused Operating Systems.vtt

1.2 KB

18.1 Kali Linux - httpswww.kali.org.html

0.1 KB

18.2 BackBox Linux - httpsbackbox.org.html

0.1 KB

18.3 Pentoo - httpswww.pentoo.ch.html

0.1 KB

18.4 Parrot GNULinux - httpswww.parrotsec.org.html

0.1 KB

18.5 BlackArch Linux - httpsblackarch.org.html

0.1 KB

19. Mobile Operating Systems with Security _ Privacy Focus (LineageOS, Sailfish).mp4

49.0 MB

19. Mobile Operating Systems with Security _ Privacy Focus (LineageOS, Sailfish).vtt

3.1 KB

19.1 Android - httpswww.android.com.html

0.1 KB

19.2 MicroG - httpsmicrog.org.html

0.1 KB

19.3 iOS - httpsdeveloper.apple.comios.html

0.1 KB

19.4 OmniROM - httpswww.omnirom.org.html

0.1 KB

19.5 LineageOS - httpslineageos.org.html

0.1 KB

19.6 PureOS Librem 5 - httpspuri.smshoplibrem-5.html

0.1 KB

19.7 Replicant - Httpswww.replicant.us.html

0.1 KB

20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4

60.6 MB

20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.vtt

5.9 KB

20.1 Debian Live CDDVD.html

0.1 KB

20.2 Download Debian.html

0.1 KB

20.3 Free Debian Books and Guides.html

0.1 KB

/4. Encryption Crash Course/

10. Certificate Authorities and HTTPS.mp4

209.0 MB

1. Goals and Learning Objectives.mp4

1.7 MB

1. Goals and Learning Objectives.vtt

0.6 KB

2. Symmetric Encryption.mp4

33.9 MB

2. Symmetric Encryption.vtt

10.2 KB

3. Asymmetric Encryption.mp4

75.8 MB

3. Asymmetric Encryption.vtt

11.7 KB

4. Hash Functions.mp4

93.6 MB

4. Hash Functions.vtt

6.5 KB

4.1 Example hashes.html

0.1 KB

5. Digital Signatures.mp4

44.8 MB

5. Digital Signatures.vtt

5.2 KB

5.1 httpswww.symantec.comenukcode-signing.html

0.1 KB

5.2 Windows 10 Device Guard using Digital Signatures.html

0.2 KB

6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4

168.7 MB

6. Secure Sockets Layer (SSL) and Transport layer security (TLS).vtt

14.0 KB

6.1 Weakdh Cipher Suite Recommendations.html

0.1 KB

6.2 Mozilla Cipher Suite Recommendations.html

0.1 KB

6.3 Wikipedia Transport Layer Security (TLS) page.html

0.1 KB

6.4 Steve Gibson_s Cipher Suite Recommendations.html

0.1 KB

7. SSL Stripping.mp4

120.1 MB

7. SSL Stripping.vtt

13.7 KB

7.1 SSL Strip tool By Moxie Marlinspike.html

0.1 KB

7.2 sniffdet - Remote Sniffer Detection ToolLibrary.html

0.1 KB

7.3 WIFI Pineapple.html

0.1 KB

7.4 Arpwatch Tool to Monitor Ethernet Activity in Linux.html

0.1 KB

7.5 Intro to Sniffers.html

0.1 KB

7.6 Cain _ Abel.html

0.1 KB

8. HTTPS (HTTP Secure).mp4

85.9 MB

8. HTTPS (HTTP Secure).vtt

7.1 KB

8.1 Server Name Indication (SNI) Wiki.html

0.1 KB

9. Digital Certificates.mp4

85.9 MB

9. Digital Certificates.vtt

6.3 KB

10. Certificate Authorities and HTTPS.vtt

16.9 KB

10.1 CA example mistake.html

0.2 KB

10.2 SSL Sniff.html

0.1 KB

10.3 Cert Fingerprints.html

0.1 KB

10.4 Certificate patrol.html

0.1 KB

10.5 CA Ecosystem.html

0.1 KB

11. End-to-End Encryption (E2EE).mp4

8.6 MB

11. End-to-End Encryption (E2EE).vtt

2.0 KB

12. Steganography.mp4

109.4 MB

12. Steganography.vtt

8.8 KB

12.1 OpenPuff Manual.html

0.1 KB

12.2 List of Steg Tools.html

0.1 KB

12.3 httpwww.spammimic.com.html

0.1 KB

12.4 OpenPuff.html

0.1 KB

13. How Security and Encryption is Really Attacked.mp4

18.2 MB

13. How Security and Encryption is Really Attacked.vtt

3.2 KB

13.1 Security Pitfalls.html

0.1 KB

/1. Introduction/

2. Security Quick Win!.vtt

15.6 KB

2.1 httpswww.stationx.netcanarytokens.html

0.1 KB

3. Goals and Learning Objectives - Volume 1.mp4

16.9 MB

3. Goals and Learning Objectives - Volume 1.vtt

2.6 KB

4. Target Audience.mp4

7.7 MB

4. Target Audience.vtt

3.3 KB

5. Study Recommendations.mp4

18.8 MB

5. Study Recommendations.vtt

6.6 KB

6. Course updates.mp4

4.6 MB

6. Course updates.vtt

0.8 KB

1. Welcome and Introduction to the Instructor!.mp4

20.9 MB

1. Welcome and Introduction to the Instructor!.vtt

1.9 KB

1.1 Nathan_s Cyber Security Blog.html

0.1 KB

2. Security Quick Win!.mp4

45.3 MB

1.2 Nathan_s Twitter #GotoNathan.html

0.1 KB

/2. know Yourself - The Threat and Vulnerability Landscape/

1. Theory and Practical.mp4

2.3 MB

1. Theory and Practical.vtt

1.4 KB

2. Goals and Learning Objectives.mp4

2.8 MB

2. Goals and Learning Objectives.vtt

0.9 KB

3. Protect What You Value.mp4

9.4 MB

3. Protect What You Value.vtt

4.9 KB

4. What is Privacy, Anonymity and Pseudonymity.mp4

12.4 MB

4. What is Privacy, Anonymity and Pseudonymity.vtt

5.2 KB

5. Security, Vulnerabilities, Threats and Adversaries.mp4

11.8 MB

5. Security, Vulnerabilities, Threats and Adversaries.vtt

4.8 KB

5.1 The Cyber Security Landscape Diagram.jpg.jpg

795.8 KB

6. Asset Selection.mp4

8.1 MB

6. Asset Selection.vtt

3.6 KB

6.1 httpswww.stationx.netsabsa.html

0.1 KB

6.2 httpswww.iso.orgstandard56742.html.html

0.1 KB

6.3 httpswww.securityforum.org.html

0.1 KB

7. Threat Modeling and Risk Assessments.mp4

18.9 MB

7. Threat Modeling and Risk Assessments.vtt

9.4 KB

8. Security vs Privacy vs Anonymity - Can we have it all.mp4

5.7 MB

8. Security vs Privacy vs Anonymity - Can we have it all.vtt

2.6 KB

9. Confidentiality, Integrity and Availability - (Security Attributes).mp4

20.3 MB

9. Confidentiality, Integrity and Availability - (Security Attributes).vtt

10.6 KB

9.1 httpswww.stationx.netsabsa.html

0.1 KB

9.2 httpsen.wikipedia.orgwikiAuthentication.html

0.1 KB

9.3 httpsen.wikipedia.orgwikiParkerian_Hexad.html

0.1 KB

9.4 httpwhatis.techtarget.comdefinitionConfidentiality-integrity-and-availability-CIA.html

0.1 KB

9.5 httpsen.wikipedia.orgwikiNon-repudiation.html

0.1 KB

9.6 httpsen.wikipedia.orgwikiAuthorization.html

0.1 KB

10. Defense In Depth.mp4

3.1 MB

10. Defense In Depth.vtt

1.6 KB

11. The Zero Trust Model.mp4

10.8 MB

11. The Zero Trust Model.vtt

4.4 KB

/5. Setting up a Testing Environment Using Virtual Machines (Lab)/

1. Goals and Learning Objectives.mp4

1.9 MB

1. Goals and Learning Objectives.vtt

0.7 KB

2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4

118.9 MB

2. Introduction to Setting up a Testing Environment Using Virtual Machines.vtt

11.0 KB

2.1 httpwww.osboxes.orgvmware-images.html

0.1 KB

2.2 Windows VMs here.html

0.1 KB

2.3 httpsen.wikipedia.orgwikiComparison_of_platform_virtualization_software.html

0.1 KB

2.4 httpwww.osboxes.orgguide#!.html

0.1 KB

2.5 httpwww.osboxes.orgvirtualbox-images.html

0.1 KB

2.6 httpvirtual-machine.org.html

0.1 KB

2.7 httpsmarketplace.vmware.com.html

0.1 KB

2.8 httpvirtualboxes.orgimages.html

0.1 KB

2.9 Virtualbox Network Adapter Settings.html

0.1 KB

2.10 Vmware Network Adapter Settings.html

0.2 KB

2.11 httpsen.wikipedia.orgwikiHypervisor.html

0.1 KB

3. Vmware.mp4

115.9 MB

3. Vmware.vtt

10.9 KB

3.1 httpwww.vmware.comproductsworkstationcompare.html.html

0.1 KB

3.2 httpwww.vmware.comproductsplayerfaqsfaqs.html.html

0.1 KB

4. Virtual box.mp4

151.2 MB

4. Virtual box.vtt

11.1 KB

4.1 httpswww.virtualbox.org.html

0.1 KB

5. Kali Linux 2018.mp4

62.5 MB

5. Kali Linux 2018.vtt

4.9 KB

5.2 Kali on Microsoft App Store as an official WSL.html

0.1 KB

5.3 Kali Arm hardware.html

0.1 KB

5.4 Kali AWS appliance.html

0.1 KB

5.5 Kali images for Virtualbox or VMware.html

0.2 KB

/7. Security Bugs and Vulnerabilities/

1. Goals and Learning Objectives.mp4

1.7 MB

1. Goals and Learning Objectives.vtt

0.6 KB

2. The Importance of Patching.mp4

12.2 MB

2. The Importance of Patching.vtt

6.0 KB

3. Windows 7 - Auto Update.mp4

5.2 MB

3. Windows 7 - Auto Update.vtt

1.7 KB

4. Windows 8 _ 8.1 - Auto Update.mp4

6.9 MB

4. Windows 8 _ 8.1 - Auto Update.vtt

1.9 KB

5. Windows 10 - Auto Update.mp4

5.2 MB

5. Windows 10 - Auto Update.vtt

1.8 KB

6. Windows - Criticality and Patch Tuesday.mp4

43.8 MB

6. Windows - Criticality and Patch Tuesday.vtt

4.2 KB

6.1 Windows 10 Ditches Patch Tuesday for Security_s Sake.html

0.2 KB

6.2 Microsoft Security Bulletins.html

0.1 KB

6.3 Patch Tuesday may be dead, but Microsoft_s not confessing to the crime.html

0.2 KB

6.4 National vulnerability database.html

0.1 KB

6.5 Common Vulnerabilities and Exposures.html

0.1 KB

7. Windows 7, 8, 8.1 _ 10 - Automate the pain away from patching.mp4

20.3 MB

7. Windows 7, 8, 8.1 _ 10 - Automate the pain away from patching.vtt

11.2 KB

7.1 Flexera Personal Software Inspector - Previously Secunia PSI.html

0.2 KB

8. Linux - Debian - Patching.mp4

40.4 MB

8. Linux - Debian - Patching.vtt

15.6 KB

8.1 Software distributions based on Debian.html

0.1 KB

8.2 Debian Security Page.html

0.1 KB

8.3 Automatic Security Updates.html

0.1 KB

9. Mac - Patching.mp4

58.3 MB

9. Mac - Patching.vtt

9.4 KB

9.1 httpbrew.sh.html

0.1 KB

9.2 igeekblogs - How to enable updates.html

0.1 KB

9.3 Apple security updates.html

0.1 KB

9.4 Mac Update.html

0.1 KB

10. Firefox - Browser and extension updates.mp4

35.7 MB

10. Firefox - Browser and extension updates.vtt

6.1 KB

11. Chrome - Browser and extension updates.mp4

3.7 MB

11. Chrome - Browser and extension updates.vtt

1.8 KB

12. IE and Edge - Browser and extention updates.mp4

5.9 MB

12. IE and Edge - Browser and extention updates.vtt

1.0 KB

13. Auto updates - The Impact to privacy and anonymity.mp4

4.5 MB

13. Auto updates - The Impact to privacy and anonymity.vtt

2.7 KB

/8. Reducing Threat Privilege/

1. Goals and Learning Objectives - Removing Privilege.mp4

14.3 MB

1. Goals and Learning Objectives - Removing Privilege.vtt

3.8 KB

2. Windows 7 - Not using admin.mp4

11.5 MB

2. Windows 7 - Not using admin.vtt

5.1 KB

3. Windows 8 and 8.1 - Not using admin.mp4

19.1 MB

3. Windows 8 and 8.1 - Not using admin.vtt

5.7 KB

4. Windows 10 - Not using admin.mp4

14.8 MB

4. Windows 10 - Not using admin.vtt

4.7 KB

/9. Social Engineering and Social Media Offence and Defence/

1. Goals and Learning Objectives.mp4

1.8 MB

1. Goals and Learning Objectives.vtt

0.6 KB

2. Information Disclosure and Identity Strategies for Social Media.mp4

87.9 MB

2. Information Disclosure and Identity Strategies for Social Media.vtt

23.0 KB

2.1 httpstosdr.org.html

0.1 KB

2.2 httpswww.eff.orgwho-has-your-back-government-data-requests-2015.html

0.1 KB

2.3 httpwww.telegraph.co.uktechnologysocial-media9780565Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html.html

0.2 KB

2.4 httpsgnu.iosocialtry.html

0.1 KB

2.5 Twitter Privacy Settings.html

0.1 KB

2.6 The complete guide to facebook privacy settings.html

0.1 KB

2.7 httpsdiasporafoundation.org.html

0.1 KB

2.8 httpfriendica.com.html

0.1 KB

2.9 List of Personally Identifiable Information (PII).html

0.1 KB

3. Identify Verification and Registration.mp4

24.5 MB

3. Identify Verification and Registration.vtt

8.6 KB

3.1 httpwww.migmail.net.html

0.1 KB

3.2 httpswww.trash-mail.comen.html

0.1 KB

3.3 Example SMS recieve online site.html

0.1 KB

3.4 httpcrapmail.dken.html

0.1 KB

3.5 httpswww.guerrillamail.com.html

0.1 KB

3.6 http10minutemail.com10MinuteMailindex.html.html

0.1 KB

3.7 httpdontmail.net.html

0.1 KB

3.8 httpgetairmail.com.html

0.1 KB

3.9 httpwww.mytrashmail.com.html

0.1 KB

3.10 httpfreemail.ms.html

0.1 KB

3.11 httpwww.dispostable.com.html

0.1 KB

3.12 httpsmailinator.com.html

0.1 KB

3.13 httpbugmenot.com.html

0.1 KB

3.14 httpsanonbox.net.html

0.1 KB

3.15 Top 10 sites receive sms online without phone.html

0.1 KB

3.16 httpwww.tempinbox.com.html

0.1 KB

3.17 httpwww.mailexpire.com.html

0.1 KB

4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4

24.4 MB

4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.vtt

13.3 KB

4.1 httpwww.urlvoid.com.html

0.1 KB

4.2 httpwww.google.com.stationx.net.html

0.1 KB

5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4

51.7 MB

5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.vtt

18.2 KB

5.1 httpswww.virustotal.comendocumentationemail-submissions.html

0.1 KB

5.2 How to Get Email Headers.html

0.1 KB

5.3 httpswww.parsemail.org.html

0.1 KB

5.4 httpswhois.domaintools.combbc.co.uk.html

0.1 KB

5.5 httpswhois.domaintools.comblob.com.html

0.1 KB

6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam _ Cons).mp4

15.2 MB

6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam _ Cons).vtt

8.5 KB

6.1 httpwww.actionfraud.police.uktypes_of_fraud.html

0.1 KB

6.2 httpwww.scambusters.org.html

0.1 KB

6.3 httpwww.consumerfraudreporting.orgcredit_freeze_summary.php.html

0.1 KB

/10. Security Domains/

1. Goals and Learning Objectives.mp4

1.5 MB

1. Goals and Learning Objectives.vtt

0.5 KB

2. Security Domains.mp4

22.9 MB

2. Security Domains.vtt

15.5 KB

/11. Security Through Isolation and Compartmentalization/

1. Goals and Learning Objectives.mp4

2.4 MB

1. Goals and Learning Objectives.vtt

0.8 KB

2. Introduction to Isolation and Compartmentalization.mp4

5.9 MB

2. Introduction to Isolation and Compartmentalization.vtt

3.1 KB

3. Physical and Hardware Isolation - How to change the Mac Address.mp4

26.8 MB

3. Physical and Hardware Isolation - How to change the Mac Address.vtt

10.1 KB

3.1 Mac OS X - Macdaddyx.html

0.1 KB

3.2 Windows - Tmac.html

0.1 KB

3.3 Mac OS X - Wifispoof.html

0.1 KB

3.4 Diagram of Mac.html

0.1 KB

3.5 Mac OS X - How to change the mac address.html

0.1 KB

3.6 Linux - How to use macchanger.html

0.1 KB

4. Physical and Hardware Isolation - Hardware Serials.mp4

52.7 MB

4. Physical and Hardware Isolation - Hardware Serials.vtt

16.3 KB

4.1 Mac OS X - Installing dmidecode with brew.html

0.1 KB

4.2 Windows - CPU Z.html

0.1 KB

4.3 Linux and Mac OS X - dmidecode.html

0.1 KB

4.4 Windows - dmidecode.html

0.1 KB

4.5 httpswww.nitrokey.com.html

0.1 KB

4.6 Mac OS X - Mac Cupid.html

0.1 KB

4.7 httpswww.yubico.com.html

0.1 KB

4.8 Linux - i-nex.html

0.1 KB

5. Virtual Isolation.mp4

60.1 MB

5. Virtual Isolation.vtt

13.1 KB

5.1 Portable Apps.html

0.1 KB

5.2 Authentic8.html

0.1 KB

5.3 Maxthon.html

0.1 KB

5.4 Aegis Secure Key - USB 2.0 Flash Drive.html

0.1 KB

5.5 Spikes.html

0.1 KB

5.6 Pen Drive Apps.html

0.1 KB

5.7 Spoons.net.html

0.1 KB

6. Dual Boot.mp4

8.3 MB

6. Dual Boot.vtt

4.5 KB

6.1 Dual Booting explained.html

0.2 KB

7. Built-in Sandboxes and Application Isolation.mp4

10.9 MB

7. Built-in Sandboxes and Application Isolation.vtt

4.5 KB

7.1 Chromium sandbox design.html

0.1 KB

7.2 Mozilla Sandbox design.html

0.1 KB

8. Windows - Sandboxes and Application Isolation.mp4

27.6 MB

8. Windows - Sandboxes and Application Isolation.vtt

9.0 KB

8.1 Deepfreeze Cloud Browser and Desktop.html

0.1 KB

8.2 BufferZone.html

0.1 KB

8.3 Comodo.html

0.1 KB

8.4 Shadowdefender.html

0.1 KB

8.5 f-sandbox.html

0.1 KB

8.6 Returnil.html

0.1 KB

8.7 Deepfreeze Standard.html

0.1 KB

9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4

73.5 MB

9. Windows - Sandboxes and Application Isolation - Sandboxie.vtt

15.6 KB

9.1 Sandboxie How it Works.html

0.1 KB

9.2 Introduction and quick guide sandboxie.html

0.1 KB

9.3 Sandboxie forum.html

0.1 KB

9.4 Sandboxie guide.html

0.1 KB

10. Linux - Sandboxes and Application Isolation.mp4

14.5 MB

10. Linux - Sandboxes and Application Isolation.vtt

3.7 KB

10.1 Script Sandfox.html

0.1 KB

10.2 Linux Sandbox.html

0.1 KB

10.3 Trusted BSD.html

0.1 KB

10.4 Firejail.html

0.1 KB

10.5 Apparmor.html

0.1 KB

11. Mac - Sandboxes and Application Isolation.mp4

25.0 MB

11. Mac - Sandboxes and Application Isolation.vtt

7.7 KB

11.1 Mac OS X - App Sandbox.html

0.2 KB

11.2 Buckle Up.html

0.1 KB

11.3 OSX-Sandbox--Seatbelt--Profiles.html

0.1 KB

11.4 Sandbox Man page.html

0.2 KB

11.5 Firefox profile.html

0.1 KB

11.6 Apple Sandbox Guide.html

0.1 KB

11.7 SuperDuper.html

0.1 KB

11.8 How to run your Applications in a Mac OS X sandbox to enhance security.html

0.2 KB

12. Virtual Machines.mp4

46.6 MB

12. Virtual Machines.vtt

17.5 KB

12.1 Wikipedia - Hypervisor.html

0.1 KB

12.2 Wikipedia - Kernel-based Virtual Machine.html

0.1 KB

12.3 Virt Manager.html

0.1 KB

12.4 OpenVZ.html

0.1 KB

12.5 KVM Debian Jessie.html

0.1 KB

12.6 Turnkey Linux - Openvpn.html

0.1 KB

12.7 Wikipedia - Comparison of platform virtualization software.html

0.1 KB

13. Virtual Machine Weaknesses.mp4

23.8 MB

13. Virtual Machine Weaknesses.vtt

15.3 KB

13.1 Exploiting dram rowhammer (Could be used on VMs in the future).html

0.2 KB

13.2 Example VMware security bug.html

0.1 KB

13.3 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html

0.1 KB

13.4 httpsen.wikipedia.orgwikiTiming_channel.html

0.1 KB

13.5 httpsen.wikipedia.orgwikiCovert_channel.html

0.1 KB

13.6 httpsen.wikipedia.orgwikiX86_virtualization.html

0.1 KB

13.7 Venom.html

0.1 KB

13.8 A look at malware with VM detection.html

0.2 KB

14. Virtual Machine Hardening.mp4

38.8 MB

14. Virtual Machine Hardening.vtt

13.4 KB

14.1 Convert VM to ISO.html

0.1 KB

15. Whonix OS - Anonymous Operating system.mp4

93.0 MB

15. Whonix OS - Anonymous Operating system.vtt

28.2 KB

15.1 Whonix Features.html

0.1 KB

15.2 Whonix and virtualbox.html

0.1 KB

15.3 httpswww.whonix.org.html

0.1 KB

15.4 Whonix Stream Isolation.html

0.1 KB

15.5 ARM - Anonymizing relay monitor.html

0.1 KB

15.6 If setting up your own workstations - MUST READ.html

0.1 KB

15.7 How to implement physical isolation.html

0.1 KB

15.8 Whonix Check.html

0.1 KB

15.9 Whonix VM snapshots.html

0.1 KB

16. Whonix OS - Weaknesses.mp4

16.5 MB

16. Whonix OS - Weaknesses.vtt

6.4 KB

16.1 Whonix - Warnings.html

0.1 KB

16.2 Whonix_s lack of an Amnesic feature.html

0.2 KB

17. Qubes OS.mp4

82.6 MB

17. Qubes OS.vtt

27.0 KB

17.1 Debian template(s).html

0.1 KB

17.2 Hardware Compatibility List (HCL).html

0.1 KB

17.3 Qubes docs.html

0.1 KB

17.4 Librem 13 laptop.html

0.1 KB

17.5 Qubes Download.html

0.1 KB

17.6 Whonix templates.html

0.1 KB

17.7 Windows templates.html

0.1 KB

17.8 Disposable VMs (DispVMs).html

0.1 KB

17.9 Split GPG.html

0.1 KB

17.10 Video Tour of Qubes.html

0.1 KB

18. Security Domains, Isolation and Compartmentalization.mp4

15.7 MB

18. Security Domains, Isolation and Compartmentalization.vtt

6.7 KB

18.1 Partitioning my digital life into security domains.html

0.1 KB

/12. Wrap Up/

1. Congratulations.mp4

5.5 MB

1. Congratulations.vtt

1.5 KB

1.1 Link to The Complete Cyber Security Course - Volume II - Network security + discount coupon studentdiscount25.html

0.1 KB

2. Certificate Of Completion for CPEs.mp4

2.3 MB

2. Certificate Of Completion for CPEs.vtt

1.1 KB

2.1 httpswww.stationx.netcertificate-request.html

0.1 KB

3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4

50.4 MB

3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).vtt

22.1 KB

4. Sample from Vol 2 - Password cracking part 2.mp4

25.3 MB

4. Sample from Vol 2 - Password cracking part 2.vtt

12.0 KB

5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4

33.3 MB

5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.vtt

21.7 KB

6. Sample from Vol 4 - Email clients, protocols and authentication.mp4

40.0 MB

6. Sample from Vol 4 - Email clients, protocols and authentication.vtt

19.9 KB

/13. BONUS Section/

1. BONUS DISCOUNT COUPONS .html

5.1 KB

 

Total files 561


Copyright © 2024 FileMood.com