/10. Browser Security and Tracking Prevention/
|
18. Firefox Hardening.mp4
|
149.2 MB
|
1. Goals and Learning Objectives.mp4
|
1.9 MB
|
1. Goals and Learning Objectives.srt
|
0.5 KB
|
2. Which Browser – Choice of Browser.mp4
|
17.8 MB
|
2. Which Browser – Choice of Browser.srt
|
7.7 KB
|
3. Reducing the Browser Attack Surface.mp4
|
92.0 MB
|
3. Reducing the Browser Attack Surface.srt
|
13.0 KB
|
3.1 Java application example.html
|
0.1 KB
|
3.2 Disable built in pdf viewer and use another viewer.html
|
0.1 KB
|
3.3 Flash example.html
|
0.1 KB
|
3.4 Silverlight example.html
|
0.1 KB
|
4. Browser Hacking Demo.mp4
|
49.0 MB
|
4. Browser Hacking Demo.srt
|
11.1 KB
|
5. Browser Isolation and Compartmentalization.mp4
|
26.1 MB
|
5. Browser Isolation and Compartmentalization.srt
|
8.1 KB
|
5.1 Spoon.net.html
|
0.1 KB
|
5.2 Firefox - Contextual Identity Project.html
|
0.1 KB
|
5.3 Multifox.html
|
0.1 KB
|
5.4 Maxthon.html
|
0.1 KB
|
5.5 Browser in a box.html
|
0.1 KB
|
5.6 Spikes.html
|
0.1 KB
|
5.7 Profile Switcher.html
|
0.1 KB
|
5.8 Authentic8.html
|
0.1 KB
|
5.9 Switchy.html
|
0.1 KB
|
5.10 Priv8.html
|
0.1 KB
|
6. Firefox Security, Privacy and Tracking.mp4
|
43.1 MB
|
6. Firefox Security, Privacy and Tracking.srt
|
16.3 KB
|
6.1 Test tracking protection.html
|
0.1 KB
|
6.2 Mozilla on DNT.html
|
0.1 KB
|
6.3 Dow the safe browsing protocol works - Developers guide.html
|
0.1 KB
|
6.4 Tracking protection (In private windows).html
|
0.1 KB
|
6.5 EFF DNT Policy.html
|
0.1 KB
|
6.6 How tracking protection works in Firefox.html
|
0.1 KB
|
6.7 Firefox Private Browsing.html
|
0.1 KB
|
6.8 Test safebrowsing - Web forgeries.html
|
0.1 KB
|
6.9 Test safebrowsing - Attacks sites.html
|
0.1 KB
|
7. uBlock origin - HTTP Filters, ad and track blockers.mp4
|
90.5 MB
|
7. uBlock origin - HTTP Filters, ad and track blockers.srt
|
17.8 KB
|
7.1 Medium Mode.html
|
0.1 KB
|
7.2 Hard Mode.html
|
0.1 KB
|
7.3 Blocking Mode.html
|
0.1 KB
|
7.4 Dynamic-filtering quick-guide.html
|
0.1 KB
|
7.5 uBlock homepage.html
|
0.1 KB
|
7.6 uBlock Origin Firefox Extention Download.html
|
0.1 KB
|
7.7 Dynamic filtering - Benefits of blocking 3rd party iframe tags.html
|
0.2 KB
|
7.8 Dynamic filtering - to easily reduce privacy exposure.html
|
0.2 KB
|
7.9 Overview of uBlock_s network filtering engine.html
|
0.1 KB
|
8. uMatrix - HTTP Filters, ad and track blockers.mp4
|
30.8 MB
|
8. uMatrix - HTTP Filters, ad and track blockers.srt
|
9.0 KB
|
8.1 uMatrix homepage.html
|
0.1 KB
|
8.2 uMatric firefox extention download.html
|
0.1 KB
|
9. Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers.mp4
|
25.8 MB
|
9. Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers.srt
|
8.2 KB
|
9.1 Request Policy - Browser extention download.html
|
0.1 KB
|
9.2 Disconnect private browsing - Download.html
|
0.1 KB
|
9.3 Request policy homepage.html
|
0.1 KB
|
9.4 Ghostery browser extention download.html
|
0.1 KB
|
10. ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers.mp4
|
29.0 MB
|
10. ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers.srt
|
8.3 KB
|
10.1 Adblock plus extention download.html
|
0.1 KB
|
10.2 Privacy badger.html
|
0.1 KB
|
10.3 ABP vs uBlock on speed.html
|
0.1 KB
|
10.4 Web of Trust, WOT download.html
|
0.1 KB
|
11. No-script - HTTP Filters, ad and track blockers.mp4
|
24.2 MB
|
11. No-script - HTTP Filters, ad and track blockers.srt
|
10.5 KB
|
11.1 NoScript addon download.html
|
0.1 KB
|
12. Policeman and others - HTTP Filters, ad and track blockers.mp4
|
18.5 MB
|
12. Policeman and others - HTTP Filters, ad and track blockers.srt
|
4.8 KB
|
12.1 Virus Total.html
|
0.1 KB
|
12.2 Policeman addon.html
|
0.1 KB
|
12.3 Purify - iPhone ad blocker.html
|
0.1 KB
|
12.4 New York Times - How ads effect download speed for the top 50 news sites.html
|
0.1 KB
|
12.5 Track Off.html
|
0.1 KB
|
13. History, Cookies and Super cookies Part 1.mp4
|
69.9 MB
|
13. History, Cookies and Super cookies Part 1.srt
|
13.8 KB
|
13.1 Mozilla on - Never remember cookies.html
|
0.1 KB
|
13.2 Forum post of winapp2.ini.html
|
0.1 KB
|
13.3 Bleachit.html
|
0.1 KB
|
13.4 Mozilla on - Private browsing.html
|
0.1 KB
|
13.5 httpwww.winapp2.com.html
|
0.1 KB
|
13.6 Ccleaner.html
|
0.1 KB
|
13.7 Bleachit page on winapp2.ini.html
|
0.1 KB
|
14. History, Cookies and Super cookies Part 2.mp4
|
69.2 MB
|
14. History, Cookies and Super cookies Part 2.srt
|
14.9 KB
|
14.1 Better Privacy addon.html
|
0.1 KB
|
14.2 Click Clean addon.html
|
0.1 KB
|
14.3 Quick Java addon.html
|
0.1 KB
|
14.4 Advanced Cookie Manager addon.html
|
0.1 KB
|
14.5 Self Destructing Cookies addon.html
|
0.1 KB
|
14.6 Decentraleyes addon.html
|
0.1 KB
|
14.7 Portable apps Firefox.html
|
0.1 KB
|
14.8 Evercookie.html
|
0.1 KB
|
14.9 Tor Browser.html
|
0.1 KB
|
14.10 JonDoFox Browser.html
|
0.1 KB
|
15. HTTP Referer.mp4
|
7.9 MB
|
15. HTTP Referer.srt
|
2.4 KB
|
15.1 Smart Referer addon.html
|
0.1 KB
|
15.2 Ref Control addon.html
|
0.1 KB
|
16. Browser Fingerprinting.mp4
|
102.8 MB
|
16. Browser Fingerprinting.srt
|
22.6 KB
|
16.1 Firegloves addon.html
|
0.1 KB
|
16.2 Report - PriVaricator Deceiving Fingerprinters with Little White Lies.html
|
0.1 KB
|
16.3 Canvas Blocker addon.html
|
0.1 KB
|
16.4 Websocket leaks.html
|
0.1 KB
|
16.5 Browserleaks.com.html
|
0.1 KB
|
16.6 ipleak.net.html
|
0.1 KB
|
16.7 Browser privacy security and tracking test sites.html
|
0.1 KB
|
16.8 EFF - Every browser unique results fom panopticlick.html
|
0.1 KB
|
16.9 jsrecon.html
|
0.1 KB
|
16.10 Mozilla on Fingerprinting.html
|
0.1 KB
|
16.11 Random Agent Spoofer addon.html
|
0.1 KB
|
17. Certificates and Encryption.mp4
|
58.2 MB
|
17. Certificates and Encryption.srt
|
14.3 KB
|
17.1 Certificate Patrol Addon.html
|
0.1 KB
|
17.2 httpwww.perspectives-project.org.html
|
0.1 KB
|
17.3 browser.urlbar.trimURLs.html
|
0.2 KB
|
17.4 RCC for Windows.html
|
0.1 KB
|
17.5 Cipherfox Addon.html
|
0.1 KB
|
17.6 HTTPS Everywhere addon.html
|
0.1 KB
|
17.7 Perspectives Addon.html
|
0.1 KB
|
17.8 SSLlabs Browser test.html
|
0.1 KB
|
17.9 Calomel ssl validation Addon.html
|
0.1 KB
|
17.10 Toggle Cipher Suite Order.html
|
0.1 KB
|
18. Firefox Hardening.srt
|
24.7 KB
|
18.1 Firefox FAQs Aboutconfig Entries.html
|
0.1 KB
|
18.2 httpsffprofile.com.html
|
0.1 KB
|
18.3 Aboutconfig.html
|
0.1 KB
|
18.4 Wikipedia - Online Certificate Status Protocol (OCSP).html
|
0.1 KB
|
18.5 Firefox Security and privacy related preferences.html
|
0.1 KB
|
18.6 Privacy Settings Addon download.html
|
0.1 KB
|
18.7 Android - https everywhere.html
|
0.1 KB
|
18.8 Certificate Patrol Addon.html
|
0.1 KB
|
18.9 user.js by pyllyukko.html
|
0.1 KB
|
18.10 The about protocol.html
|
0.1 KB
|
18.11 Mobile - NoScript Anywhere.html
|
0.1 KB
|
18.12 Android - ublock origin.html
|
0.1 KB
|
18.13 JonDoFox Browser.html
|
0.1 KB
|
18.14 Tor Browser.html
|
0.1 KB
|
18.15 Privacy Settings Addon homepage.html
|
0.1 KB
|
/1. Introduction/
|
1. Welcome to Volume 2.srt
|
0.8 KB
|
2. Introduction to the Instructor!.mp4
|
18.0 MB
|
2. Introduction to the Instructor!.srt
|
2.8 KB
|
2.1 Nathan_s Twitter #GotoNathan.html
|
0.1 KB
|
2.2 Nathan_s Cyber Security Blog.html
|
0.1 KB
|
3. Security Quick Win!.mp4
|
46.8 MB
|
3. Security Quick Win!.srt
|
23.9 KB
|
3.1 httpswww.stationx.netcanarytokens.html
|
0.1 KB
|
4. Target Audience.mp4
|
9.1 MB
|
4. Target Audience.srt
|
3.6 KB
|
5. Study Recommendations.mp4
|
29.2 MB
|
5. Study Recommendations.srt
|
6.6 KB
|
6. Course updates.mp4
|
2.7 MB
|
6. Course updates.srt
|
1.1 KB
|
1. Welcome to Volume 2.mp4
|
2.9 MB
|
/2. Goals and Learning Objectives - Volume 2/
|
1. Goals and Learning Objectives - Volume 2.mp4
|
16.7 MB
|
1. Goals and Learning Objectives - Volume 2.srt
|
4.2 KB
|
/3. Routers - Port and Vulnerability scanning/
|
1. Goals and Learning Objectives.mp4
|
2.4 MB
|
1. Goals and Learning Objectives.srt
|
0.7 KB
|
2. The Home Router.mp4
|
63.6 MB
|
2. The Home Router.srt
|
16.2 KB
|
2.1 OSI-Model-and-TCP-Model.gif.gif
|
149.7 KB
|
2.2 httpwhatismyipaddress.com.html
|
0.1 KB
|
2.3 Database of default router passwords.html
|
0.1 KB
|
2.4 Common default IP addresses for routers.html
|
0.1 KB
|
2.5 Well-known ports.html
|
0.1 KB
|
3. External Vulnerability Scanning - Shodan, Qualys _ Nmap.mp4
|
98.0 MB
|
3. External Vulnerability Scanning - Shodan, Qualys _ Nmap.srt
|
19.3 KB
|
3.1 httpswww.shodan.io.html
|
0.1 KB
|
3.2 httpspentest-tools.comnetwork-vulnerability-scanningtcp-port-scanner-online-nmap.html
|
0.1 KB
|
3.3 httpsmxtoolbox.comPortScan.aspx.html
|
0.1 KB
|
3.4 Qualys FreeScan – Online vulnerability scanner.html
|
0.1 KB
|
3.5 httpswww.grc.comshieldsup.html
|
0.1 KB
|
3.6 Putty - SSH for Windows.html
|
0.1 KB
|
3.7 httpwww.techmonkeys.co.ukhackcheckindex.php.html
|
0.1 KB
|
4. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing _ Superscan _ OpenVAS.mp4
|
101.1 MB
|
4. Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing _ Superscan _ OpenVAS.srt
|
22.0 KB
|
4.1 OpenVAS.html
|
0.1 KB
|
4.2 Nmap Download.html
|
0.1 KB
|
4.3 Microsoft Baseline Security Analyzer (MBSA).html
|
0.1 KB
|
4.4 Fing IOS.html
|
0.1 KB
|
4.5 Superscan.html
|
0.1 KB
|
4.6 Metasploitable 2.html
|
0.1 KB
|
4.7 Nessus professional.html
|
0.1 KB
|
4.8 Nessus Home.html
|
0.1 KB
|
4.9 Fing Android.html
|
0.1 KB
|
4.10 Qualys FreeScan – Online vulnerability scanner.html
|
0.1 KB
|
4.11 OpenVAS is not installed on latest Kali - Instructions to install here.html
|
0.1 KB
|
4.12 OpenVAS is not installed on latest Kali - Video to install here.html
|
0.1 KB
|
5. Open Source Custom Router Firmware.mp4
|
58.7 MB
|
5. Open Source Custom Router Firmware.srt
|
15.1 KB
|
5.1 List of router firmware projects.html
|
0.1 KB
|
5.2 OpenWRT.html
|
0.1 KB
|
5.3 Example of how to flash a netgear.html
|
0.1 KB
|
5.4 DD-WRT.html
|
0.1 KB
|
5.5 DD-WRT Supported hardware.html
|
0.1 KB
|
5.6 Tomato firmware.html
|
0.1 KB
|
5.7 DD-WRT fireware for R7000.html
|
0.1 KB
|
5.8 flashrouters.com.html
|
0.1 KB
|
5.9 R7000 Nighthawk Router.html
|
0.2 KB
|
5.10 Example of OpenVPN of DD-WRT.html
|
0.1 KB
|
5.11 smallnetbuilder.com - Compare router performance.html
|
0.1 KB
|
5.12 LibreCMC Supported Hardware.html
|
0.1 KB
|
5.13 LibreCMC.html
|
0.1 KB
|
5.14 Example of Tor of DD-WRT.html
|
0.1 KB
|
/4. Firewalls/
|
1. Goals and Learning Objectives.mp4
|
2.4 MB
|
1. Goals and Learning Objectives.srt
|
0.5 KB
|
2. Firewalls – Host-based, network-based and virtual Part 1.mp4
|
47.0 MB
|
2. Firewalls – Host-based, network-based and virtual Part 1.srt
|
17.9 KB
|
2.1 DPI example traffic.html
|
0.1 KB
|
2.2 Reverse shell cheat sheet.html
|
0.1 KB
|
3. Firewalls – Host-based, network-based and virtual Part 2.mp4
|
17.1 MB
|
3. Firewalls – Host-based, network-based and virtual Part 2.srt
|
5.7 KB
|
3.1 Wikipedia - Stateful Packet Inspection.html
|
0.1 KB
|
4. Windows - Host Based Firewalls - Windows Firewall.mp4
|
65.7 MB
|
4. Windows - Host Based Firewalls - Windows Firewall.srt
|
11.7 KB
|
5. Windows - Host Based Firewalls - Windows Firewall Control (WFC).mp4
|
37.4 MB
|
5. Windows - Host Based Firewalls - Windows Firewall Control (WFC).srt
|
5.7 KB
|
5.1 Windows firewall control.html
|
0.1 KB
|
5.2 howtogeek - how to block an application.html
|
0.2 KB
|
6. Windows - Host Based Firewalls - Third Party.mp4
|
37.0 MB
|
6. Windows - Host Based Firewalls - Third Party.srt
|
11.0 KB
|
6.1 Suggestion for rules to apply on windows.html
|
0.2 KB
|
6.2 Comodo.html
|
0.1 KB
|
6.3 Tinywall.html
|
0.1 KB
|
6.4 Comodo geekbuddy removal.html
|
0.1 KB
|
6.5 Privacyware firewall.html
|
0.1 KB
|
6.6 AV firewall example kaspersky.html
|
0.1 KB
|
7. Linux - Host Based Firewalls - iptables.mp4
|
63.7 MB
|
7. Linux - Host Based Firewalls - iptables.srt
|
21.7 KB
|
7.1 The definitive guide to iptables.html
|
0.1 KB
|
7.2 httptech.meetrp.comblogiptables-personal-firewall-to-protect-my-laptop.html
|
0.1 KB
|
7.3 httpsgithub.commeetrppersonalfirewall.html
|
0.1 KB
|
8. Linux - Host Based Firewalls - UFW, gufw _ nftables.mp4
|
51.9 MB
|
8. Linux - Host Based Firewalls - UFW, gufw _ nftables.srt
|
13.1 KB
|
8.1 How to setup a firewall with ufw on an Ubuntu and Debian.html
|
0.2 KB
|
8.2 nftables.html
|
0.1 KB
|
8.3 iptables-frontends.txt.txt
|
0.3 KB
|
8.4 Shorewall.html
|
0.1 KB
|
8.5 linux-firewal - Application firewall.html
|
0.1 KB
|
8.6 The Uncomplicated Firewall (ufw).html
|
0.1 KB
|
8.7 Gufw - graphical front-end to UFW.html
|
0.1 KB
|
9. Mac - Host based Firewalls - Application Firewall _ PF.srt
|
14.6 KB
|
9.1 httpblog.scottlowe.org20130515using-pf-on-os-x-mountain-lion.html
|
0.1 KB
|
9.2 Wikipedia - PF Firewall.html
|
0.1 KB
|
9.3 Apples application firewall page.html
|
0.1 KB
|
9.4 httpscalomel.orgpf_config.html.html
|
0.1 KB
|
9.5 OS X PF Manual.html
|
0.1 KB
|
10. Mac - Host based Firewalls - pflist, Icefloor _ Murus.mp4
|
40.0 MB
|
10. Mac - Host based Firewalls - pflist, Icefloor _ Murus.srt
|
8.4 KB
|
10.1 Icefloor.html
|
0.1 KB
|
10.2 Vallum.html
|
0.1 KB
|
10.3 pflist.html
|
0.1 KB
|
10.4 Murus.html
|
0.1 KB
|
11. Mac - Host based Firewalls - Little Snitch.mp4
|
26.4 MB
|
11. Mac - Host based Firewalls - Little Snitch.srt
|
7.9 KB
|
11.1 Littlesnitch.html
|
0.1 KB
|
12. Network based firewalls - Routers - DD-WRT.mp4
|
15.8 MB
|
12. Network based firewalls - Routers - DD-WRT.srt
|
6.0 KB
|
12.1 Openwrt firewall.html
|
0.1 KB
|
12.2 DD-WRT Firewall Builder.html
|
0.1 KB
|
12.3 DD-WRT iptables commands example.html
|
0.1 KB
|
12.4 Firewall Builder.html
|
0.1 KB
|
12.5 DD-WRT firewall.html
|
0.1 KB
|
12.6 DD-WRT Firewall config example.html
|
0.1 KB
|
13. Network based firewalls - Hardware.mp4
|
20.6 MB
|
13. Network based firewalls - Hardware.srt
|
3.3 KB
|
13.1 pcengines.ch apu.html
|
0.1 KB
|
13.2 pcengines.ch.html
|
0.1 KB
|
13.3 novena.html
|
0.1 KB
|
14. Network based firewalls - pfSense, Smoothwall and Vyos.mp4
|
29.9 MB
|
14. Network based firewalls - pfSense, Smoothwall and Vyos.srt
|
12.7 KB
|
14.1 vyos.net.html
|
0.1 KB
|
14.2 pfsense hardware.html
|
0.1 KB
|
14.3 smoothwall.org.html
|
0.1 KB
|
14.4 opnsense.org.html
|
0.1 KB
|
14.5 pfsense.org.html
|
0.1 KB
|
/5. Network Attacks, Architecture and Isolation/
|
1. Goals and Learning Objectives.mp4
|
1.7 MB
|
1. Goals and Learning Objectives.srt
|
0.4 KB
|
2. Network Attacks and Network Isolation - Introduction and IOT.mp4
|
16.1 MB
|
2. Network Attacks and Network Isolation - Introduction and IOT.srt
|
8.1 KB
|
2.1 theguardian.com - IOT and US surveillance.html
|
0.2 KB
|
3. Network Attacks and Network Isolation - Arp Spoofing and Switches.mp4
|
18.5 MB
|
3. Network Attacks and Network Isolation - Arp Spoofing and Switches.srt
|
7.5 KB
|
3.1 irongeek.com - A Quick Intro to Sniffers.html
|
0.1 KB
|
4. Effective Network Isolation Part 1.mp4
|
36.7 MB
|
4. Effective Network Isolation Part 1.srt
|
15.5 KB
|
5. Effective Network Isolation Part 2.mp4
|
24.9 MB
|
5. Effective Network Isolation Part 2.srt
|
8.7 KB
|
5.1 Tuxcut.html
|
0.1 KB
|
5.2 Cisco port sec.html
|
0.2 KB
|
5.3 Netcut.html
|
0.1 KB
|
5.4 Wikipedia - 802.1AE - IEEE MAC Security standard (MACSec).html
|
0.1 KB
|
5.5 Youtube - Quick VLAN setup in PFSense.html
|
0.1 KB
|
5.6 xwarp.html
|
0.1 KB
|
5.7 Sniffdet.html
|
0.1 KB
|
5.8 Cisco - DHCP Snooping.html
|
0.2 KB
|
5.9 Wikipedia - 802. 1X (EAP over LAN or EAPOL) – Port based Network Access Control (PNAC).html
|
0.1 KB
|
5.10 tecmint.com - Using arpwatch.html
|
0.1 KB
|
/6. Wireless and Wi-Fi Security/
|
1. Goals and Learning Objectives.mp4
|
2.2 MB
|
1. Goals and Learning Objectives.srt
|
0.6 KB
|
2. Wi-Fi Weaknesses - WEP.mp4
|
8.5 MB
|
2. Wi-Fi Weaknesses - WEP.srt
|
2.9 KB
|
3. Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP.mp4
|
38.8 MB
|
3. Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP.srt
|
14.8 KB
|
3.1 Church of Wifi WPA-PSK Lookup Tables.html
|
0.1 KB
|
3.2 Report - Breaking wep and wpa.html
|
0.1 KB
|
4. Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP.mp4
|
16.7 MB
|
4. Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP.srt
|
8.3 KB
|
4.1 NSAs Nightstand wireless exploitation tool.html
|
0.1 KB
|
4.2 Youtube - DD-WRT Tutorial - How to create a separate public guest network that works!.html
|
0.1 KB
|
4.3 Report - Brute forcing Wi-Fi Protected Setup.html
|
0.1 KB
|
4.4 wifipineapple.com.html
|
0.1 KB
|
4.5 Report - Wi-Fi security – WEP, WPA and WPA2.html
|
0.1 KB
|
5. Wi-Fi Security Testing.mp4
|
22.8 MB
|
5. Wi-Fi Security Testing.srt
|
4.2 KB
|
5.1 aircrack-ng.html
|
0.1 KB
|
5.2 cowpatty.html
|
0.1 KB
|
5.3 List of USB wirless card for Kali.html
|
0.1 KB
|
5.4 Alfa AWUS036NHA - Wireless BGN USB Adaptor - 802.11n.html
|
0.1 KB
|
5.5 reaver.html
|
0.1 KB
|
5.6 fern wifi cracker.html
|
0.1 KB
|
5.7 oswa live CD.html
|
0.1 KB
|
5.8 Another list of Kali USB wireless adapters.html
|
0.1 KB
|
6. Wireless Security - Secure Configuration and Network Isolation.mp4
|
33.1 MB
|
6. Wireless Security - Secure Configuration and Network Isolation.srt
|
16.4 KB
|
6.1 Examples of wireless isolation option.html
|
0.2 KB
|
7. Wireless security - RF Isolation and Reduction.mp4
|
9.9 MB
|
7. Wireless security - RF Isolation and Reduction.srt
|
3.6 KB
|
7.1 Example Faraday Bag.html
|
0.2 KB
|
7.2 Example Shielding.html
|
0.1 KB
|
7.3 NIST - Guide to Bluetooth Security.html
|
0.1 KB
|
7.4 Bluetooth factsheet.html
|
0.1 KB
|
8. Wireless security - Who is on my Wi-Fi Network.mp4
|
12.3 MB
|
8. Wireless security - Who is on my Wi-Fi Network.srt
|
4.3 KB
|
8.1 Fing Android.html
|
0.1 KB
|
8.2 glasswire.com.html
|
0.1 KB
|
8.3 whoisonmywifi.com.html
|
0.1 KB
|
8.4 wifi network monitor.html
|
0.1 KB
|
8.5 WI-FI INSPECTOR.html
|
0.1 KB
|
8.6 Fing IOS.html
|
0.1 KB
|
8.7 Wireless Network Watcher.html
|
0.1 KB
|
8.8 airodump-ng.html
|
0.1 KB
|
/7. Network Monitoring for Threats/
|
1. Goals and Learning Objectives.mp4
|
1.5 MB
|
1. Goals and Learning Objectives.srt
|
0.4 KB
|
2. Syslog.mp4
|
84.0 MB
|
2. Syslog.srt
|
19.2 KB
|
2.1 Syslog RFC5424.html
|
0.1 KB
|
2.2 List of syslog serversviewers.html
|
0.1 KB
|
2.3 Linux - How To Set Up A Debian Linux Syslog Server.html
|
0.1 KB
|
2.4 Windows - How to Remotely Collect Server Events Using Syslog.html
|
0.1 KB
|
2.5 Windows - syslog watcher.html
|
0.1 KB
|
2.6 Linux - Setting up a Centralized RSYSLOG Server Monitoring.html
|
0.1 KB
|
2.7 Windows - How to Configure Your Router for Network Wide URL Logging.html
|
0.2 KB
|
2.8 Windows - Become Really Paranoid By Monitoring Your Network’s Comings _ Goings With WallWatcher _ DD-WRT.html
|
0.2 KB
|
2.9 Syslog for windows.html
|
0.1 KB
|
2.10 Windows - Wallwatcher.html
|
0.1 KB
|
2.11 Linux - Using a central log server to monitor your devices.html
|
0.2 KB
|
2.12 Linux - A gui log analyzer.html
|
0.1 KB
|
2.13 Windows - Link logger.html
|
0.1 KB
|
2.14 Windows - PRTG free syslog server.html
|
0.1 KB
|
2.15 Windows - kiwi syslog server.html
|
0.1 KB
|
2.16 Windows - winsyslog server.html
|
0.1 KB
|
3. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1.mp4
|
46.7 MB
|
3. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1.srt
|
15.5 KB
|
3.1 wireshark.org.html
|
0.1 KB
|
4. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2.mp4
|
27.8 MB
|
4. Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2.srt
|
8.9 KB
|
4.1 tcpdump cheat sheet.html
|
0.1 KB
|
5. Wireshark - Finding malware and hackers - Part 1.mp4
|
95.4 MB
|
5. Wireshark - Finding malware and hackers - Part 1.srt
|
16.1 KB
|
5.1 Wireshark Display Filters.html
|
0.1 KB
|
5.2 Wireshark Cheetsheet.html
|
0.1 KB
|
6. Wireshark - Finding malware and hackers - Part 2.mp4
|
58.7 MB
|
6. Wireshark - Finding malware and hackers - Part 2.srt
|
8.7 KB
|
7. Network Monitoring - Wincap, NST, Netminer and NetWorx.mp4
|
19.7 MB
|
7. Network Monitoring - Wincap, NST, Netminer and NetWorx.srt
|
2.0 KB
|
7.1 NetworkMiner.html
|
0.1 KB
|
7.2 Wincap.html
|
0.1 KB
|
7.3 5 Killer Tricks to Get the Most Out of Wireshark.html
|
0.1 KB
|
7.4 NetWorx.html
|
0.1 KB
|
7.5 Network Security Toolkit live operating system.html
|
0.1 KB
|
/8. How We Are Tracked Online/
|
1. Goals and Learning Objectives.mp4
|
2.1 MB
|
1. Goals and Learning Objectives.srt
|
0.5 KB
|
2. Types of Tracking.mp4
|
94.2 MB
|
2. Types of Tracking.srt
|
7.0 KB
|
3. IP Address.mp4
|
48.6 MB
|
3. IP Address.srt
|
6.2 KB
|
3.1 httpwhatismyipaddress.com.html
|
0.1 KB
|
4. 3rd Party Connections.mp4
|
38.3 MB
|
4. 3rd Party Connections.srt
|
4.9 KB
|
5. HTTP Referer.mp4
|
15.1 MB
|
5. HTTP Referer.srt
|
3.8 KB
|
5.1 httpwww.whatismyreferer.com.html
|
0.1 KB
|
6. Cookies and Scripts.mp4
|
35.4 MB
|
6. Cookies and Scripts.srt
|
9.7 KB
|
7. Super Cookies.mp4
|
30.1 MB
|
7. Super Cookies.srt
|
6.4 KB
|
7.1 Anti-privacy unkillable super-cookies spreading around the world – study.html
|
0.1 KB
|
7.2 The Rise of Mobile Tracking Headers How Telcos Around the World Are Threatening Your Privacy.html
|
0.1 KB
|
7.3 Example Super Cookie - Evercookie.html
|
0.1 KB
|
8. Browser Fingerprinting and Browser Volunteered Information.mp4
|
39.0 MB
|
8. Browser Fingerprinting and Browser Volunteered Information.srt
|
3.2 KB
|
8.1 Panopticlick.html
|
0.1 KB
|
8.2 httpsipleak.net.html
|
0.1 KB
|
9. Browser and Browser Functionality.mp4
|
13.6 MB
|
9. Browser and Browser Functionality.srt
|
2.1 KB
|
9.1 httpswww.browserleaks.com.html
|
0.1 KB
|
10. More Tracking.mp4
|
54.6 MB
|
10. More Tracking.srt
|
4.0 KB
|
10.1 Content Security Policy.html
|
0.1 KB
|
11. Browser and Internet Profiling.mp4
|
43.8 MB
|
11. Browser and Internet Profiling.srt
|
8.4 KB
|
11.1 GCHQ radio porn spies track web users online identities.html
|
0.2 KB
|
/9. Search Engines and Privacy/
|
1. Goals and Learning Objectives.mp4
|
1.7 MB
|
1. Goals and Learning Objectives.srt
|
0.5 KB
|
2. Search Engine Tracking, Censorship and Privacy.mp4
|
56.2 MB
|
2. Search Engine Tracking, Censorship and Privacy.srt
|
18.1 KB
|
2.1 Terms of service_ Didn_t read.html
|
0.1 KB
|
2.2 Google Products.html
|
0.1 KB
|
2.3 Graphic on Market share.html
|
0.1 KB
|
2.4 AOL personal data leak.html
|
0.1 KB
|
2.5 Target Detection Identifiers - An Introduction.html
|
0.1 KB
|
2.6 Types of cookies used by Google.html
|
0.1 KB
|
2.7 GCHQ spy tools.html
|
0.1 KB
|
2.8 Search engine market share.html
|
0.1 KB
|
2.9 Web Privacy Census.html
|
0.1 KB
|
2.10 NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say.html
|
0.3 KB
|
2.11 Blazing Saddles Tools.html
|
0.1 KB
|
3. Ixquick and Startpage.mp4
|
35.4 MB
|
3. Ixquick and Startpage.srt
|
10.7 KB
|
3.1 httpsstartpage.com.html
|
0.1 KB
|
3.2 Privacy Policy.html
|
0.1 KB
|
3.3 Tor and Startpage.html
|
0.2 KB
|
3.4 httpsixquick.com.html
|
0.1 KB
|
3.5 Startpage Plugin.html
|
0.1 KB
|
4. DuckDuckGo.mp4
|
12.5 MB
|
4. DuckDuckGo.srt
|
4.7 KB
|
4.1 iphone and android app.html
|
0.1 KB
|
4.2 Firefox plugin for DuckDuckGo.html
|
0.1 KB
|
4.3 httpsduckduckgo.comhtml.html
|
0.1 KB
|
4.4 httpsduckduckgo.com.html
|
0.1 KB
|
4.5 Privacy Policy.html
|
0.1 KB
|
4.6 To ONLY install DuckDuckGo as your default search engine.html
|
0.1 KB
|
4.7 httpswww.crunchbase.compersongabriel-weinberg#entity.html
|
0.1 KB
|
5. Disconnect search.mp4
|
17.2 MB
|
5. Disconnect search.srt
|
5.9 KB
|
5.1 httpssearch.disconnect.me.html
|
0.1 KB
|
5.2 Privacy policy.html
|
0.1 KB
|
5.3 httpsdisconnect.mesearch.html
|
0.1 KB
|
5.4 Tor Search Engine Offers Weak SSLTLS Ciphers.html
|
0.1 KB
|
5.5 Disconnect Plugin.html
|
0.1 KB
|
6. YaCy.mp4
|
44.2 MB
|
6. YaCy.srt
|
5.1 KB
|
6.1 httpyacy.netenindex.html.html
|
0.1 KB
|
6.2 searx.me - Another option!.html
|
0.1 KB
|
6.3 httpsmetager.deen.html
|
0.1 KB
|
6.4 PRISM collection details.html
|
0.2 KB
|
6.5 Yacy Youtube channel.html
|
0.1 KB
|
6.6 Yacy online demo.html
|
0.1 KB
|
7. Private and Anonymous Searching.mp4
|
57.0 MB
|
7. Private and Anonymous Searching.srt
|
9.6 KB
|
7.1 Instructions to delete google history.html
|
0.1 KB
|
7.2 httpshistory.google.comhistory.html
|
0.1 KB
|
/11. Passwords and Authentication Methods/
|
1. Goals and Learning Objectives.mp4
|
2.7 MB
|
1. Goals and Learning Objectives.srt
|
0.7 KB
|
2. Password Attacks.mp4
|
7.8 MB
|
2. Password Attacks.srt
|
4.7 KB
|
2.1 haveibeenpwned.com.html
|
0.1 KB
|
3. How Passwords are Cracked - Hashes - Part 1.mp4
|
43.1 MB
|
3. How Passwords are Cracked - Hashes - Part 1.srt
|
22.6 KB
|
3.1 Example combinator attack.html
|
0.1 KB
|
3.2 Analysis password patterns - Pack.html
|
0.1 KB
|
3.3 Hydra.html
|
0.1 KB
|
3.4 Leet Speak.html
|
0.1 KB
|
3.5 PBKDF2 Hash Generator online.html
|
0.1 KB
|
3.6 Markov chain.html
|
0.1 KB
|
3.7 Hash samples.html
|
0.1 KB
|
3.8 Example rule based attack.html
|
0.1 KB
|
3.9 SHA1 and other hash functions online generator.html
|
0.1 KB
|
3.10 Bcrypt.html
|
0.1 KB
|
3.11 Hardware security module (HSM).html
|
0.1 KB
|
3.12 Nitrokey HSM.html
|
0.1 KB
|
3.13 Scrypt.html
|
0.1 KB
|
3.14 Hash-based message authentication code (HMAC).html
|
0.1 KB
|
3.15 PBKDF2 (Password-Based Key Derivation Function 2).html
|
0.1 KB
|
4. How Passwords are Cracked - Hashcat - Part 2.mp4
|
25.3 MB
|
4. How Passwords are Cracked - Hashcat - Part 2.srt
|
10.0 KB
|
4.1 Example Hashdumps and Passwords.html
|
0.1 KB
|
4.2 Pass the hash.html
|
0.1 KB
|
4.3 hashcat - advanced password recovery.html
|
0.1 KB
|
4.4 25-GPU cluster cracks every standard Windows password in 6 hours.html
|
0.2 KB
|
4.5 crackstation.net.html
|
0.1 KB
|
4.6 Pwdump.html
|
0.1 KB
|
5. Operating System Passwords.mp4
|
7.4 MB
|
5. Operating System Passwords.srt
|
3.4 KB
|
5.1 How to reset the root password in Debian and Ubuntu.html
|
0.1 KB
|
5.2 Windows - 7 Free Windows Password Recovery Tools.html
|
0.1 KB
|
5.3 Windows - Active@ Password Changer.html
|
0.1 KB
|
6. Password Managers - An Introduction.mp4
|
4.3 MB
|
6. Password Managers - An Introduction.srt
|
2.7 KB
|
6.1 List of password managers.html
|
0.1 KB
|
7. Password Managers - Master Password.mp4
|
12.0 MB
|
7. Password Managers - Master Password.srt
|
6.6 KB
|
7.1 Master Password.html
|
0.1 KB
|
8. Password Managers - KeePass, KeePassX and KeyPassXC.mp4
|
16.4 MB
|
8. Password Managers - KeePass, KeePassX and KeyPassXC.srt
|
8.2 KB
|
8.1 Yubico and Keepass.html
|
0.1 KB
|
8.2 Keepass.html
|
0.1 KB
|
8.3 Keepassx.html
|
0.1 KB
|
8.4 keepassxc.org.html
|
0.1 KB
|
8.5 Yubico and Keepassx.html
|
0.1 KB
|
9. Password Managers - LastPass.mp4
|
27.8 MB
|
9. Password Managers - LastPass.srt
|
15.8 KB
|
9.1 Lastpass password iterations with pbkdf2.html
|
0.1 KB
|
9.2 Lastpass.html
|
0.1 KB
|
10. Password Managers - Hardening Lastpass.mp4
|
16.3 MB
|
10. Password Managers - Hardening Lastpass.srt
|
12.0 KB
|
10.1 Encryptr.html
|
0.1 KB
|
11. Creating a Strong Password That You Can Remember - Part 1.mp4
|
23.2 MB
|
11. Creating a Strong Password That You Can Remember - Part 1.srt
|
12.3 KB
|
11.1 Cygnius - Password Checker.html
|
0.1 KB
|
11.2 Example Password Patterns.html
|
0.1 KB
|
11.3 zxcvbn on github - Password Checker.html
|
0.1 KB
|
12. Creating a Strong Password That You Can Remember - Part 2.mp4
|
23.6 MB
|
12. Creating a Strong Password That You Can Remember - Part 2.srt
|
13.4 KB
|
12.1 Brute force password search space calculator by Steve Gibson.html
|
0.1 KB
|
12.2 zxcvbn on github - Password Checker.html
|
0.1 KB
|
13. Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy.mp4
|
26.1 MB
|
13. Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy.srt
|
14.2 KB
|
13.1 Android - Top Developer Google Authenticator.html
|
0.2 KB
|
13.2 IOS - Google Authenticator.html
|
0.1 KB
|
13.3 Initiative For Open Authentication.html
|
0.1 KB
|
13.4 rfc6238.html
|
0.1 KB
|
13.5 Authy.html
|
0.1 KB
|
13.6 Lasspass and Google Authenticator.html
|
0.1 KB
|
14. Multi-Factor Authentication - Hard Tokens - 2FA Dongles.mp4
|
14.3 MB
|
14. Multi-Factor Authentication - Hard Tokens - 2FA Dongles.srt
|
8.2 KB
|
14.1 Yubikey features.html
|
0.1 KB
|
14.2 List of websites and whether or not they support One Time Passwords (OTP) or Universal 2nd Factor (U2F)..html
|
0.1 KB
|
14.3 OTP vs U2F.html
|
0.1 KB
|
14.4 Example of Yubikey with lasspass.html
|
0.1 KB
|
15. Choosing a Method of Multi-Factor Authentication.mp4
|
6.5 MB
|
15. Choosing a Method of Multi-Factor Authentication.srt
|
4.0 KB
|
15.1 Google Authenticator Wiki.html
|
0.1 KB
|
15.2 Yubico and disk encryption.html
|
0.1 KB
|
15.3 Yubikey _ luks.html
|
0.1 KB
|
15.4 dongleauth.info.html
|
0.1 KB
|
15.5 List of websites and whether or not they support 2FA..html
|
0.1 KB
|
16. Multi-Factor Authentication - Strengths and Weaknesses.mp4
|
5.4 MB
|
16. Multi-Factor Authentication - Strengths and Weaknesses.srt
|
3.1 KB
|
16.1 RSA Tokens.html
|
0.2 KB
|
17. The Future of Password and Authentication.mp4
|
4.2 MB
|
17. The Future of Password and Authentication.srt
|
1.9 KB
|
17.1 SQRL demo.html
|
0.1 KB
|
17.2 Clef.html
|
0.1 KB
|
/12. Wrap Up/
|
1. Congratulations.mp4
|
12.1 MB
|
1. Congratulations.srt
|
2.4 KB
|
2. Certificate Of Completion for CPEs.mp4
|
2.2 MB
|
2. Certificate Of Completion for CPEs.srt
|
1.4 KB
|
2.1 httpswww.stationx.netcertificate-request.html
|
0.1 KB
|
3. Which VPN protocol is best to use and why.mp4
|
36.3 MB
|
3. Which VPN protocol is best to use and why.srt
|
15.0 KB
|
3.1 John Gilmore on ispec.html
|
0.1 KB
|
3.2 Cryptanalysis of Microsoft_s PPTP Authentication Extensions (MS-CHAPv2).html
|
0.1 KB
|
3.3 Wikipedia - OpenVPN#Encryption.html
|
0.1 KB
|
3.4 openvpn.net.html
|
0.1 KB
|
3.5 spiegel.de - NSA leaks on ipsec.html
|
0.1 KB
|
4. Email Tracking and Hacking.mp4
|
28.1 MB
|
4. Email Tracking and Hacking.srt
|
13.8 KB
|
5. Security Vulnerabilities, Threats and Adversaries.mp4
|
12.4 MB
|
5. Security Vulnerabilities, Threats and Adversaries.srt
|
5.7 KB
|
/13. BONUS Section/
|
1. BONUS - How to Start a Career in Cyber Security.html
|
1.4 KB
|
Total files 572
|