FileMood

Download [FreeCourseLab.com] Udemy - The Complete Cyber Security Course End Point Protection!

FreeCourseLab com Udemy The Complete Cyber Security Course End Point Protection

Name

[FreeCourseLab.com] Udemy - The Complete Cyber Security Course End Point Protection!

 DOWNLOAD Copy Link

Total Size

3.2 GB

Total Files

1023

Hash

159A872F80B71DAF931F91622D4208C59C5CF367

/1. Introduction/

1. Welcome to Volume 4.mp4

7.5 MB

1. Welcome to Volume 4.vtt

0.9 KB

2. Introduction to the Instructor!.mp4

18.0 MB

2. Introduction to the Instructor!.vtt

1.9 KB

2.1 Nathan's Security Blog.html

0.1 KB

2.2 Nathan's Twitter.html

0.1 KB

3. Security Quick Win!.mp4

46.8 MB

3. Security Quick Win!.vtt

21.3 KB

4. Target Audience.mp4

7.7 MB

4. Target Audience.vtt

2.5 KB

5. Study Recommendations.mp4

29.3 MB

5. Study Recommendations.vtt

5.5 KB

6. Course updates.mp4

2.7 MB

6. Course updates.vtt

0.8 KB

/10. Secure Deleting, Evidence Elimination and Anti-Forensics/

1. Goals and Learning Objectives.mp4

6.8 MB

1. Goals and Learning Objectives.vtt

0.8 KB

10. Scrubbing EXIF & Metadata Part 2 - Tools.mp4

21.4 MB

10. Scrubbing EXIF & Metadata Part 2 - Tools.vtt

6.2 KB

10.1 ExifTool can Read, Write andor Create files in the following formats.html

0.1 KB

10.10 JPEG & PNG Strippe.html

0.1 KB

10.11 BatchPurifier™.html

0.1 KB

10.12 Doc Scrubber Analyze and scrub hidden and potentially embarrassing data in Word documents..html

0.1 KB

10.2 ExifTool by Phil Harvey.html

0.1 KB

10.3 MAT Metadata Anonymisation Toolkit.html

0.1 KB

10.4 Hidden Data Detector™.html

0.1 KB

10.5 Exiv2 is a C++ library and a command line utility to manage image metadata..html

0.1 KB

10.6 pdfparanoia.html

0.1 KB

10.7 httpwww.verexif.comen.html

0.1 KB

10.8 ImageOptim.html

0.1 KB

10.9 httpswww.toolsrepo.comprivacyremove-exif-from-image-files.html

0.1 KB

11. Scrubbing EXIF & Metadata Part 3 - Guidance.mp4

8.8 MB

11. Scrubbing EXIF & Metadata Part 3 - Guidance.vtt

5.4 KB

11.1 How to Remove The Hidden Personal Information Microsoft Office Adds to Your Documents.html

0.2 KB

11.2 How to turn off geotagging for photos iphone ipad.html

0.1 KB

11.3 The views of Iraq you weren’t supposed to see.html

0.1 KB

11.4 ImageMagick®.html

0.1 KB

11.5 How To Turn off Geotagging in Android.html

0.1 KB

12. Sensor Noise Camera Identification.mp4

9.5 MB

12. Sensor Noise Camera Identification.vtt

5.0 KB

12.1 httpwww.cyanogenmod.org.html

0.1 KB

12.2 ObscuraCam Secure Smart Camera.html

0.1 KB

12.3 Associating cameras with users and objects in a social networking system US 20150124107 A1.html

0.1 KB

12.4 Camera Fingerprint - Matlab implementation.html

0.1 KB

12.5 Paper - Sensor Noise Camera Identification Countering Counter-Forensics.html

0.1 KB

2. Secure File Deletion - Mechanical drives.mp4

20.7 MB

2. Secure File Deletion - Mechanical drives.vtt

9.1 KB

2.1 OS X Yosemite Securely erasing your deleted files.html

0.1 KB

2.2 httpwww.fileshredder.org.html

0.1 KB

2.3 httpwww.filehippo.comdownload_recuva.html

0.1 KB

2.4 httperaser.heidi.ie.html

0.1 KB

3. Secure File Deletion - Solid Sate Drives.mp4

12.7 MB

3. Secure File Deletion - Solid Sate Drives.vtt

7.2 KB

3.1 Recovering Evidence from SSD Drives in 2014 Understanding TRIM, Garbage Collection and Exclusions.html

0.2 KB

3.2 SSD and eMMC Forensics 2016.html

0.1 KB

3.3 Security of Data on Disk - Video.html

0.1 KB

3.4 Paper - Reliably Erasing Data From Flash-Based Solid State Drives.html

0.1 KB

3.5 EXTRA BITS - Data Security and Flash Memory.html

0.1 KB

4. Evidence Elimination & Anti-Forensics - An Introduction.mp4

8.7 MB

4. Evidence Elimination & Anti-Forensics - An Introduction.vtt

5.7 KB

5. Evidence Elimination - CCleaner and Bleachit.mp4

19.2 MB

5. Evidence Elimination - CCleaner and Bleachit.vtt

8.1 KB

5.1 httpwww.winapp2.com.html

0.1 KB

5.2 httpswww.piriform.comccleaner.html

0.1 KB

5.3 httpbleachbit.sourceforge.netdocumentationwinapp2_ini.html

0.1 KB

5.4 httpbleachbit.sourceforge.net.html

0.1 KB

6. Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer.mp4

14.9 MB

6. Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer.vtt

6.8 KB

6.1 Force Windows 7 to Clear Virtual Memory Pagefile at Shutdown.html

0.2 KB

6.2 Windows - Disbale Memory Dump Files.html

0.1 KB

6.3 How to disable and re-enable hibernation on a computer that is running Windows.html

0.1 KB

6.4 Paging File Info.html

0.1 KB

6.5 How to disable virtual memory in Windows 7.html

0.1 KB

6.6 Mac - Instruction to disable swap here.html

0.1 KB

6.7 Mac - How to disable virtual memory swap files.html

0.1 KB

6.8 Linux - How to Clear RAM Memory Cache, Buffer and Swap Space.html

0.1 KB

7. Disk Wiping - Mechanical Drives.mp4

12.0 MB

7. Disk Wiping - Mechanical Drives.vtt

4.4 KB

7.1 httpswww.bleachbit.org.html

0.1 KB

7.10 How To Securely Wipe Your Hard Drive with DBAN – Erase Your Data for Good.html

0.2 KB

7.11 httpwww.dban.org.html

0.1 KB

7.2 httpwww.fileshredder.org.html

0.1 KB

7.3 How To Wipe a Hard Drive.html

0.1 KB

7.4 httpswww.piriform.comccleaner.html

0.1 KB

7.5 OS X Yosemite Securely erasing your deleted files.html

0.1 KB

7.6 Drive eRazer Ultra Multi-function device that completely erases all data from a hard drive.html

0.1 KB

7.7 HARD DRIVE DEGAUSSER.html

0.1 KB

7.8 httperaser.heidi.ie.html

0.1 KB

7.9 httppartedmagic.com.html

0.1 KB

8. Disk Wiping - Solid State Drives (SSD).mp4

24.2 MB

8. Disk Wiping - Solid State Drives (SSD).vtt

12.1 KB

8.1 Commonly Asked Questions and Answers on Self-encrypting Drives.html

0.2 KB

8.10 httppartedmagic.com.html

0.1 KB

8.11 httpsen.wikipedia.orgwikiParallel_ATA#HDD_passwords_and_security.html

0.1 KB

8.12 Thermaltake BlacX Hot-Swap SATA External Hard Drive Docking Station for Windows & Mac Os Compatible.html

0.1 KB

8.13 NIST Special Publication 800-88 - Guidelines for Media Sanitization.html

0.1 KB

8.14 Securely Erasing Your SSD with Linux A How-To.html

0.1 KB

8.2 What is Crypto Erase.html

0.1 KB

8.3 SanDisk Crypto Erase Tool support information.html

0.2 KB

8.4 Ten Reasons to Buy Self-Encrypting Drives.html

0.1 KB

8.5 Drive Erase Utility for the Resetting the Cryptographic Key and the Erasing the Solid State Drive - ThinkPad.html

0.1 KB

8.6 httpgparted.sourceforge.net.html

0.1 KB

8.7 Paper - Reliably Erasing Data From Flash-Based Solid State Drives.html

0.1 KB

8.8 How to Secure Erase your Solid State Drive (SSD) with Parted Magic.html

0.1 KB

8.9 httpsen.wikipedia.orgwikiHdparm.html

0.1 KB

9. Scrubbing EXIF & Metadata Part 1 - Introduction.mp4

17.0 MB

9. Scrubbing EXIF & Metadata Part 1 - Introduction.vtt

8.1 KB

9.1 BatchPurifier™ 7.2.html

0.1 KB

9.2 Metadata ruins Google's anonymous eBay Australia protest.html

0.1 KB

9.3 httpsloc.alize.us.html

0.1 KB

9.4 The 13 Most Embarrassing Web Moments.html

0.1 KB

9.5 Busted! FBI led to Anonymous hacker after he posts picture of girlfriend's breasts online.html

0.2 KB

9.6 The views of Iraq you weren’t supposed to see.html

0.1 KB

9.7 Geotagging poses security risks.html

0.1 KB

/11. Email Security, Privacy and Anonymity/

1. Goals and Learning Objectives.mp4

10.0 MB

1. Goals and Learning Objectives.vtt

1.1 KB

10. Improving OpenPGP Security - Primary and Subkeys - Part 2.mp4

30.1 MB

10. Improving OpenPGP Security - Primary and Subkeys - Part 2.vtt

10.8 KB

10.1 Using OpenPGP subkeys in Debian development.html

0.1 KB

10.2 Anatomy of a GPG Key.html

0.1 KB

10.3 httpsgpgtools.org.html

0.1 KB

10.4 Improve the Security of Your OpenPGP Key by Using Subkeys.html

0.1 KB

10.5 CREATING THE PERFECT GPG KEYPAIR.html

0.1 KB

11. Improving OpenPGP Security - SmartcardsYubikey - Part 3.mp4

23.2 MB

11. Improving OpenPGP Security - SmartcardsYubikey - Part 3.vtt

8.6 KB

11.1 Using GPG with Smart Cards.html

0.1 KB

11.2 Smartcard The OpenPGP card.html

0.1 KB

11.3 httpsdevelopers.yubico.comyubikey-neo-managerReleases.html

0.1 KB

11.4 httpshop.kernelconcepts.de.html

0.1 KB

11.5 YUBIKEY NEO AND OPENPGP.html

0.1 KB

12. Email Tracking & Exploits.mp4

28.1 MB

12. Email Tracking & Exploits.vtt

11.2 KB

12.1 Email Privacy Tester.html

0.1 KB

12.2 #BadWinmail Demo.html

0.1 KB

12.3 Thunderbird - Remote Content in Messages.html

0.1 KB

12.4 Fight Spam and Protect Your Privacy by Disabling Remote Content in Apple Mail.html

0.1 KB

12.5 #BadWinmail The Enterprise Killer Attack Vector in Microsoft Outlook.html

0.1 KB

13. Email Anonymity & Pseudonymity.mp4

16.7 MB

13. Email Anonymity & Pseudonymity.vtt

6.7 KB

13.1 httpwww.dispostable.com.html

0.1 KB

13.10 httpwww.mytrashmail.com.html

0.1 KB

13.11 httpsmailinator.com.html

0.1 KB

13.2 httpswww.guerrillamail.com.html

0.1 KB

13.3 httpwww.tempinbox.com.html

0.1 KB

13.4 httpswww.trash-mail.comen.html

0.1 KB

13.5 httpsanonbox.net.html

0.1 KB

13.6 httpgetairmail.com.html

0.1 KB

13.7 Send Anonymous Emails 20 Sites To Keep Your Identity Hidden.html

0.1 KB

13.8 httpdontmail.net.html

0.1 KB

13.9 httpwww.migmail.net.html

0.1 KB

14. TorBirdy.mp4

22.6 MB

14. TorBirdy.vtt

7.5 KB

14.1 httpsaddons.mozilla.orgen-usthunderbirdaddontorbirdy.html

0.1 KB

14.2 httpstrac.torproject.orgprojectstorwikitorbirdy.html

0.1 KB

15. Remailers.mp4

20.5 MB

15. Remailers.vtt

7.7 KB

15.1 httpis-not-my.name.html

0.1 KB

15.10 httpswww.whonix.orgwikiNymservers.html

0.1 KB

15.11 httpspackages.debian.orgstablemailmixmaster.html

0.1 KB

15.12 DEF CON 21 - Tom Ritter - De Anonymizing Alt Anonymous Messages.html

0.1 KB

15.13 Yardbird's Effective Usenet Tradecraft DEC 1ST, 2013 Survival in an Extremely Adversarial Environment.html

0.1 KB

15.14 httpsgithub.comcryptodotismixgui.html

0.1 KB

15.15 httpswww.whonix.orgwikiMixmaster.html

0.1 KB

15.2 httpremailer.paranoici.org.html

0.1 KB

15.3 httpswww.quicksilvermail.net.html

0.1 KB

15.4 httpmixmaster.sourceforge.net.html

0.1 KB

15.5 de-anonymizing alt.anonymous.messages.html

0.1 KB

15.6 httpmixminion.net.html

0.1 KB

15.7 httpsgroups.google.comforum#!forumalt.anonymous.messages.html

0.1 KB

15.8 httpsdizum.comremailer.html.html

0.1 KB

15.9 httpslabs.riseup.netcodeissues8225.html

0.1 KB

16. Choosing an Email Provider.mp4

39.2 MB

16. Choosing an Email Provider.vtt

15.4 KB

16.1 httpsruggedinbox.com.html

0.1 KB

16.10 httpsmailinabox.email.html

0.1 KB

16.11 httpssecure.runbox.com.html

0.1 KB

16.12 httpswww.openmailbox.org.html

0.1 KB

16.13 httpsruggedinbox.com.html

0.1 KB

16.14 httpsposteo.deen.html

0.1 KB

16.15 httpswww.eff.orgissuesmandatory-data-retention.html

0.1 KB

16.16 httpswww.tutanota.com.html

0.1 KB

16.17 httpsneomailbox.net.html

0.1 KB

16.18 Email Privacy Tester.html

0.1 KB

16.19 httpswww.startmail.com.html

0.1 KB

16.2 httpswww.cryptoheaven.com.html

0.1 KB

16.20 CHOOSING PRIVATE & SECURE EMAIL WHAT TO LOOK FOR.html

0.1 KB

16.21 httpswww.reddit.comrprivacycomments1k2aqoin_the_wake_of_the_lavabit_shutdown_were_looking.html

0.2 KB

16.3 Google gives Gmail a major security boost in bid to stop spy snooping.html

0.2 KB

16.4 httpscountermail.com.html

0.1 KB

16.5 httpskolabnow.com.html

0.1 KB

16.6 httpsen.wikipedia.orgwikiComparison_of_webmail_providers.html

0.1 KB

16.7 httpwww.prxbx.comemail - Privacy-Conscious Email Services.html

0.1 KB

16.8 httpsmailbox.orgen.html

0.1 KB

16.9 httpswww.google.comlanding2step.html

0.1 KB

17. Email Alternatives.mp4

7.8 MB

17. Email Alternatives.vtt

3.4 KB

17.1 httpspond.imperialviolet.org.html

0.1 KB

17.2 httpsbitmessage.orgwikiMain_Page.html

0.1 KB

17.3 httpsen.wikipedia.orgwikiI2P.html

0.1 KB

17.4 httpswww.confidantmail.org.html

0.1 KB

17.5 httpsthetinhat.comtutorialsmessagingi2p-bote-thunderbird.html.html

0.1 KB

17.6 httpsbitmessage.orgbitmessage.pdf.html

0.1 KB

17.7 httpretroshare.sourceforge.net.html

0.1 KB

2. Clients, Protocols and Authentication.mp4

40.0 MB

2. Clients, Protocols and Authentication.vtt

13.7 KB

2.1 Is STARTTLS more safe than TLSSSL.html

0.1 KB

2.2 httpswww.checktls.com.html

0.1 KB

3. Email Weaknesses.mp4

32.3 MB

3. Email Weaknesses.vtt

14.1 KB

3.1 The Current State of SMTP STARTTLS Deployment.html

0.2 KB

3.2 Google - Email encryption in transit.html

0.1 KB

3.3 Free online fake mailer with attachments, encryption, HTML editor and advanced settings.html

0.1 KB

3.4 httpswww.parsemail.org.html

0.1 KB

4. PGP, GPG & Privacy.mp4

13.6 MB

4. PGP, GPG & Privacy.vtt

6.1 KB

4.1 rfc4880.txt OpenPGP Message Format.html

0.1 KB

4.2 Symantec Desktop Email Encryption.html

0.2 KB

4.3 The GNU Privacy Guard.html

0.1 KB

4.4 An Introduction to Cryptography.html

0.1 KB

5. PGP & GPG Clients.mp4

15.8 MB

5. PGP & GPG Clients.vtt

15.8 MB

5.1 Secure Mobile Apps.html

0.1 KB

5.10 OpenPGP public-key cryptography.html

0.2 KB

5.11 gpg4usb project.html

0.1 KB

5.12 Mymail-Crypt for Gmail - PGP extension for chrome.html

0.2 KB

5.14 httpswww.mailvelope.com.html

0.1 KB

5.15 Secure Mail for Gmail chrome extension.html

0.2 KB

5.16 WebPG for Mozilla - An extension which provides PGP functions to Firefox, Thunderbird and Seamonkey.html

0.1 KB

5.2 iPGMail.html

0.1 KB

5.3 GPG Suite.html

0.1 KB

5.4 Android - OpenKeychain Easy PGP.html

0.1 KB

5.5 How to Use PGP for Linux.html

0.1 KB

5.6 How to Use PGP for Mac OS X.html

0.1 KB

5.7 The best PGP tutorial for Mac OS X, ever.html

0.1 KB

5.8 How to Use PGP for Windows.html

0.1 KB

5.9 Decrypt or verify a text created using OpenPGP Applet.html

0.1 KB

6. Windows - PGP & GPG.mp4

61.1 MB

6. Windows - PGP & GPG.vtt

18.7 KB

6.1 How to Use PGP for Windows.html

0.1 KB

6.2 The Gpg4win Compendium Secure e-mail and file encryption using GnuPG for Windows.html

0.1 KB

6.3 Gpg4win.html

0.1 KB

6.4 Google - Sign in using App Passwords.html

0.1 KB

6.5 Thunderbird.html

0.1 KB

6.6 httpwww.stationx.netnathan-house.html

0.1 KB

6.7 Enigmail.html

0.1 KB

7. Tail - PGP & GPG.mp4

10.1 MB

7. Tail - PGP & GPG.vtt

2.9 KB

7.1 httpwww.stationx.netnathan-house.html

0.1 KB

8. PGP & GPG Weaknesses.mp4

15.4 MB

8. PGP & GPG Weaknesses.vtt

6.7 KB

8.1 What’s the matter with PGP.html

0.1 KB

8.2 15 reasons not to start using PGP.html

0.1 KB

9. Improving OpenPGP Security - Best Practices - Part 1.mp4

5.8 MB

9. Improving OpenPGP Security - Best Practices - Part 1.vtt

2.5 KB

9.1 OpenPGP Best Practices.html

0.1 KB

9.2 httpsraw.githubusercontent.comioerrorduraconfmasterconfigsgnupggpg.conf.html

0.1 KB

/12. Messengers - Security, Privacy and Anonymity/

1. Goals and Learning Objectives.mp4

3.0 MB

1. Goals and Learning Objectives.vtt

0.4 KB

10. Video and Voice Messengers - Other.mp4

2.8 MB

10. Video and Voice Messengers - Other.vtt

1.2 KB

10.1 httpsen.wikipedia.orgwikiComparison_of_VoIP_software.html

0.1 KB

10.2 httpsring.cx.html

0.1 KB

10.3 httpstox.chat.html

0.1 KB

2. An Introduction to Instant Messengers.mp4

26.4 MB

2. An Introduction to Instant Messengers.vtt

3.5 KB

2.1 httpswww.eff.orgsecure-messaging-scorecard.html

0.1 KB

2.2 httpswww.securemessagingapps.com.html

0.1 KB

2.3 httpsen.wikipedia.orgwikiComparison_of_instant_messaging_clients.html

0.1 KB

3. Instant Messenger - Signal.mp4

6.2 MB

3. Instant Messenger - Signal.vtt

2.8 KB

3.1 How to Use Signal on iOS.html

0.1 KB

3.2 httpswhispersystems.org.html

0.1 KB

3.3 iOS - Signal.html

0.1 KB

3.4 Andoird - Signal.html

0.1 KB

3.5 SIGNAL AUDIT REVEALS PROTOCOL CRYPTOGRAPHICALLY SOUND.html

0.1 KB

3.6 How to Use Signal for Android.html

0.1 KB

4. Instant Messengers - Chatsecure.mp4

4.2 MB

4. Instant Messengers - Chatsecure.vtt

1.7 KB

4.1 How to Install and Use ChatSecure.html

0.1 KB

4.2 httpschatsecure.org.html

0.1 KB

5. Instant Messengers - Cryptocat.mp4

1.5 MB

5. Instant Messengers - Cryptocat.vtt

0.9 KB

5.1 httpscrypto.cat.html

0.1 KB

6. Instant Messengers - Ricochet.mp4

1.5 MB

6. Instant Messengers - Ricochet.vtt

0.8 KB

6.1 httpsricochet.im.html

0.1 KB

7. Instant Messengers - Other.mp4

1.6 MB

7. Instant Messengers - Other.vtt

0.8 KB

7.1 Conversations (Jabber XMPP).html

0.1 KB

7.2 httpkontalk.org.html

0.1 KB

8. Video and Voice Messengers - Linphone.mp4

12.1 MB

8. Video and Voice Messengers - Linphone.vtt

4.7 KB

8.1 httpswww.linphone.org.html

0.1 KB

8.2 httpswhispersystems.org.html

0.1 KB

8.3 httpswww.linphone.orguser-guide.html.html

0.1 KB

8.4 httpswww.linphone.orgfree-sip-service.html.html

0.1 KB

9. Video and Voice Messengers - Jitsi.mp4

3.9 MB

9. Video and Voice Messengers - Jitsi.vtt

1.9 KB

9.1 httpsjitsi.org.html

0.1 KB

/13. Wrap Up/

1. Congratulations!!.mp4

4.5 MB

1. Congratulations!!.vtt

0.7 KB

1.1 Nathan's Twitter @GotoNathan.html

0.1 KB

1.2 Cyber Security Newsletter.html

0.1 KB

1.3 Nathan's Blog.html

0.1 KB

2. Certificate Of Completion for CPEs.mp4

2.3 MB

2. Certificate Of Completion for CPEs.vtt

1.1 KB

2.1 httpswww.stationx.netcertificate-request.html

0.1 KB

3. Qubes OS.mp4

59.0 MB

3. Qubes OS.vtt

20.6 KB

4. Effective Network Isolation.mp4

29.4 MB

4. Effective Network Isolation.vtt

13.0 KB

5. Socks5 proxy tunneling.mp4

24.1 MB

5. Socks5 proxy tunneling.vtt

10.2 KB

/14. BONUS Section/

1. BONUS DISCOUNT COUPONS .html

5.1 KB

/2. Goals and Learning Objectives - Volume 4/

1. What is End Point Protection and why is it important.mp4

36.0 MB

1. What is End Point Protection and why is it important.vtt

6.0 KB

2. Goals and Learning Objectives - Volume 4.mp4

26.6 MB

2. Goals and Learning Objectives - Volume 4.vtt

4.1 KB

/3. File and Disk Encryption/

1. Goals and Learning Objectives.mp4

7.5 MB

1. Goals and Learning Objectives.vtt

0.8 KB

10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.mp4

7.1 MB

10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.vtt

3.7 KB

10.1 BestCrypt Volume Encryption.html

0.1 KB

10.2 Symantec Drive Encryption.html

0.1 KB

10.3 httpswww.ciphershed.org.html

0.1 KB

10.4 httpsdiskcryptor.net.html

0.1 KB

10.5 Comparison of disk encryption software From Wikipedia.html

0.1 KB

11. Windows, Mac & Linux - Setting up VeraCrypt.mp4

31.3 MB

11. Windows, Mac & Linux - Setting up VeraCrypt.vtt

12.4 KB

11.1 VeraCrypt - Beginner's Tutorial.html

0.1 KB

12. Mac - Filevault2.mp4

13.8 MB

12. Mac - Filevault2.vtt

2.9 KB

12.1 Use FileVault to encrypt the startup disk on your Mac - Apple.html

0.1 KB

12.2 OS X Security and Privacy Guide - full disk encryption.html

0.1 KB

12.3 Report - Infiltrate the Vault Security Analysis and Decryption of Lion Full Disk Encryption.html

0.1 KB

13. Mac - Setting up Filevault2.mp4

20.7 MB

13. Mac - Setting up Filevault2.vtt

9.0 KB

13.1 Startup key combinations for Mac.html

0.1 KB

13.2 Apple Technical White Paper - Best Practices for Deploying FileVault 2.html

0.1 KB

13.3 DeepSleep - Hibernate your Mac.html

0.1 KB

13.4 Report - Infiltrate the Vault Security Analysis and Decryption of Lion Full Disk Encryption.html

0.1 KB

13.5 Report - Security Analysis and Decryption of FileVault 2 IFIP WG 11.9.html

0.1 KB

13.6 pmset -- manipulate power management settings - Man Page.html

0.2 KB

14. Linux Whole Disk Encryption - Dm-crypt and LUKS.mp4

14.4 MB

14. Linux Whole Disk Encryption - Dm-crypt and LUKS.vtt

6.5 KB

14.1 Two factor authentication with Yubikey for harddisk encryption with LUKS.html

0.2 KB

14.2 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html

0.2 KB

14.3 Plain dm-crypt.html

0.1 KB

14.4 LUKS support for storing keys in TPM NVRAM.html

0.1 KB

15. Linux - Setting up DMCryptLUKS.mp4

13.8 MB

15. Linux - Setting up DMCryptLUKS.vtt

5.3 KB

15.1 The Debian Administrator's Handbook.html

0.1 KB

15.2 Arch - dm-cryptEncrypting an entire system.html

0.1 KB

15.3 Cryptsetup & LUKS.html

0.1 KB

15.4 Arch - Disk encryption.html

0.1 KB

15.5 zuluCrypt.html

0.1 KB

16. Linux - Encrypting the boot partition with Grub2.mp4

12.3 MB

16. Linux - Encrypting the boot partition with Grub2.vtt

4.3 KB

16.1 Arch - Encrypted boot partition (GRUB).html

0.2 KB

16.2 Two factor authentication with Yubikey for harddisk encryption with LUKS.html

0.2 KB

16.3 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html

0.2 KB

17. Self Encrypting Drives (SEDs).mp4

3.3 MB

17. Self Encrypting Drives (SEDs).vtt

2.0 KB

17.1 Report - Ten Reasons to Buy Self-Encrypting Drives.html

0.2 KB

18. Defense Against Disk Decryption Attacks.mp4

21.9 MB

18. Defense Against Disk Decryption Attacks.vtt

9.1 KB

18.1 TRESOR Runs Encryption Securely Outside RAM.html

0.1 KB

18.2 Security Requirements and Precautions.html

0.2 KB

19. File Encryption.mp4

11.7 MB

19. File Encryption.vtt

4.5 KB

19.1 httpswww.aescrypt.com.html

0.1 KB

19.2 httpswww.gnupg.org.html

0.1 KB

19.3 httpwww.peazip.org.html

0.1 KB

19.4 httpwww.kekaosx.comen.html

0.1 KB

2. Disk Encryption – What is it good for.mp4

22.8 MB

2. Disk Encryption – What is it good for.vtt

8.6 KB

20. Mandatory Key Disclosure & Plausible Deniability.mp4

21.5 MB

20. Mandatory Key Disclosure & Plausible Deniability.vtt

8.8 KB

20.1 Arch - Plain dm-crypt.html

0.1 KB

20.2 Key disclosure law From Wikipedia.html

0.1 KB

20.3 httpsxkcd.com538 - Cartoon.html

0.1 KB

20.4 Appeals Court Upholds Constitutional Right Against Forced Decryption.html

0.2 KB

20.5 veracrypt - Plausible Deniability.html

0.1 KB

20.6 veracrypt - Hidden Volume.html

0.1 KB

21. Nesting Crypto Systems & Obfuscation.mp4

9.3 MB

21. Nesting Crypto Systems & Obfuscation.vtt

4.0 KB

22. Case Studies in Disk Decryption.mp4

6.2 MB

22. Case Studies in Disk Decryption.vtt

3.3 KB

22.1 Darkmarket.html

0.3 KB

22.2 Hacking Godfather ‘Maksik’ Sentenced to 30 Years by Turkish Court.html

0.1 KB

22.3 KINGPIN How One Hacker Took Over the Billion-Dollar Cybercrime Underground.html

0.1 KB

3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.mp4

17.6 MB

3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.vtt

6.0 KB

3.1 N.S.A. Able to Foil Basic Safeguards of Privacy on Web.html

0.2 KB

3.2 Further reading on quantum computing and its effect of cryptography - NIST Reports.html

0.2 KB

4. Disk Encryption Attacks - Physical.mp4

40.2 MB

4. Disk Encryption Attacks - Physical.vtt

12.0 KB

4.1 Inception.html

0.1 KB

4.10 Choose the Right BitLocker Countermeasure.html

0.1 KB

4.11 Evil Maid goes after TrueCrypt!.html

0.1 KB

4.12 Passware Kit Enterprise - Hard Disk Decryption.html

0.1 KB

4.2 Intel® Virtualization Technology for Directed IO (VT-d) Enhancing Intel platforms for efficient virtualization of IO devices.html

0.2 KB

4.3 Wikipedia - Disk encryption.html

0.1 KB

4.4 Security Pitfalls in Cryptography.html

0.1 KB

4.5 Inception over firewire attack - video.html

0.1 KB

4.6 Windowsscope.html

0.2 KB

4.7 Report - Cold Boot Attack on DDR2 and DDR3 RAM.html

0.1 KB

4.8 nullcon Goa 2015 Cold Boot Attack on DDR2 and DDR3 RAM by Marko Schuba - Video.html

0.1 KB

4.9 Cold Boot Attack Demo - Video.html

0.1 KB

5. Disk Encryption Attacks - Containers, Volumes and Partitions.mp4

7.5 MB

5. Disk Encryption Attacks - Containers, Volumes and Partitions.vtt

2.6 KB

5.1 Security Pitfalls in Cryptography.html

0.1 KB

6. Windows - Disk Encryption - An Introduction.mp4

7.9 MB

6. Windows - Disk Encryption - An Introduction.vtt

3.2 KB

6.1 Windows BitLocker.html

0.1 KB

6.2 BestCrypt Container Encryption.html

0.1 KB

6.3 Veracrypt.html

0.1 KB

6.4 CipherShed.html

0.1 KB

6.5 DiskCryptor.html

0.1 KB

6.6 Symantec Drive Encryption.html

0.1 KB

6.7 Truecrpyt v7.2 (latest full version) - Download.html

0.1 KB

6.8 Comparison of disk encryption software From Wikipedia.html

0.1 KB

7. Windows - Disk Encryption - Bitlocker.mp4

31.7 MB

7. Windows - Disk Encryption - Bitlocker.vtt

13.9 KB

7.1 What's new in Windows 10, versions 1507 and 1511.html

0.2 KB

7.2 YUBIKEYS.html

0.1 KB

7.3 Every Windows 10 in-place Upgrade is a SEVERE Security risk.html

0.1 KB

7.4 Windows BitLocker Drive Encryption Step-by-Step Guide.html

0.1 KB

8. Windows - Setting Up BitLocker.mp4

24.8 MB

8. Windows - Setting Up BitLocker.vtt

9.7 KB

8.1 ENCRYPTING YOUR LAPTOP LIKE YOU MEAN IT.html

0.1 KB

9. Windows - Disk Encryption - VeraCrypt.mp4

26.3 MB

9. Windows - Disk Encryption - VeraCrypt.vtt

13.5 KB

9.1 httpwww.openwall.comlistsoss-security201601111.html

0.1 KB

9.10 httpssourceforge.netpveracryptcodecimastertreesrcBootEFIReadme.txt#l19.html

0.1 KB

9.11 yubico.com.html

0.1 KB

9.12 GERMAN GOVERNMENT AUDITS TRUECRYPT.html

0.1 KB

9.2 VeraCrypt - Operating Systems Supported for System Encryption.html

0.2 KB

9.3 Veracrypt.html

0.1 KB

9.4 Report - UEFI SECURE BOOT IN MODERN COMPUTER SECURITY SOLUTIONS.html

0.2 KB

9.5 IsTrueCryptAuditedYet Yes!.html

0.1 KB

9.6 Nitrokey.com.html

0.1 KB

9.7 Veracrypt FAQ.html

0.1 KB

9.8 Truecrypt 7 Derived CodeWindows Incorrect Impersonation Token Handling EoP.html

0.1 KB

9.9 Truecrypt 7 Derived CodeWindows Drive Letter Symbolic Link Creation EoP.html

0.1 KB

/4. Anti-Virus and End-Point-Protection/

1. Goals and Learning Objectives.mp4

5.9 MB

1. Goals and Learning Objectives.vtt

0.8 KB

10. Mac - XProtect.mp4

14.2 MB

10. Mac - XProtect.vtt

3.4 KB

10.1 httpswww.intego.commac-security-blogtopicxprotect.html

0.1 KB

10.2 httpsvirustotal.github.ioyara.html

0.1 KB

10.3 Are you sure you want to open it alert (File Quarantine Known Malware Detection) in OS X.html

0.1 KB

11. Mac - The Best of Anti-Virus and End-Point-Protection.mp4

6.8 MB

11. Mac - The Best of Anti-Virus and End-Point-Protection.vtt

2.9 KB

11.1 Malwarebytes for Mac.html

0.1 KB

11.2 Patrick Wardle, Synack How to practically create elegant, bad@ss OS X malware..html

0.1 KB

11.3 httpswww.intego.com.html

0.1 KB

11.4 History of Mac Malware.html

0.1 KB

11.5 httpwww.thesafemac.com.html

0.1 KB

11.6 httpswww.av-comparatives.orgwp-contentuploads201607avc_mac_2016_en.pdf --- NEW version.html

0.1 KB

12. Linux - The Best of Anti-Virus and End-Point-Protection.mp4

6.5 MB

12. Linux - The Best of Anti-Virus and End-Point-Protection.vtt

3.1 KB

12.1 httpsrootkit.nlprojectsrootkit_hunter.html.html

0.1 KB

12.2 httpwww.clamav.net.html

0.1 KB

12.3 httpwww.chkrootkit.org.html

0.1 KB

12.4 Report - Linux Security Review.html

0.1 KB

12.5 Linux malware From Wikipedia.html

0.1 KB

12.6 httpswww.rfxn.comprojectslinux-malware-detect.html

0.1 KB

13. Online and Second Opinion - Anti-Virus and End-Point-Protection.mp4

10.4 MB

13. Online and Second Opinion - Anti-Virus and End-Point-Protection.vtt

3.3 KB

13.1 virustotal.com email-submissions.html

0.1 KB

13.2 httpvirscan.org.html

0.1 KB

13.3 httpswww.herdprotect.comdownloads.aspx.html

0.1 KB

13.4 httpsvirusscan.jotti.org.html

0.1 KB

13.5 httpswww.metascan-online.com#!scan-file.html

0.1 KB

13.6 httpsalternativeto.netsoftwarevirustotal.html

0.1 KB

13.7 httpwww.surfright.nlenhitmanpro.html

0.1 KB

13.8 httpswww.eset.comusonline-scanner.html

0.1 KB

13.9 httpwww.threattracksecurity.comresourcessandbox-malware-analysis.aspx.html

0.1 KB

14. Is Anti-Virus and End-Point-Protection Dangerous.mp4

14.0 MB

14. Is Anti-Virus and End-Point-Protection Dangerous.vtt

7.5 KB

14.1 Zero-day vulnerabilities reportedly found in Kaspersky and FireEye security products.html

0.1 KB

14.2 Tavis Ormandy @taviso.html

0.1 KB

14.3 'Ridiculous' Bug in Popular Antivirus Allows Hackers to Steal all Your Passwords.html

0.1 KB

14.4 AVG can sell your browsing and search history to advertisers.html

0.1 KB

14.6 High-severity bugs in 25 SymantecNorton products imperil millions.html

0.2 KB

14.7 MalwareBytes multiple security issues.html

0.1 KB

2. Is Anti-Virus dead - The Threat Landscape.mp4

11.9 MB

2. Is Anti-Virus dead - The Threat Landscape.vtt

4.5 KB

2.1 av-test.org - The best antivirus software for Windows Home User.html

0.1 KB

2.2 kaspersky compare.html

0.1 KB

2.3 FUD Crypting Service (035 100% FUD) - Video.html

0.1 KB

3. Is Anti-Virus dead - Protection Methods.mp4

38.4 MB

3. Is Anti-Virus dead - Protection Methods.vtt

11.9 KB

3.1 White Paper - Malicious Code Detection Technologies.html

0.1 KB

3.2 httpscybermap.kaspersky.com.html

0.1 KB

3.3 Paper - Malicious Code Detection Technologies.html

0.2 KB

4. Ransomware.mp4

8.9 MB

4. Ransomware.vtt

5.2 KB

4.1 The cost of ransomware attacks $1 billion this year.html

0.1 KB

5. Anti-Virus and End-Point-Protection Testing.mp4

13.5 MB

5. Anti-Virus and End-Point-Protection Testing.vtt

6.4 KB

5.1 bitdefender.html

0.1 KB

5.2 List of AV Testing Labs.html

0.1 KB

5.3 httpwww.av-comparatives.org.html

0.1 KB

6. The Problem With AV and EPP Testing.mp4

7.0 MB

6. The Problem With AV and EPP Testing.vtt

4.2 KB

7. The Best of Business End-Point-Protection (EPP).mp4

9.9 MB

7. The Best of Business End-Point-Protection (EPP).vtt

4.7 KB

7.1 httpwww.kaspersky.co.ukbusiness-securitysmall-to-medium-business.html

0.1 KB

7.2 httpwww.bitdefender.co.ukbusiness.html

0.1 KB

7.3 The best antivirus software for Windows Client Business User.html

0.1 KB

8. Windows - The Best of Anti-Virus and End-Point-Protection.mp4

10.8 MB

8. Windows - The Best of Anti-Virus and End-Point-Protection.vtt

4.6 KB

8.1 httpwindows.microsoft.comen-uswindows-10getstarted-protect-your-pc.html

0.1 KB

8.2 Security Essentials Download.html

0.1 KB

8.3 httpsuk.norton.comnorton-security-with-backup.html

0.1 KB

8.4 httpwww.bitdefender.co.uksolutionsantivirus-comparison.html.html

0.1 KB

8.5 httpwww.kaspersky.co.ukcompare.html

0.1 KB

8.6 Microsoft’s Free Security Tools – Windows Defender Offline.html

0.2 KB

8.7 httpwww.bitdefender.commediahtmlfreeav-upgradeet_cid=EMM_NA_FreeAV_Upsell.html

0.1 KB

9. Business End Point Protection (EPP).mp4

5.4 MB

9. Business End Point Protection (EPP).vtt

2.5 KB

9.1 The best antivirus software for Windows Client Business User.html

0.1 KB

/5. Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)/

1. Goals and Learning Objectives.mp4

5.3 MB

1. Goals and Learning Objectives.vtt

0.7 KB

2. Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP).mp4

11.2 MB

2. Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP).vtt

5.5 KB

2.1 Magic Quadrant for Endpoint Protection Platforms.html

0.1 KB

3. End Point Detection and Response (EDR).mp4

14.5 MB

3. End Point Detection and Response (EDR).vtt

7.2 KB

4. End-Point-Protection How it works together in layers.mp4

13.5 MB

4. End-Point-Protection How it works together in layers.vtt

8.5 KB

/6. End-Point-Protection Technology/

1. Goals and Learning Objectives.mp4

6.1 MB

1. Goals and Learning Objectives.vtt

0.8 KB

10. Windows - Exploitation Prevention - Traps, MBEA and HMPA.mp4

11.8 MB

10. Windows - Exploitation Prevention - Traps, MBEA and HMPA.vtt

83.8 MB

10.1 HitmanPro.Alert - Exploit Test Tool Manual.html

0.1 KB

10.2 Palo Alto Traps.html

0.1 KB

10.3 HitmanPro.Alert.html

0.1 KB

10.4 httpswww.malwarebytes.organtiexploit.html

0.1 KB

10.5 httpforums.sandboxie.comphpBB3viewtopic.phpf=17&t=19132&start=30#p110120.html

0.1 KB

11. Windows 10 - Device Guard.mp4

29.2 MB

11. Windows 10 - Device Guard.vtt

12.3 KB

11.1 Device Guard deployment guide.html

0.1 KB

11.2 IOMMU A Detailed view.html

0.2 KB

11.3 Microsoft future security strategy - black hat talk.html

0.2 KB

11.4 Device Guard and Credential Guard hardware readiness tool.html

0.1 KB

11.5 What's new in Windows 10, versions 1507 and 1511.html

0.1 KB

12. Windows - Defender Application Guard for Microsoft Edge.mp4

9.5 MB

12. Windows - Defender Application Guard for Microsoft Edge.vtt

2.9 KB

12.1 Windows Defender Application Guard for Microsoft Edge.html

0.1 KB

12.2 Introducing Windows Defender Application Guard for Microsoft Edge.html

0.2 KB

13. Linux - Access Control Models.mp4

14.0 MB

13. Linux - Access Control Models.vtt

8.1 KB

14. Linux - Security frameworks - AppArmor.mp4

4.6 MB

14. Linux - Security frameworks - AppArmor.vtt

2.2 KB

14.1 AppArmor How To Use.html

0.1 KB

14.2 AppArmor From Wikipedia.html

0.1 KB

15. Linux - Security frameworks - SElinux.mp4

7.0 MB

15. Linux - Security frameworks - SElinux.vtt

3.4 KB

15.1 Security-Enhanced Linux From Wikipedia.html

0.1 KB

15.2 SELinux Project Wiki.html

0.1 KB

15.3 SELinux on Debian.html

0.1 KB

16. Linux - Security frameworks - Grsecurity.mp4

13.4 MB

16. Linux - Security frameworks - Grsecurity.vtt

1.8 KB

16.1 Debian grsecurity kernel APT repository (unofficial).html

0.1 KB

16.2 grsecurity.net.html

0.1 KB

16.3 GrsecurityConfiguring and Installing grsecurity.html

0.1 KB

16.4 Which is better, grsecurity, AppArmor or SELinux.html

0.1 KB

16.5 Hardening Debian for the Desktop Using Grsecurity.html

0.1 KB

16.6 Which distributions maintain a kernel package with grsecurity support.html

0.2 KB

16.7 Arch Linux kernel and modules with grsecurity.html

0.1 KB

16.8 Linux Kernel Security (SELinux vs AppArmor vs Grsecurity).html

0.1 KB

16.9 httpsalpinelinux.org.html

0.1 KB

17. Linux - Security frameworks - PaX and more.mp4

4.0 MB

17. Linux - Security frameworks - PaX and more.vtt

1.8 KB

17.1 httptomoyo.osdn.jp.html

0.1 KB

17.2 httpspax.grsecurity.net.html

0.1 KB

17.3 Yama is a Linux Security Module.html

0.2 KB

17.4 httpschreuders.orgFBAC-LSM.html

0.1 KB

17.5 httpswww.rsbac.org.html

0.1 KB

18. Linux & Mac - File permissions, POSIX and ACLs.mp4

20.0 MB

18. Linux & Mac - File permissions, POSIX and ACLs.vtt

8.9 KB

19. Mac - Application control - Parental controls.mp4

8.4 MB

19. Mac - Application control - Parental controls.vtt

3.4 KB

19.1 How can I ensure only “whitelisted” applications run on OS X.html

0.2 KB

2. What is application and execution control.mp4

22.0 MB

2. What is application and execution control.vtt

10.6 KB

2.1 the-backdoor-factory.html

0.1 KB

20. Mac - Application control - Gatekeeper.mp4

10.7 MB

20. Mac - Application control - Gatekeeper.vtt

6.6 KB

20.1 Gatekeeper Exposed - Video.html

0.1 KB

20.2 httpsobjective-see.comproductsostiarius.html.html

0.1 KB

20.3 Researchers slip malware onto Apple's App Store, again.html

0.1 KB

20.4 Gatekeeper Exposed.html

0.1 KB

20.5 OS X About Gatekeeper.html

0.1 KB

21. Mac - Application control - System Integrity Protection.mp4

12.6 MB

21. Mac - Application control - System Integrity Protection.vtt

6.4 KB

21.1 httpsdeveloper.apple.comlibrarycontentreleasenotesMacOSXWhatsNewInOSXArticlesMacOSX10_11.html.html

0.2 KB

21.2 About System Integrity Protection on your Mac.html

0.1 KB

21.3 El Capitan's System Integrity Protection will shift utilities' functions.html

0.2 KB

21.4 httpsdeveloper.apple.comvideosplaywwdc2015706 - Video.html

0.1 KB

22. Mac - Application control - Santa.mp4

7.4 MB

22. Mac - Application control - Santa.vtt

4.5 KB

22.1 httpsgithub.comgooglesanta.html

0.1 KB

22.2 How to bypass Google’s Santa LOCKDOWN mode.html

0.1 KB

23. Mac - Application control - Xfence (Previously Little Flocker).mp4

21.4 MB

23. Mac - Application control - Xfence (Previously Little Flocker).vtt

8.1 KB

23.1 httpscampaigns.f-secure.comxfence.html

0.1 KB

24. Mac - Other Stuff!.mp4

3.9 MB

24. Mac - Other Stuff!.vtt

1.7 KB

24.1 httpsobjective-see.comproductsoversight.html.html

0.1 KB

24.2 httpsobjective-see.comproductsransomwhere.html.html

0.1 KB

24.3 FREE TOOL PROTECTS MAC USERS FROM WEBCAM SURVEILLANCE.html

0.1 KB

24.4 httpsobjective-see.comproductsdhs.html.html

0.1 KB

25. The New Normal For End-Point-Protection Technology.mp4

23.5 MB

25. The New Normal For End-Point-Protection Technology.vtt

9.5 KB

25.1 httpbufferzonesecurity.com.html

0.1 KB

25.10 httpsattivonetworks.com.html

0.1 KB

25.2 httpwww.faronics.comen-ukproductsdeep-freezestandard.html

0.1 KB

25.3 httpswww.invincea.com.html

0.1 KB

25.4 httpswww.cylance.com.html

0.1 KB

25.5 httpswww.illusivenetworks.com.html

0.1 KB

25.6 httpscanary.tools.html

0.1 KB

25.7 httpwww.deepinstinct.com.html

0.1 KB

25.8 httpswww.bromium.com.html

0.1 KB

25.9 httpjavelin-networks.com.html

0.1 KB

26. Cylance.mp4

10.0 MB

26. Cylance.vtt

5.8 KB

26.1 httpinnetworktech.comwp-contentuploads201602Magic-Quadrant-for-Endpoint-Protection-Platforms.pdf.html

0.2 KB

3. Windows - Application control - ACLs, Windows Permission Identifier & Accessenum.mp4

17.1 MB

3. Windows - Application control - ACLs, Windows Permission Identifier & Accessenum.vtt

6.8 KB

3.1 Windows Permission Identifier.html

0.1 KB

3.2 AccessEnum.html

0.1 KB

3.3 How to Change File Permissions on Windows 7.html

0.1 KB

4. Windows - Application control - User Account Control (UAC).mp4

16.1 MB

4. Windows - Application control - User Account Control (UAC).vtt

5.0 KB

4.1 User Account Control (UAC).html

0.1 KB

4.2 Windows 7 – How to Configure UAC (User Account Control).html

0.1 KB

4.3 User Account Control From Wikipedia.html

0.1 KB

4.4 How User Account Control works.html

0.2 KB

5. Windows - Application control - Software Restriction Policies.mp4

11.8 MB

5. Windows - Application control - Software Restriction Policies.vtt

4.6 KB

5.1 Use Software Restriction Policies to block viruses and malware.html

0.2 KB

5.2 Application Whitelisting using Software Restriction Policies (version 1.1).html

0.1 KB

5.3 Use a Software Restriction Policy (or Parental Controls) to stop exploit payloads and Trojan Horse programs from running.html

0.1 KB

6. Windows - Application control - AppLocker.mp4

33.7 MB

6. Windows - Application control - AppLocker.vtt

10.8 KB

6.1 AppLocker Step-by-Step Guide.html

0.1 KB

6.10 NoVA Hackers Curt Shaffer & Judah Plummer - Application Whitelisting - Video.html

0.1 KB

6.11 Bypassing Windows AppLocker using a Time of Check Time of Use vulnerability.html

0.2 KB

6.2 Lock down Windows 10 to specific apps.html

24.9 MB

6.3 Guide to Application Whitelisting.html

0.1 KB

6.4 Use AppLocker and Software Restriction Policies in the same domain.html

0.2 KB

6.5 Restrict Access to Programs with AppLocker in Windows 7.html

0.2 KB

6.6 Bypass the Windows AppLocker bouncer with a tweet-size command.html

0.1 KB

6.7 Finding Evil in the Whitelist.html

0.1 KB

6.8 What Is AppLocker.html

0.1 KB

6.9 Bypass Application Whitelisting Script Protections - Regsvr32.exe & COM Scriptlets (.sct files).html

0.1 KB

7. Windows - Application Control - Parental controls.mp4

5.1 MB

7. Windows - Application Control - Parental controls.vtt

2.9 KB

7.1 Test Parental control software for Windows and Mac OS X.html

0.2 KB

7.2 Ensure a Windows PC Never Gets Malware By Whitelisting Applications.html

0.2 KB

8. Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks.mp4

13.6 MB

8. Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks.vtt

7.3 KB

8.1 voodooshield.com.html

0.1 KB

8.2 NoVirusThanks EXE Radar Pro.html

0.1 KB

8.3 Protecting your PC against any malware using Kaspersky Lab’s Trusted Applications technology.html

0.1 KB

8.4 AppGuard® Breach Prevention.html

0.1 KB

8.5 Kaspersky Internet Security 20xx.html

0.1 KB

8.6 httpwww.mcafee.comusproductsapplication-control.aspx.html

0.1 KB

8.7 httpswww.carbonblack.comproducts.html

0.1 KB

8.8 Lumension Application Control.html

0.1 KB

9. Windows - Exploitation Prevention - EMET.mp4

39.2 MB

9. Windows - Exploitation Prevention - EMET.vtt

14.0 KB

9.1 Microsoft - The Enhanced Mitigation Experience Toolkit.html

0.1 KB

9.2 Microsoft - Moving Beyond EMET.html

0.1 KB

9.3 Enhanced Mitigation Experience Toolkit (EMET).html

0.1 KB

9.4 Process Explorer.html

0.1 KB

9.5 ANGLER EXPLOIT KIT EVADING EMET.html

0.1 KB

9.6 Process Explorer.html

0.1 KB

9.7 CVE-2015-2545 ITW EMET Evasion.html

0.1 KB

9.8 EMET Guide To New Features - Video.html

0.1 KB

9.9 Whitepaper on Bypassing ASLRDEP.html

0.1 KB

/7. Threat Detection and Monitoring/

1. Goals and Learning Objectives.mp4

7.5 MB

1. Goals and Learning Objectives.vtt

0.9 KB

10. Host-Based Intrusion Detection - OSSEC.mp4

18.6 MB

10. Host-Based Intrusion Detection - OSSEC.vtt

5.7 KB

10.1 httpsossec.github.io.html

0.1 KB

10.2 httpsossec.github.iodownloads.html.html

0.1 KB

11. Network Analysis - Sguil, Xplico & NetworkMiner.mp4

9.3 MB

11. Network Analysis - Sguil, Xplico & NetworkMiner.vtt

3.5 KB

11.1 httpbammv.github.iosguilindex.html.html

0.1 KB

11.2 Burp proxy.html

0.1 KB

11.3 httpwww.xplico.org.html

0.1 KB

11.4 OWASP Zed Attack Proxy Project.html

0.1 KB

11.5 httpsmitmproxy.org.html

0.1 KB

11.6 httpwww.netresec.compage=NetworkMiner.html

0.1 KB

12. File Integrity Monitoring (FIM) and Checking Part 1.mp4

8.1 MB

12. File Integrity Monitoring (FIM) and Checking Part 1.vtt

3.7 KB

12.1 Windows FIMS.html

0.1 KB

12.2 Afick - httpafick.sourceforge.net.html

0.1 KB

12.3 Samhain - httpwww.la-samhna.desamhain.html

0.1 KB

12.4 Osiris - httpslaunchpad.netosiris.html

0.1 KB

12.5 AIDE (Advanced Intrusion Detection Environment) - httpaide.sourceforge.net -.html

0.1 KB

12.6 ADaudit.html

0.2 KB

12.7 What to include in FIM.html

0.1 KB

12.8 Solar Winds.html

0.1 KB

13. File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe.mp4

6.6 MB

13. File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe.vtt

3.2 KB

13.1 httpscisofy.comlynis.html

0.1 KB

13.2 httpseljefe.immunityinc.com.html

0.1 KB

13.3 Tripwire Open Source vs OSSEC Which Is Right For You.html

0.1 KB

13.4 httpswww.tripwire.com.html

0.1 KB

13.5 httpslinux-audit.com.html

0.1 KB

13.6 httpsgithub.comTripwiretripwire-open-source.html

0.1 KB

13.7 How To Use Tripwire to Detect Server Intrusions on an Ubuntu VPS.html

0.2 KB

14. Network Security Toolkit (NST).mp4

5.0 MB

14. Network Security Toolkit (NST).vtt

2.5 KB

14.1 httpssourceforge.netprojectsnstsource=recommended.html

0.1 KB

14.2 httpnst.sourceforge.netnst.html

0.1 KB

15. Security Onion.mp4

6.1 MB

15. Security Onion.vtt

1.7 KB

15.1 httpssecurityonion.net.html

0.1 KB

16. Security Information and Event Management Software (SIEM).mp4

6.5 MB

16. Security Information and Event Management Software (SIEM).vtt

3.6 KB

16.1 httpswww.alienvault.comproductsossim.html

0.1 KB

2. A Complete Failure to Detect Threats.mp4

12.0 MB

2. A Complete Failure to Detect Threats.vtt

6.4 KB

3. Rethinking Honeypots.mp4

9.3 MB

3. Rethinking Honeypots.vtt

6.0 KB

3.1 honeynet.orgproject.html

0.1 KB

4. CanaryTokens.mp4

73.7 MB

4. CanaryTokens.vtt

22.4 KB

4.1 httpswww.stationx.netcanarytokens.html

0.1 KB

5. OpenCanary.mp4

40.7 MB

5. OpenCanary.vtt

14.4 KB

5.1 httpscanary.tools.html

0.1 KB

5.2 httpsgithub.comthinkstopencanary.html

0.1 KB

5.3 httpdocs.opencanary.orgenlatestindex.html.html

0.1 KB

6. Artillery - Binary Defense.mp4

11.7 MB

6. Artillery - Binary Defense.vtt

4.4 KB

6.1 httpswww.binarydefense.comproject-artillery.html

0.1 KB

6.2 httpsgithub.comBinaryDefenseartillery.html

0.1 KB

7. Honey Drive.mp4

2.7 MB

7. Honey Drive.vtt

1.5 KB

7.1 httpsbruteforce.grhoneydrive.html

0.1 KB

7.2 httpssourceforge.netprojectshoneydrive.html

0.1 KB

8. Intrusion Detection Systems (IDS) Part 1 - Methods.mp4

13.9 MB

8. Intrusion Detection Systems (IDS) Part 1 - Methods.vtt

8.8 KB

9. Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n.mp4

9.7 MB

9. Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n.vtt

5.6 KB

9.1 httpswww.bro.org.html

0.1 KB

9.2 httpswww.snort.org.html

0.1 KB

9.3 httpssuricata-ids.org.html

0.1 KB

9.4 httpopenwips-ng.org.html

0.1 KB

/8. Malware and Hacker Hunting on the End-Point/

1. Goals and Learning Objectives.mp4

7.5 MB

1. Goals and Learning Objectives.vtt

0.9 KB

10. Windows - Malware Seek & Destroy - Autoruns.mp4

50.6 MB

10. Windows - Malware Seek & Destroy - Autoruns.vtt

11.6 KB

10.1 Autorunsc - the command-line version of Autoruns.html

0.1 KB

10.2 Autoruns.html

0.1 KB

10.3 Configure a Script to Run Once When a New User Logs On.html

0.1 KB

11. Windows - Malware Seek & Destroy - Process Monitor.mp4

79.9 MB

11. Windows - Malware Seek & Destroy - Process Monitor.vtt

11.1 KB

11.1 Processmonitor.html

0.1 KB

12. Windows - Malware Seek & Destroy - Network Connections.mp4

25.1 MB

12. Windows - Malware Seek & Destroy - Network Connections.vtt

9.7 KB

12.1 httpwww.unhide-forensics.info.html

0.1 KB

12.2 httpswhois.domaintools.com.html

0.1 KB

13. Malware Seek & Destroy - Networkx.mp4

5.7 MB

13. Malware Seek & Destroy - Networkx.vtt

2.7 KB

13.1 networx.html

0.1 KB

14. Linux - Malware Seek & Destroy - Sysdig.mp4

31.1 MB

14. Linux - Malware Seek & Destroy - Sysdig.vtt

11.3 KB

14.1 httpwww.sysdig.org.html

0.1 KB

14.2 Sysdig User Guide.html

0.1 KB

15. Linux - Seek & Destroy Malware and Hackers - Csysdig.mp4

45.8 MB

15. Linux - Seek & Destroy Malware and Hackers - Csysdig.vtt

12.1 KB

15.1 httpwww.sysdig.org.html

0.1 KB

15.2 httpsgithub.comdraiossysdigwikisysdig-quick-reference-guide#wiki-basic-command-list.html

0.2 KB

15.3 httpwww.sysdig.orgwikisysdig-examples.html

0.1 KB

16. Linux - Seek & Destroy Malware and Hackers - debsums & unhide.mp4

4.9 MB

16. Linux - Seek & Destroy Malware and Hackers - debsums & unhide.vtt

2.1 KB

16.1 httpwww.unhide-forensics.info.html

0.1 KB

17. Linux & Mac OS X - Malware Seek & Destroy - netstat.mp4

16.0 MB

17. Linux & Mac OS X - Malware Seek & Destroy - netstat.vtt

2.3 KB

18. Linux & Mac OS X - Malware Seek & Destroy - lsof.mp4

23.3 MB

18. Linux & Mac OS X - Malware Seek & Destroy - lsof.vtt

8.7 KB

19. Linux - Malware Seek & Destroy - rkhunter.mp4

18.1 MB

19. Linux - Malware Seek & Destroy - rkhunter.vtt

6.9 KB

19.1 httprkhunter.sourceforge.net.html

0.1 KB

19.2 httprkhunter.cvs.sourceforge.netviewvcrkhunterrkhunterfilesFAQ.html

0.1 KB

2. Introduction to Malware and Hacker Hunting.mp4

17.1 MB

2. Introduction to Malware and Hacker Hunting.vtt

10.9 KB

2.1 httpwww.malwareremoval.com.html

0.1 KB

2.2 httpwww.bleepingcomputer.com.html

0.2 KB

20. Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD.mp4

6.5 MB

20. Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD.vtt

2.3 KB

20.1 httpwww.nongnu.orgtiger.html

0.1 KB

20.2 httpwww.clamav.net.html

0.1 KB

20.3 httpswww.rfxn.comprojectslinux-malware-detect.html

0.1 KB

20.4 httpwww.2daygeek.cominstall-linux-malware-detect-lmd-on-ubuntu-centos-debian-fedora-mint-rhel-opensuse.html

0.2 KB

20.5 Report - Linux Security Review.html

0.1 KB

20.6 httpwww.chkrootkit.org.html

0.1 KB

20.7 Linux malware From Wikipedia.html

0.1 KB

21. Linux - Malware Seek & Destroy - Linux - Persistence Part 1.mp4

9.7 MB

21. Linux - Malware Seek & Destroy - Linux - Persistence Part 1.vtt

3.5 KB

22. Linux - Malware Seek & Destroy - Linux - Persistence Part 2.mp4

28.9 MB

22. Linux - Malware Seek & Destroy - Linux - Persistence Part 2.vtt

9.8 KB

22.1 httpsfedoraproject.orgwikiSysVinit_to_Systemd_Cheatsheet.html

0.1 KB

22.2 httpswww.debian.orgdocmanualsdebian-referencech03.en.html.html

0.1 KB

23. Linux - Malware Seek & Destroy - Linux - Persistence Part 3.mp4

5.5 MB

23. Linux - Malware Seek & Destroy - Linux - Persistence Part 3.vtt

3.0 KB

23.1 httpswww.debian.orgdocmanualsdebian-referencech03.en.html.html

0.1 KB

24. Mac - Malware Seek & Destroy - Task Explorer.mp4

15.8 MB

24. Mac - Malware Seek & Destroy - Task Explorer.vtt

6.0 KB

24.1 httpsobjective-see.comproductstaskexplorer.html.html

0.1 KB

25. Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer.mp4

21.5 MB

25. Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer.vtt

8.7 KB

25.1 httpsobjective-see.comproductsblockblock.html.html

0.1 KB

25.2 httpsobjective-see.comproductskextviewr.html.html

0.1 KB

25.3 httpsobjective-see.comproductsknockknock.html.html

0.1 KB

26. Mac, Linux & Windows - OSquery.mp4

44.3 MB

26. Mac, Linux & Windows - OSquery.vtt

17.5 KB

26.1 httpsgithub.comfacebookosquery.html

0.1 KB

26.2 httpsosquery.io.html

0.1 KB

26.3 httpsgithub.comfacebookosqueryblobmastertoolsdeploymentosquery.example.conf.html

0.1 KB

26.4 httpsosquery.readthedocs.ioenstabledeploymentyara.html

0.1 KB

26.5 httpsosquery.readthedocs.ioenstabledeploymentfile-integrity-monitoring.html

0.1 KB

26.6 httpsosquery.readthedocs.ioenstable.html

0.1 KB

26.7 httpsgithub.comgooglegrr.html

0.1 KB

26.8 httpsgithub.comherokuwindmill.html

0.1 KB

26.9 httpsvirustotal.github.ioyara.html

0.1 KB

27. Firmware Rootkits – Seek and Destroy Part 1.mp4

16.7 MB

27. Firmware Rootkits – Seek and Destroy Part 1.vtt

8.8 KB

27.1 Summary of Attacks Against BIOS and Secure Boot and related CHIPSEC modules at DEFCON 22.html

0.1 KB

27.2 httpblog.trendmicro.comtrendlabs-security-intelligencehacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems.html

0.2 KB

27.3 Powerful backdoorrootkit found preinstalled on 3 million Android phones.html

0.2 KB

27.4 httpsnsa.gov1.infodninsa-ant-catalogfirewalls.html

0.1 KB

27.5 httpswww.theguardian.comtechnology2016feb09internet-of-things-smart-home-devices-government-surveillance-james-clapper.html

0.2 KB

27.6 httpsen.wikipedia.orgwikiOpen-source_hardware.html

0.1 KB

27.7 httpwww.kaspersky.comaboutnewsvirus2015Equation-Group-The-Crown-Creator-of-Cyber-Espionage.html

0.2 KB

27.8 hacker presentation on Hacking the Extensible Firmware Interface.html

0.2 KB

28. Firmware Rootkits – Seek and Destroy Part 2.mp4

9.3 MB

28. Firmware Rootkits – Seek and Destroy Part 2.vtt

4.6 KB

28.1 httpswww.virustotal.com.html

0.1 KB

28.10 Putting the spotlight on firmware malware.html

0.1 KB

28.2 httpspypi.python.orgpypiuefi_firmware.html

0.1 KB

28.3 Virustotal output example.html

0.2 KB

28.4 darwindumper.html

0.1 KB

28.5 httpsgithub.comchipsecchipsecblobmasterchipsec-manual.pdf.html

0.1 KB

28.6 httpsflashrom.orgFlashrom.html

0.1 KB

28.7 US-13-Butterworth-BIOS-Security-Code.zip.html

0.1 KB

28.8 UEFI Innovations for Platform Security.html

0.1 KB

28.9 httpsgithub.comchipsecchipsec.html

0.1 KB

29. End-Point-Protection Recovery and Remediation Technology.mp4

11.0 MB

29. End-Point-Protection Recovery and Remediation Technology.vtt

3.4 KB

29.1 httphorizondatasys.com.html

0.1 KB

29.2 httpsbombich.com - Carboncopy.html

0.1 KB

29.3 httpclonezilla.org.html

0.1 KB

29.4 Acronis True Image.html

0.1 KB

29.5 httpwww.macrium.comreflectfree.aspx.html

0.1 KB

29.6 httpwww.runtime.orgdriveimage-xml.htm.html

0.1 KB

29.7 terabyteunlimited - Image for Windows & Linux.html

0.1 KB

3. Windows - Farbar Recovery Scanner.mp4

39.9 MB

3. Windows - Farbar Recovery Scanner.vtt

11.4 KB

3.1 farbar recovery scan tool.html

0.1 KB

3.2 httpwww.geekstogo.comforumtopic335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool.html

0.2 KB

30. Encrypted Backup and Cloud Storage.mp4

14.8 MB

30. Encrypted Backup and Cloud Storage.vtt

7.1 KB

30.1 httpwww.drobostore.com.html

0.1 KB

30.10 httpspydio.com.html

0.1 KB

30.11 httpswww.qnap.comen.html

0.1 KB

30.12 httpssyncthing.net.html

0.1 KB

30.13 How To Set Up a Tahoe-LAFS Distributed Filesystem on Ubuntu 14.04 Servers.html

0.1 KB

30.14 httpswww.syncany.org.html

0.1 KB

30.15 httpswww.sparkleshare.org.html

0.1 KB

30.16 httpswww.boxcryptor.comen.html

0.1 KB

30.2 How To Install and Configure Seafile on an Ubuntu 12.04 VPS.html

0.2 KB

30.3 httpsowncloud.orgproviders.html

0.1 KB

30.4 httpswww.tahoe-lafs.orgtractahoe-lafs.html

0.1 KB

30.5 httpswww.turnkeylinux.orgowncloud.html

0.1 KB

30.6 httpsleastauthority.comproduct_s4.html

0.1 KB

30.7 How To Use the ownCloud One-Click Install Application.html

0.2 KB

30.8 httpswww.seafile.comenhome.html

0.1 KB

30.9 How To Host a File Sharing Server with Pydio on Ubuntu 14.04.html

0.2 KB

4. Automated Malware Removal Tools.mp4

41.9 MB

4. Automated Malware Removal Tools.vtt

13.3 KB

4.1 Kaspersky.html

0.1 KB

4.10 Roguekiller.html

0.1 KB

4.11 HitmanPro.html

0.1 KB

4.2 superantispyware.html

0.1 KB

4.3 Malwarebytes.html

0.1 KB

4.4 httpswww.microsoft.comen-ussecuritypc-securitymalware-removal.aspx.html

0.1 KB

4.5 httpwww.bleepingcomputer.comdownloadrkill.html

0.1 KB

4.6 httpwww.bleepingcomputer.comdownloadwindowsanti-rootkit.html

0.1 KB

4.7 httpschocolatey.org.html

0.1 KB

4.8 httpbrew.sh.html

0.1 KB

4.9 AdwCleaner.html

0.1 KB

5. Live Rescue Operating Systems, CDs, and USBs.mp4

19.2 MB

5. Live Rescue Operating Systems, CDs, and USBs.vtt

8.2 KB

5.1 httpwindowsmatters.com20150110gandalfs-windows-7-pe-x86.html

0.1 KB

5.10 httpsrufus.akeo.ie.html

0.1 KB

5.11 Hitman pro kickstart.html

0.1 KB

5.12 httpwww.pendrivelinux.comuniversal-usb-installer-easy-as-1-2-3.html

0.1 KB

5.13 httpsunetbootin.github.io.html

0.1 KB

5.14 httpsremnux.org.html

0.1 KB

5.15 httpsfalconfour.wordpress.comtagf4ubcd.html

0.1 KB

5.16 httpwww.system-rescue-cd.orgDownload.html

0.1 KB

5.2 httpwww.technorms.com8098create-windows-7-live-cd.html

0.1 KB

5.3 Ironkey w700.html

0.1 KB

5.4 httpsdigital-forensics.sans.orgcommunitydownloads.html

0.1 KB

5.5 Kaspersky Rescue Disk 10.html

0.1 KB

5.6 httpgetintopc.comsoftwaresoperating-systemswindows-7-live-cd-free-download.html

0.1 KB

5.7 httptrinityhome.orgHomeindex.phpcontent=TRINITY_RESCUE_KIT_DOWNLOAD.html

0.1 KB

5.8 httpwww.hirensbootcd.orgdownload.html

0.1 KB

5.9 httpsen.wikipedia.orgwikiWindows_To_Go.html

0.1 KB

6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.mp4

60.6 MB

6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.vtt

3.4 KB

6.1 httpstechnet.microsoft.comen-ussysinternalsprocessexplorer.html

0.1 KB

6.2 httpstechnet.microsoft.comen-ussysinternals.html

0.1 KB

7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.mp4

49.0 MB

7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.vtt

10.6 KB

7.1 httpswhois.domaintools.com.html

0.1 KB

7.2 httpstechnet.microsoft.comen-ussysinternalsprocessexplorer.html

0.1 KB

8. Windows - Malware Seek & Destroy - Process Tools.mp4

9.2 MB

8. Windows - Malware Seek & Destroy - Process Tools.vtt

2.2 KB

8.1 httpprocesshacker.sourceforge.net.html

0.1 KB

8.2 httpwww.nirsoft.netutilsuserassist_view.html.html

0.1 KB

8.3 httpsgithub.commandiantShimCacheParser.html

0.1 KB

9. Windows - Malware Seek & Destroy - Sigcheck.mp4

4.8 MB

9. Windows - Malware Seek & Destroy - Sigcheck.vtt

2.9 KB

9.1 Sigcheck.html

0.1 KB

/9. Operating System and Application Hardening/

1. Goals and Learning Objectives.mp4

7.5 MB

1. Goals and Learning Objectives.vtt

0.9 KB

10. Security Focused Operating Systems.mp4

10.3 MB

10. Security Focused Operating Systems.vtt

5.8 KB

10.1 Tails - For security, privacy and anonymity. Protection from local forensics..html

0.1 KB

10.10 Astra Linux - Russian Linux-based secure operating system.html

0.1 KB

10.11 Debian - Good general use OS with a security focus..html

0.1 KB

10.12 Security-focused operating system From Wikipedia (Most are dead).html

0.1 KB

10.13 OpenBSD - Good general use OS with a security focus..html

0.1 KB

10.14 Mempo - Looks interesting but nothing happening.html

0.1 KB

10.2 Parrot Security OS - Security GNULinux distribution designed with cloud pentesting and IoT security in mind..html

0.1 KB

10.3 Trisquel OS.html

0.1 KB

10.4 Qubes OS - Security through isolation and compartmentalization implemented using virtualization.html

0.1 KB

10.5 Subgraph OS - Security, privacy and anonymity..html

0.1 KB

10.6 Arch Linux - Good general use OS with a security focus..html

0.1 KB

10.7 Whonix workstation and gateway. A focus on anonymity and preventing leaks out of the Tor network..html

0.1 KB

10.8 Whonix OS + Qubes OS - security through isolation and compartmentalization. Privacy and anonymity..html

0.1 KB

10.9 Hardened Gentoo Linux - With grsecurity and PaX.html

0.1 KB

11. Monitoring for Security Drift.mp4

2.7 MB

11. Monitoring for Security Drift.vtt

1.4 KB

2. An Introduction to Hardening.mp4

9.3 MB

2. An Introduction to Hardening.vtt

6.5 KB

3. Hardening Standards.mp4

43.5 MB

3. Hardening Standards.vtt

11.0 KB

3.1 httpsbenchmarks.cisecurity.orgdownloadsmultiform.html

0.1 KB

3.2 The United States Government Configuration Baseline (USGCB).html

0.1 KB

3.3 httpsbenchmarks.cisecurity.orgmembershipacademic-institutions.html

0.1 KB

3.4 httpsbenchmarks.cisecurity.orgdownloadsaudit-toolsdocumentsCIS-CATUsersGuide_000.pdf.html

0.2 KB

3.5 STIG viewer.html

0.1 KB

3.6 Defence Information Systems Agency - STIGs - Security Template Implementation guide..html

0.1 KB

3.7 CIS Benchmarks. - (Center For Internet Security).html

0.1 KB

4. OpenSCAP.mp4

32.8 MB

4. OpenSCAP.vtt

14.0 KB

4.1 httpswww.debian.orgsecurityoval.html

0.1 KB

4.10 httpsoval.cisecurity.orgrepositorydownload.html

0.1 KB

4.2 httpswww.open-scap.org.html

0.1 KB

4.3 httpswww.open-scap.orgdownload.html

0.1 KB

4.4 httpcsrc.nist.govpublicationsPubsSPs.html.html

0.1 KB

4.5 httpsscap.nist.gov.html

0.1 KB

4.6 httpswww.open-scap.orgresourcesdocumentationcustomizing-scap-security-guide-for-your-use-case.html

0.2 KB

4.7 httpswww.open-scap.orgfeaturesvulnerability-assessment.html

0.1 KB

4.8 httpswww.open-scap.orgfeaturessecurity-compliance.html

0.1 KB

4.9 httpsstatic.open-scap.orgopenscap-1.2oscap_user_manual.html#_how_to_evaluate_disa_stig.html

0.2 KB

5. Baseline Auditing.mp4

13.0 MB

5. Baseline Auditing.vtt

4.0 KB

5.1 httpwww.openvas.orgabout.html.html

0.1 KB

5.2 httpslinux-audit.com.html

0.1 KB

5.3 httpscisofy.comlynis.html

0.1 KB

5.4 httpswww.tenable.comproductsnessusnessus-professionalevaluate.html

0.1 KB

5.5 httpswww.qualys.comformsfreescan.html

0.1 KB

5.6 httpswww.tenable.comproductsnessus-home.html

0.1 KB

6. Windows - Hardening.mp4

9.8 MB

6. Windows - Hardening.vtt

2.1 KB

6.1 hardenwindows8forsecurity.com.html

0.1 KB

6.2 hardenwindows7forsecurity.com.html

0.1 KB

6.3 CIS Benchmarks. - (Center For Internet Security).html

0.1 KB

6.4 Defence Information Systems Agency - STIGs - Security Template Implementation guide..html

0.1 KB

6.5 hardenwindows10forsecurity.com.html

0.1 KB

6.6 The United States Government Configuration Baseline (USGCB).html

0.1 KB

7. Windows - Security Compliance Manager (SCM).mp4

47.1 MB

7. Windows - Security Compliance Manager (SCM).vtt

12.4 KB

7.1 Microsoft Baseline Security Analyzer MBSA for windows.html

0.1 KB

7.2 Microsoft Security Compliance Manager.html

0.1 KB

7.3 LGPO.exe – Local Group Policy Object Utility.html

0.2 KB

7.4 httpsblogs.technet.microsoft.comsecguide.html

0.1 KB

7.5 Attack surface analyiser.html

0.2 KB

7.6 Attack surface analyiser.html

0.1 KB

7.7 Policy Analyzer.html

0.1 KB

8. Mac – Hardening.mp4

3.7 MB

8. Mac – Hardening.vtt

2.0 KB

8.1 httpsobjective-see.comproductslockdown.html.html

0.1 KB

8.2 Defence Information Systems Agency - STIGs - Security Template Implementation guide for Mac.html

0.1 KB

8.3 httpdocs.hardentheworld.orgOSindex.html.html

0.1 KB

8.4 httpwww.apple.comsupportsecurityguides.html

0.1 KB

8.5 CIS Benchmarks for Mac.html

0.2 KB

8.6 httpsobjective-see.comproductslockdown.html.html

0.1 KB

9. Linux – Hardening.mp4

9.5 MB

9. Linux – Hardening.vtt

4.3 KB

9.1 Defence Information Systems Agency - STIGs - Security Template Implementation guide..html

0.1 KB

9.10 CIS Benchmarks. - (Center For Internet Security).html

0.1 KB

9.2 httpsen.wikipedia.orgwikiAppArmor.html

0.1 KB

9.3 httpskernsec.orgwikiindex.phpKernel_Self_Protection_Project.html

0.1 KB

9.4 httpsgrsecurity.netfeatures.php.html

0.1 KB

9.5 httpselinuxproject.orgpageMain_Page.html

0.1 KB

9.6 Compare Security Frameworks.html

0.1 KB

9.7 httpswww.debian.orgdocmanualssecuring-debian-howto.html

0.1 KB

9.8 The United States Government Configuration Baseline (USGCB).html

0.1 KB

9.9 httpswww.open-scap.orgsecurity-policiesscap-security-guide.html

0.1 KB

/

[FreeCourseLab.com].url

0.1 KB

 

Total files 1023


Copyright © 2024 FileMood.com