/1. Introduction/
|
1. Welcome to Volume 4.mp4
|
7.5 MB
|
1. Welcome to Volume 4.vtt
|
0.9 KB
|
2. Introduction to the Instructor!.mp4
|
18.0 MB
|
2. Introduction to the Instructor!.vtt
|
1.9 KB
|
2.1 Nathan's Security Blog.html
|
0.1 KB
|
2.2 Nathan's Twitter.html
|
0.1 KB
|
3. Security Quick Win!.mp4
|
46.8 MB
|
3. Security Quick Win!.vtt
|
21.3 KB
|
4. Target Audience.mp4
|
7.7 MB
|
4. Target Audience.vtt
|
2.5 KB
|
5. Study Recommendations.mp4
|
29.3 MB
|
5. Study Recommendations.vtt
|
5.5 KB
|
6. Course updates.mp4
|
2.7 MB
|
6. Course updates.vtt
|
0.8 KB
|
/10. Secure Deleting, Evidence Elimination and Anti-Forensics/
|
1. Goals and Learning Objectives.mp4
|
6.8 MB
|
1. Goals and Learning Objectives.vtt
|
0.8 KB
|
10. Scrubbing EXIF & Metadata Part 2 - Tools.mp4
|
21.4 MB
|
10. Scrubbing EXIF & Metadata Part 2 - Tools.vtt
|
6.2 KB
|
10.1 Hidden Data Detector™.html
|
0.1 KB
|
10.10 httpswww.toolsrepo.comprivacyremove-exif-from-image-files.html
|
0.1 KB
|
10.11 BatchPurifier™.html
|
0.1 KB
|
10.12 httpwww.verexif.comen.html
|
0.1 KB
|
10.2 ExifTool can Read, Write andor Create files in the following formats.html
|
0.1 KB
|
10.3 Doc Scrubber Analyze and scrub hidden and potentially embarrassing data in Word documents..html
|
0.1 KB
|
10.4 Exiv2 is a C++ library and a command line utility to manage image metadata..html
|
0.1 KB
|
10.5 MAT Metadata Anonymisation Toolkit.html
|
0.1 KB
|
10.6 ImageOptim.html
|
0.1 KB
|
10.7 ExifTool by Phil Harvey.html
|
0.1 KB
|
10.8 JPEG & PNG Strippe.html
|
0.1 KB
|
10.9 pdfparanoia.html
|
0.1 KB
|
11. Scrubbing EXIF & Metadata Part 3 - Guidance.mp4
|
8.8 MB
|
11. Scrubbing EXIF & Metadata Part 3 - Guidance.vtt
|
5.4 KB
|
11.1 How To Turn off Geotagging in Android.html
|
0.1 KB
|
11.2 How to turn off geotagging for photos iphone ipad.html
|
0.1 KB
|
11.3 ImageMagick®.html
|
0.1 KB
|
11.4 How to Remove The Hidden Personal Information Microsoft Office Adds to Your Documents.html
|
0.2 KB
|
11.5 The views of Iraq you weren’t supposed to see.html
|
0.1 KB
|
12. Sensor Noise Camera Identification.mp4
|
9.5 MB
|
12. Sensor Noise Camera Identification.vtt
|
5.0 KB
|
12.1 Associating cameras with users and objects in a social networking system US 20150124107 A1.html
|
0.1 KB
|
12.2 httpwww.cyanogenmod.org.html
|
0.1 KB
|
12.3 ObscuraCam Secure Smart Camera.html
|
0.1 KB
|
12.4 Camera Fingerprint - Matlab implementation.html
|
0.1 KB
|
12.5 Paper - Sensor Noise Camera Identification Countering Counter-Forensics.html
|
0.1 KB
|
2. Secure File Deletion - Mechanical drives.mp4
|
20.7 MB
|
2. Secure File Deletion - Mechanical drives.vtt
|
9.1 KB
|
2.1 httpwww.filehippo.comdownload_recuva.html
|
0.1 KB
|
2.2 httpwww.fileshredder.org.html
|
0.1 KB
|
2.3 httperaser.heidi.ie.html
|
0.1 KB
|
2.4 OS X Yosemite Securely erasing your deleted files.html
|
0.1 KB
|
3. Secure File Deletion - Solid Sate Drives.mp4
|
12.7 MB
|
3. Secure File Deletion - Solid Sate Drives.vtt
|
7.2 KB
|
3.1 EXTRA BITS - Data Security and Flash Memory.html
|
0.1 KB
|
3.2 Security of Data on Disk - Video.html
|
0.1 KB
|
3.3 Recovering Evidence from SSD Drives in 2014 Understanding TRIM, Garbage Collection and Exclusions.html
|
0.2 KB
|
3.4 SSD and eMMC Forensics 2016.html
|
0.1 KB
|
3.5 Paper - Reliably Erasing Data From Flash-Based Solid State Drives.html
|
0.1 KB
|
4. Evidence Elimination & Anti-Forensics - An Introduction.mp4
|
8.7 MB
|
4. Evidence Elimination & Anti-Forensics - An Introduction.vtt
|
5.7 KB
|
5. Evidence Elimination - CCleaner and Bleachit.mp4
|
19.2 MB
|
5. Evidence Elimination - CCleaner and Bleachit.vtt
|
8.1 KB
|
5.1 httpbleachbit.sourceforge.net.html
|
0.1 KB
|
5.2 httpswww.piriform.comccleaner.html
|
0.1 KB
|
5.3 httpwww.winapp2.com.html
|
0.1 KB
|
5.4 httpbleachbit.sourceforge.netdocumentationwinapp2_ini.html
|
0.1 KB
|
6. Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer.mp4
|
14.9 MB
|
6. Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer.vtt
|
6.8 KB
|
6.1 Mac - How to disable virtual memory swap files.html
|
0.1 KB
|
6.2 Windows - Disbale Memory Dump Files.html
|
0.1 KB
|
6.3 Linux - How to Clear RAM Memory Cache, Buffer and Swap Space.html
|
0.1 KB
|
6.4 Force Windows 7 to Clear Virtual Memory Pagefile at Shutdown.html
|
0.2 KB
|
6.5 Paging File Info.html
|
0.1 KB
|
6.6 Mac - Instruction to disable swap here.html
|
0.1 KB
|
6.7 How to disable virtual memory in Windows 7.html
|
0.1 KB
|
6.8 How to disable and re-enable hibernation on a computer that is running Windows.html
|
0.1 KB
|
7. Disk Wiping - Mechanical Drives.mp4
|
12.0 MB
|
7. Disk Wiping - Mechanical Drives.vtt
|
4.4 KB
|
7.1 httperaser.heidi.ie.html
|
0.1 KB
|
7.10 Drive eRazer Ultra Multi-function device that completely erases all data from a hard drive.html
|
0.1 KB
|
7.11 httpwww.dban.org.html
|
0.1 KB
|
7.2 OS X Yosemite Securely erasing your deleted files.html
|
0.1 KB
|
7.3 httpswww.piriform.comccleaner.html
|
0.1 KB
|
7.4 HARD DRIVE DEGAUSSER.html
|
0.1 KB
|
7.5 How To Securely Wipe Your Hard Drive with DBAN – Erase Your Data for Good.html
|
0.2 KB
|
7.6 httpwww.fileshredder.org.html
|
0.1 KB
|
7.7 How To Wipe a Hard Drive.html
|
0.1 KB
|
7.8 httppartedmagic.com.html
|
0.1 KB
|
7.9 httpswww.bleachbit.org.html
|
0.1 KB
|
8. Disk Wiping - Solid State Drives (SSD).mp4
|
24.2 MB
|
8. Disk Wiping - Solid State Drives (SSD).vtt
|
12.1 KB
|
8.1 Securely Erasing Your SSD with Linux A How-To.html
|
0.1 KB
|
8.10 httpgparted.sourceforge.net.html
|
0.1 KB
|
8.11 Paper - Reliably Erasing Data From Flash-Based Solid State Drives.html
|
0.1 KB
|
8.12 NIST Special Publication 800-88 - Guidelines for Media Sanitization.html
|
0.1 KB
|
8.13 What is Crypto Erase.html
|
0.1 KB
|
8.14 How to Secure Erase your Solid State Drive (SSD) with Parted Magic.html
|
0.1 KB
|
8.2 Commonly Asked Questions and Answers on Self-encrypting Drives.html
|
0.2 KB
|
8.3 Thermaltake BlacX Hot-Swap SATA External Hard Drive Docking Station for Windows & Mac Os Compatible.html
|
0.1 KB
|
8.4 httpsen.wikipedia.orgwikiParallel_ATA#HDD_passwords_and_security.html
|
0.1 KB
|
8.5 httpsen.wikipedia.orgwikiHdparm.html
|
0.1 KB
|
8.6 Ten Reasons to Buy Self-Encrypting Drives.html
|
0.1 KB
|
8.7 SanDisk Crypto Erase Tool support information.html
|
0.2 KB
|
8.8 httppartedmagic.com.html
|
0.1 KB
|
8.9 Drive Erase Utility for the Resetting the Cryptographic Key and the Erasing the Solid State Drive - ThinkPad.html
|
0.1 KB
|
9. Scrubbing EXIF & Metadata Part 1 - Introduction.mp4
|
17.0 MB
|
9. Scrubbing EXIF & Metadata Part 1 - Introduction.vtt
|
8.1 KB
|
9.1 httpsloc.alize.us.html
|
0.1 KB
|
9.2 Geotagging poses security risks.html
|
0.1 KB
|
9.3 Metadata ruins Google's anonymous eBay Australia protest.html
|
0.1 KB
|
9.4 BatchPurifier™ 7.2.html
|
0.1 KB
|
9.5 The views of Iraq you weren’t supposed to see.html
|
0.1 KB
|
9.6 The 13 Most Embarrassing Web Moments.html
|
0.1 KB
|
9.7 Busted! FBI led to Anonymous hacker after he posts picture of girlfriend's breasts online.html
|
0.2 KB
|
/11. Email Security, Privacy and Anonymity/
|
1. Goals and Learning Objectives.mp4
|
10.0 MB
|
1. Goals and Learning Objectives.vtt
|
1.1 KB
|
10. Improving OpenPGP Security - Primary and Subkeys - Part 2.mp4
|
30.1 MB
|
10. Improving OpenPGP Security - Primary and Subkeys - Part 2.vtt
|
10.8 KB
|
10.1 CREATING THE PERFECT GPG KEYPAIR.html
|
0.1 KB
|
10.2 httpsgpgtools.org.html
|
0.1 KB
|
10.3 Using OpenPGP subkeys in Debian development.html
|
0.1 KB
|
10.4 Improve the Security of Your OpenPGP Key by Using Subkeys.html
|
0.1 KB
|
10.5 Anatomy of a GPG Key.html
|
0.1 KB
|
11. Improving OpenPGP Security - SmartcardsYubikey - Part 3.mp4
|
23.2 MB
|
11. Improving OpenPGP Security - SmartcardsYubikey - Part 3.vtt
|
8.6 KB
|
11.1 httpshop.kernelconcepts.de.html
|
0.1 KB
|
11.2 httpsdevelopers.yubico.comyubikey-neo-managerReleases.html
|
0.1 KB
|
11.3 YUBIKEY NEO AND OPENPGP.html
|
0.1 KB
|
11.4 Smartcard The OpenPGP card.html
|
0.1 KB
|
11.5 Using GPG with Smart Cards.html
|
0.1 KB
|
12. Email Tracking & Exploits.mp4
|
28.1 MB
|
12. Email Tracking & Exploits.vtt
|
11.2 KB
|
12.1 Fight Spam and Protect Your Privacy by Disabling Remote Content in Apple Mail.html
|
0.1 KB
|
12.2 Email Privacy Tester.html
|
0.1 KB
|
12.3 #BadWinmail Demo.html
|
0.1 KB
|
12.4 Thunderbird - Remote Content in Messages.html
|
0.1 KB
|
12.5 #BadWinmail The Enterprise Killer Attack Vector in Microsoft Outlook.html
|
0.1 KB
|
13. Email Anonymity & Pseudonymity.mp4
|
16.7 MB
|
13. Email Anonymity & Pseudonymity.vtt
|
6.7 KB
|
13.1 httpsmailinator.com.html
|
0.1 KB
|
13.10 Send Anonymous Emails 20 Sites To Keep Your Identity Hidden.html
|
0.1 KB
|
13.11 httpwww.migmail.net.html
|
0.1 KB
|
13.2 httpswww.trash-mail.comen.html
|
0.1 KB
|
13.3 httpdontmail.net.html
|
0.1 KB
|
13.4 httpwww.tempinbox.com.html
|
0.1 KB
|
13.5 httpsanonbox.net.html
|
0.1 KB
|
13.6 httpwww.dispostable.com.html
|
0.1 KB
|
13.7 httpgetairmail.com.html
|
0.1 KB
|
13.8 httpwww.mytrashmail.com.html
|
0.1 KB
|
13.9 httpswww.guerrillamail.com.html
|
0.1 KB
|
14. TorBirdy.mp4
|
22.6 MB
|
14. TorBirdy.vtt
|
7.5 KB
|
14.1 httpsaddons.mozilla.orgen-usthunderbirdaddontorbirdy.html
|
0.1 KB
|
14.2 httpstrac.torproject.orgprojectstorwikitorbirdy.html
|
0.1 KB
|
15. Remailers.mp4
|
20.5 MB
|
15. Remailers.vtt
|
7.7 KB
|
15.1 httpmixmaster.sourceforge.net.html
|
0.1 KB
|
15.10 httpis-not-my.name.html
|
0.1 KB
|
15.11 httpslabs.riseup.netcodeissues8225.html
|
0.1 KB
|
15.12 httpsgithub.comcryptodotismixgui.html
|
0.1 KB
|
15.13 httpswww.whonix.orgwikiNymservers.html
|
0.1 KB
|
15.14 httpswww.whonix.orgwikiMixmaster.html
|
0.1 KB
|
15.15 httpspackages.debian.orgstablemailmixmaster.html
|
0.1 KB
|
15.2 httpremailer.paranoici.org.html
|
0.1 KB
|
15.3 httpswww.quicksilvermail.net.html
|
0.1 KB
|
15.4 Yardbird's Effective Usenet Tradecraft DEC 1ST, 2013 Survival in an Extremely Adversarial Environment.html
|
0.1 KB
|
15.5 httpsdizum.comremailer.html.html
|
0.1 KB
|
15.6 httpmixminion.net.html
|
0.1 KB
|
15.7 httpsgroups.google.comforum#!forumalt.anonymous.messages.html
|
0.1 KB
|
15.8 DEF CON 21 - Tom Ritter - De Anonymizing Alt Anonymous Messages.html
|
0.1 KB
|
15.9 de-anonymizing alt.anonymous.messages.html
|
0.1 KB
|
16. Choosing an Email Provider.mp4
|
39.2 MB
|
16. Choosing an Email Provider.vtt
|
15.4 KB
|
16.1 httpswww.openmailbox.org.html
|
0.1 KB
|
16.10 httpsruggedinbox.com.html
|
0.1 KB
|
16.11 httpswww.tutanota.com.html
|
0.1 KB
|
16.12 httpscountermail.com.html
|
0.1 KB
|
16.13 httpsneomailbox.net.html
|
0.1 KB
|
16.14 httpsen.wikipedia.orgwikiComparison_of_webmail_providers.html
|
0.1 KB
|
16.15 httpskolabnow.com.html
|
0.1 KB
|
16.16 httpsmailinabox.email.html
|
0.1 KB
|
16.17 Email Privacy Tester.html
|
0.1 KB
|
16.18 httpsmailbox.orgen.html
|
0.1 KB
|
16.19 httpswww.cryptoheaven.com.html
|
0.1 KB
|
16.2 CHOOSING PRIVATE & SECURE EMAIL WHAT TO LOOK FOR.html
|
0.1 KB
|
16.20 httpswww.reddit.comrprivacycomments1k2aqoin_the_wake_of_the_lavabit_shutdown_were_looking.html
|
0.2 KB
|
16.21 httpsruggedinbox.com.html
|
0.1 KB
|
16.3 httpswww.startmail.com.html
|
0.1 KB
|
16.4 httpsposteo.deen.html
|
0.1 KB
|
16.5 httpswww.google.comlanding2step.html
|
0.1 KB
|
16.6 httpswww.eff.orgissuesmandatory-data-retention.html
|
0.1 KB
|
16.7 Google gives Gmail a major security boost in bid to stop spy snooping.html
|
0.2 KB
|
16.8 httpssecure.runbox.com.html
|
0.1 KB
|
16.9 httpwww.prxbx.comemail - Privacy-Conscious Email Services.html
|
0.1 KB
|
17. Email Alternatives.mp4
|
7.8 MB
|
17. Email Alternatives.vtt
|
3.4 KB
|
17.1 httpsthetinhat.comtutorialsmessagingi2p-bote-thunderbird.html.html
|
0.1 KB
|
17.2 httpswww.confidantmail.org.html
|
0.1 KB
|
17.3 httpspond.imperialviolet.org.html
|
0.1 KB
|
17.4 httpsbitmessage.orgwikiMain_Page.html
|
0.1 KB
|
17.5 httpretroshare.sourceforge.net.html
|
0.1 KB
|
17.6 httpsbitmessage.orgbitmessage.pdf.html
|
0.1 KB
|
17.7 httpsen.wikipedia.orgwikiI2P.html
|
0.1 KB
|
2. Clients, Protocols and Authentication.mp4
|
40.0 MB
|
2. Clients, Protocols and Authentication.vtt
|
13.7 KB
|
2.1 Is STARTTLS more safe than TLSSSL.html
|
0.1 KB
|
2.2 httpswww.checktls.com.html
|
0.1 KB
|
3. Email Weaknesses.mp4
|
32.3 MB
|
3. Email Weaknesses.vtt
|
14.1 KB
|
3.1 The Current State of SMTP STARTTLS Deployment.html
|
0.2 KB
|
3.2 httpswww.parsemail.org.html
|
0.1 KB
|
3.3 Google - Email encryption in transit.html
|
0.1 KB
|
3.4 Free online fake mailer with attachments, encryption, HTML editor and advanced settings.html
|
0.1 KB
|
4. PGP, GPG & Privacy.mp4
|
13.6 MB
|
4. PGP, GPG & Privacy.vtt
|
6.1 KB
|
4.1 The GNU Privacy Guard.html
|
0.1 KB
|
4.2 Symantec Desktop Email Encryption.html
|
0.2 KB
|
4.3 rfc4880.txt OpenPGP Message Format.html
|
0.1 KB
|
4.4 An Introduction to Cryptography.html
|
0.1 KB
|
5. PGP & GPG Clients.mp4
|
15.8 MB
|
5. PGP & GPG Clients.vtt
|
7.1 KB
|
5.1 How to Use PGP for Linux.html
|
0.1 KB
|
5.10 gpg4usb project.html
|
0.1 KB
|
5.11 GPG Suite.html
|
0.1 KB
|
5.12 Android - OpenKeychain Easy PGP.html
|
0.1 KB
|
5.13 WebPG for Mozilla - An extension which provides PGP functions to Firefox, Thunderbird and Seamonkey.html
|
0.1 KB
|
5.14 Secure Mail for Gmail chrome extension.html
|
0.2 KB
|
5.15 Decrypt or verify a text created using OpenPGP Applet.html
|
0.1 KB
|
5.16 httpswww.mailvelope.com.html
|
0.1 KB
|
5.2 How to Use PGP for Windows.html
|
0.1 KB
|
5.3 iPGMail.html
|
0.1 KB
|
5.4 The best PGP tutorial for Mac OS X, ever.html
|
0.1 KB
|
5.5 How to Use PGP for Mac OS X.html
|
0.1 KB
|
5.6 OpenPGP public-key cryptography.html
|
0.2 KB
|
5.7 Mymail-Crypt for Gmail - PGP extension for chrome.html
|
0.2 KB
|
5.9 Secure Mobile Apps.html
|
0.1 KB
|
6. Windows - PGP & GPG.mp4
|
61.1 MB
|
6. Windows - PGP & GPG.vtt
|
18.7 KB
|
6.1 How to Use PGP for Windows.html
|
0.1 KB
|
6.2 The Gpg4win Compendium Secure e-mail and file encryption using GnuPG for Windows.html
|
0.1 KB
|
6.3 Thunderbird.html
|
0.1 KB
|
6.4 Enigmail.html
|
0.1 KB
|
6.5 Google - Sign in using App Passwords.html
|
0.1 KB
|
6.6 Gpg4win.html
|
0.1 KB
|
6.7 httpwww.stationx.netnathan-house.html
|
0.1 KB
|
7. Tail - PGP & GPG.mp4
|
10.1 MB
|
7. Tail - PGP & GPG.vtt
|
2.9 KB
|
7.1 httpwww.stationx.netnathan-house.html
|
0.1 KB
|
8. PGP & GPG Weaknesses.mp4
|
15.4 MB
|
8. PGP & GPG Weaknesses.vtt
|
6.7 KB
|
8.1 What’s the matter with PGP.html
|
0.1 KB
|
8.2 15 reasons not to start using PGP.html
|
0.1 KB
|
9. Improving OpenPGP Security - Best Practices - Part 1.mp4
|
5.8 MB
|
9. Improving OpenPGP Security - Best Practices - Part 1.vtt
|
2.5 KB
|
9.1 OpenPGP Best Practices.html
|
0.1 KB
|
9.2 httpsraw.githubusercontent.comioerrorduraconfmasterconfigsgnupggpg.conf.html
|
0.1 KB
|
/12. Messengers - Security, Privacy and Anonymity/
|
1. Goals and Learning Objectives.mp4
|
3.0 MB
|
1. Goals and Learning Objectives.vtt
|
0.4 KB
|
10. Video and Voice Messengers - Other.mp4
|
2.8 MB
|
10. Video and Voice Messengers - Other.vtt
|
1.2 KB
|
10.1 httpsen.wikipedia.orgwikiComparison_of_VoIP_software.html
|
0.1 KB
|
10.2 httpstox.chat.html
|
0.1 KB
|
10.3 httpsring.cx.html
|
0.1 KB
|
2. An Introduction to Instant Messengers.mp4
|
26.4 MB
|
2. An Introduction to Instant Messengers.vtt
|
3.5 KB
|
2.1 httpswww.eff.orgsecure-messaging-scorecard.html
|
0.1 KB
|
2.2 httpswww.securemessagingapps.com.html
|
0.1 KB
|
2.3 httpsen.wikipedia.orgwikiComparison_of_instant_messaging_clients.html
|
0.1 KB
|
3. Instant Messenger - Signal.mp4
|
6.2 MB
|
3. Instant Messenger - Signal.vtt
|
2.8 KB
|
3.1 httpswhispersystems.org.html
|
0.1 KB
|
3.2 iOS - Signal.html
|
0.1 KB
|
3.3 How to Use Signal on iOS.html
|
0.1 KB
|
3.4 SIGNAL AUDIT REVEALS PROTOCOL CRYPTOGRAPHICALLY SOUND.html
|
0.1 KB
|
3.5 How to Use Signal for Android.html
|
0.1 KB
|
3.6 Andoird - Signal.html
|
0.1 KB
|
4. Instant Messengers - Chatsecure.mp4
|
4.2 MB
|
4. Instant Messengers - Chatsecure.vtt
|
1.7 KB
|
4.1 How to Install and Use ChatSecure.html
|
0.1 KB
|
4.2 httpschatsecure.org.html
|
0.1 KB
|
5. Instant Messengers - Cryptocat.mp4
|
1.5 MB
|
5. Instant Messengers - Cryptocat.vtt
|
0.9 KB
|
5.1 httpscrypto.cat.html
|
0.1 KB
|
6. Instant Messengers - Ricochet.mp4
|
1.5 MB
|
6. Instant Messengers - Ricochet.vtt
|
0.8 KB
|
6.1 httpsricochet.im.html
|
0.1 KB
|
7. Instant Messengers - Other.mp4
|
1.6 MB
|
7. Instant Messengers - Other.vtt
|
0.8 KB
|
7.1 Conversations (Jabber XMPP).html
|
0.1 KB
|
7.2 httpkontalk.org.html
|
0.1 KB
|
8. Video and Voice Messengers - Linphone.mp4
|
12.1 MB
|
8. Video and Voice Messengers - Linphone.vtt
|
4.7 KB
|
8.1 httpswhispersystems.org.html
|
0.1 KB
|
8.2 httpswww.linphone.orgfree-sip-service.html.html
|
0.1 KB
|
8.3 httpswww.linphone.org.html
|
0.1 KB
|
8.4 httpswww.linphone.orguser-guide.html.html
|
0.1 KB
|
9. Video and Voice Messengers - Jitsi.mp4
|
3.9 MB
|
9. Video and Voice Messengers - Jitsi.vtt
|
1.9 KB
|
9.1 httpsjitsi.org.html
|
0.1 KB
|
/13. Wrap Up/
|
1. Congratulations!!.mp4
|
4.5 MB
|
1. Congratulations!!.vtt
|
0.7 KB
|
1.1 Cyber Security Newsletter.html
|
0.1 KB
|
1.2 Nathan's Blog.html
|
0.1 KB
|
1.3 Nathan's Twitter @GotoNathan.html
|
0.1 KB
|
2. Certificate Of Completion for CPEs.mp4
|
2.3 MB
|
2. Certificate Of Completion for CPEs.vtt
|
1.1 KB
|
2.1 httpswww.stationx.netcertificate-request.html
|
0.1 KB
|
3. Qubes OS.mp4
|
59.0 MB
|
3. Qubes OS.vtt
|
20.6 KB
|
4. Effective Network Isolation.mp4
|
29.4 MB
|
4. Effective Network Isolation.vtt
|
13.0 KB
|
5. Socks5 proxy tunneling.mp4
|
24.1 MB
|
5. Socks5 proxy tunneling.vtt
|
10.2 KB
|
/14. BONUS Section/
|
1. BONUS DISCOUNT COUPONS .html
|
5.1 KB
|
/2. Goals and Learning Objectives - Volume 4/
|
1. What is End Point Protection and why is it important.mp4
|
36.0 MB
|
1. What is End Point Protection and why is it important.vtt
|
6.0 KB
|
2. Goals and Learning Objectives - Volume 4.mp4
|
26.6 MB
|
2. Goals and Learning Objectives - Volume 4.vtt
|
4.1 KB
|
/3. File and Disk Encryption/
|
1. Goals and Learning Objectives.mp4
|
7.5 MB
|
1. Goals and Learning Objectives.vtt
|
0.8 KB
|
10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.mp4
|
7.1 MB
|
10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.vtt
|
3.7 KB
|
10.1 httpsdiskcryptor.net.html
|
0.1 KB
|
10.2 httpswww.ciphershed.org.html
|
0.1 KB
|
10.3 Comparison of disk encryption software From Wikipedia.html
|
0.1 KB
|
10.4 BestCrypt Volume Encryption.html
|
0.1 KB
|
10.5 Symantec Drive Encryption.html
|
0.1 KB
|
11. Windows, Mac & Linux - Setting up VeraCrypt.mp4
|
31.2 MB
|
11. Windows, Mac & Linux - Setting up VeraCrypt.vtt
|
12.4 KB
|
11.1 VeraCrypt - Beginner's Tutorial.html
|
0.1 KB
|
12. Mac - Filevault2.mp4
|
13.8 MB
|
12. Mac - Filevault2.vtt
|
2.9 KB
|
12.1 Use FileVault to encrypt the startup disk on your Mac - Apple.html
|
0.1 KB
|
12.2 Report - Infiltrate the Vault Security Analysis and Decryption of Lion Full Disk Encryption.html
|
0.1 KB
|
12.3 OS X Security and Privacy Guide - full disk encryption.html
|
0.1 KB
|
13. Mac - Setting up Filevault2.mp4
|
20.7 MB
|
13. Mac - Setting up Filevault2.vtt
|
9.0 KB
|
13.1 Startup key combinations for Mac.html
|
0.1 KB
|
13.2 DeepSleep - Hibernate your Mac.html
|
0.1 KB
|
13.3 Report - Infiltrate the Vault Security Analysis and Decryption of Lion Full Disk Encryption.html
|
0.1 KB
|
13.4 pmset -- manipulate power management settings - Man Page.html
|
0.2 KB
|
13.5 Report - Security Analysis and Decryption of FileVault 2 IFIP WG 11.9.html
|
0.1 KB
|
13.6 Apple Technical White Paper - Best Practices for Deploying FileVault 2.html
|
0.1 KB
|
14. Linux Whole Disk Encryption - Dm-crypt and LUKS.mp4
|
14.4 MB
|
14. Linux Whole Disk Encryption - Dm-crypt and LUKS.vtt
|
6.5 KB
|
14.1 Two factor authentication with Yubikey for harddisk encryption with LUKS.html
|
0.2 KB
|
14.2 Plain dm-crypt.html
|
0.1 KB
|
14.3 LUKS support for storing keys in TPM NVRAM.html
|
0.1 KB
|
14.4 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html
|
0.2 KB
|
15. Linux - Setting up DMCryptLUKS.mp4
|
13.8 MB
|
15. Linux - Setting up DMCryptLUKS.vtt
|
5.3 KB
|
15.1 The Debian Administrator's Handbook.html
|
0.1 KB
|
15.2 Cryptsetup & LUKS.html
|
0.1 KB
|
15.3 zuluCrypt.html
|
0.1 KB
|
15.4 Arch - Disk encryption.html
|
0.1 KB
|
15.5 Arch - dm-cryptEncrypting an entire system.html
|
0.1 KB
|
16. Linux - Encrypting the boot partition with Grub2.mp4
|
12.3 MB
|
16. Linux - Encrypting the boot partition with Grub2.vtt
|
4.3 KB
|
16.1 Two factor authentication with Yubikey for harddisk encryption with LUKS.html
|
0.2 KB
|
16.2 Arch - Encrypted boot partition (GRUB).html
|
0.2 KB
|
16.3 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html
|
0.2 KB
|
17. Self Encrypting Drives (SEDs).mp4
|
3.3 MB
|
17. Self Encrypting Drives (SEDs).vtt
|
2.0 KB
|
17.1 Report - Ten Reasons to Buy Self-Encrypting Drives.html
|
0.2 KB
|
18. Defense Against Disk Decryption Attacks.mp4
|
21.9 MB
|
18. Defense Against Disk Decryption Attacks.vtt
|
9.1 KB
|
18.1 Security Requirements and Precautions.html
|
0.2 KB
|
18.2 TRESOR Runs Encryption Securely Outside RAM.html
|
0.1 KB
|
19. File Encryption.mp4
|
11.7 MB
|
19. File Encryption.vtt
|
4.5 KB
|
19.1 httpwww.peazip.org.html
|
0.1 KB
|
19.2 httpwww.kekaosx.comen.html
|
0.1 KB
|
19.3 httpswww.gnupg.org.html
|
0.1 KB
|
19.4 httpswww.aescrypt.com.html
|
0.1 KB
|
2. Disk Encryption – What is it good for.mp4
|
22.8 MB
|
2. Disk Encryption – What is it good for.vtt
|
8.6 KB
|
20. Mandatory Key Disclosure & Plausible Deniability.mp4
|
21.5 MB
|
20. Mandatory Key Disclosure & Plausible Deniability.vtt
|
8.8 KB
|
20.1 veracrypt - Plausible Deniability.html
|
0.1 KB
|
20.2 Arch - Plain dm-crypt.html
|
0.1 KB
|
20.3 Appeals Court Upholds Constitutional Right Against Forced Decryption.html
|
0.2 KB
|
20.4 httpsxkcd.com538 - Cartoon.html
|
0.1 KB
|
20.5 veracrypt - Hidden Volume.html
|
0.1 KB
|
20.6 Key disclosure law From Wikipedia.html
|
0.1 KB
|
21. Nesting Crypto Systems & Obfuscation.mp4
|
9.3 MB
|
21. Nesting Crypto Systems & Obfuscation.vtt
|
4.0 KB
|
22. Case Studies in Disk Decryption.mp4
|
6.2 MB
|
22. Case Studies in Disk Decryption.vtt
|
3.3 KB
|
22.1 Darkmarket.html
|
0.3 KB
|
22.2 Hacking Godfather ‘Maksik’ Sentenced to 30 Years by Turkish Court.html
|
0.1 KB
|
22.3 KINGPIN How One Hacker Took Over the Billion-Dollar Cybercrime Underground.html
|
0.1 KB
|
3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.mp4
|
17.6 MB
|
3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.vtt
|
6.0 KB
|
3.1 Further reading on quantum computing and its effect of cryptography - NIST Reports.html
|
0.2 KB
|
3.2 N.S.A. Able to Foil Basic Safeguards of Privacy on Web.html
|
0.2 KB
|
4. Disk Encryption Attacks - Physical.mp4
|
40.2 MB
|
4. Disk Encryption Attacks - Physical.vtt
|
12.0 KB
|
4.1 Inception.html
|
0.1 KB
|
4.10 Cold Boot Attack Demo - Video.html
|
0.1 KB
|
4.11 nullcon Goa 2015 Cold Boot Attack on DDR2 and DDR3 RAM by Marko Schuba - Video.html
|
0.1 KB
|
4.12 Report - Cold Boot Attack on DDR2 and DDR3 RAM.html
|
0.1 KB
|
4.2 Windowsscope.html
|
0.2 KB
|
4.3 Choose the Right BitLocker Countermeasure.html
|
0.1 KB
|
4.4 Inception over firewire attack - video.html
|
0.1 KB
|
4.5 Passware Kit Enterprise - Hard Disk Decryption.html
|
0.1 KB
|
4.6 Intel® Virtualization Technology for Directed IO (VT-d) Enhancing Intel platforms for efficient virtualization of IO devices.html
|
0.2 KB
|
4.7 Wikipedia - Disk encryption.html
|
0.1 KB
|
4.8 Security Pitfalls in Cryptography.html
|
0.1 KB
|
4.9 Evil Maid goes after TrueCrypt!.html
|
0.1 KB
|
5. Disk Encryption Attacks - Containers, Volumes and Partitions.mp4
|
7.5 MB
|
5. Disk Encryption Attacks - Containers, Volumes and Partitions.vtt
|
2.6 KB
|
5.1 Security Pitfalls in Cryptography.html
|
0.1 KB
|
6. Windows - Disk Encryption - An Introduction.mp4
|
7.9 MB
|
6. Windows - Disk Encryption - An Introduction.vtt
|
3.2 KB
|
6.1 Veracrypt.html
|
0.1 KB
|
6.2 CipherShed.html
|
0.1 KB
|
6.3 Truecrpyt v7.2 (latest full version) - Download.html
|
0.1 KB
|
6.4 BestCrypt Container Encryption.html
|
0.1 KB
|
6.5 Windows BitLocker.html
|
0.1 KB
|
6.6 Symantec Drive Encryption.html
|
0.1 KB
|
6.7 DiskCryptor.html
|
0.1 KB
|
6.8 Comparison of disk encryption software From Wikipedia.html
|
0.1 KB
|
7. Windows - Disk Encryption - Bitlocker.mp4
|
31.7 MB
|
7. Windows - Disk Encryption - Bitlocker.vtt
|
13.9 KB
|
7.1 Windows BitLocker Drive Encryption Step-by-Step Guide.html
|
0.1 KB
|
7.2 What's new in Windows 10, versions 1507 and 1511.html
|
0.2 KB
|
7.3 YUBIKEYS.html
|
0.1 KB
|
7.4 Every Windows 10 in-place Upgrade is a SEVERE Security risk.html
|
0.1 KB
|
8. Windows - Setting Up BitLocker.mp4
|
24.8 MB
|
8. Windows - Setting Up BitLocker.vtt
|
9.7 KB
|
8.1 ENCRYPTING YOUR LAPTOP LIKE YOU MEAN IT.html
|
0.1 KB
|
9. Windows - Disk Encryption - VeraCrypt.mp4
|
26.3 MB
|
9. Windows - Disk Encryption - VeraCrypt.vtt
|
13.5 KB
|
9.1 Veracrypt.html
|
0.1 KB
|
9.10 yubico.com.html
|
0.1 KB
|
9.11 httpssourceforge.netpveracryptcodecimastertreesrcBootEFIReadme.txt#l19.html
|
0.1 KB
|
9.12 httpwww.openwall.comlistsoss-security201601111.html
|
0.1 KB
|
9.2 VeraCrypt - Operating Systems Supported for System Encryption.html
|
0.2 KB
|
9.3 Nitrokey.com.html
|
0.1 KB
|
9.4 Truecrypt 7 Derived CodeWindows Incorrect Impersonation Token Handling EoP.html
|
0.1 KB
|
9.5 IsTrueCryptAuditedYet Yes!.html
|
0.1 KB
|
9.6 GERMAN GOVERNMENT AUDITS TRUECRYPT.html
|
0.1 KB
|
9.7 Report - UEFI SECURE BOOT IN MODERN COMPUTER SECURITY SOLUTIONS.html
|
0.2 KB
|
9.8 Truecrypt 7 Derived CodeWindows Drive Letter Symbolic Link Creation EoP.html
|
0.1 KB
|
9.9 Veracrypt FAQ.html
|
0.1 KB
|
/4. Anti-Virus and End-Point-Protection/
|
1. Goals and Learning Objectives.mp4
|
5.9 MB
|
1. Goals and Learning Objectives.vtt
|
0.8 KB
|
10. Mac - XProtect.mp4
|
14.2 MB
|
10. Mac - XProtect.vtt
|
3.4 KB
|
10.1 httpsvirustotal.github.ioyara.html
|
0.1 KB
|
10.2 Are you sure you want to open it alert (File Quarantine Known Malware Detection) in OS X.html
|
0.1 KB
|
10.3 httpswww.intego.commac-security-blogtopicxprotect.html
|
0.1 KB
|
11. Mac - The Best of Anti-Virus and End-Point-Protection.mp4
|
6.8 MB
|
11. Mac - The Best of Anti-Virus and End-Point-Protection.vtt
|
2.9 KB
|
11.1 Malwarebytes for Mac.html
|
0.1 KB
|
11.2 Patrick Wardle, Synack How to practically create elegant, bad@ss OS X malware..html
|
0.1 KB
|
11.3 History of Mac Malware.html
|
0.1 KB
|
11.4 httpwww.thesafemac.com.html
|
0.1 KB
|
11.5 httpswww.av-comparatives.orgwp-contentuploads201607avc_mac_2016_en.pdf --- NEW version.html
|
0.1 KB
|
11.6 httpswww.intego.com.html
|
0.1 KB
|
12. Linux - The Best of Anti-Virus and End-Point-Protection.mp4
|
6.5 MB
|
12. Linux - The Best of Anti-Virus and End-Point-Protection.vtt
|
3.1 KB
|
12.1 httpwww.clamav.net.html
|
0.1 KB
|
12.2 httpsrootkit.nlprojectsrootkit_hunter.html.html
|
0.1 KB
|
12.3 httpwww.chkrootkit.org.html
|
0.1 KB
|
12.4 Report - Linux Security Review.html
|
0.1 KB
|
12.5 Linux malware From Wikipedia.html
|
0.1 KB
|
12.6 httpswww.rfxn.comprojectslinux-malware-detect.html
|
0.1 KB
|
13. Online and Second Opinion - Anti-Virus and End-Point-Protection.mp4
|
10.4 MB
|
13. Online and Second Opinion - Anti-Virus and End-Point-Protection.vtt
|
3.3 KB
|
13.1 virustotal.com email-submissions.html
|
0.1 KB
|
13.2 httpsvirusscan.jotti.org.html
|
0.1 KB
|
13.3 httpsalternativeto.netsoftwarevirustotal.html
|
0.1 KB
|
13.4 httpwww.threattracksecurity.comresourcessandbox-malware-analysis.aspx.html
|
0.1 KB
|
13.5 httpswww.herdprotect.comdownloads.aspx.html
|
0.1 KB
|
13.6 httpswww.eset.comusonline-scanner.html
|
0.1 KB
|
13.7 httpswww.metascan-online.com#!scan-file.html
|
0.1 KB
|
13.8 httpvirscan.org.html
|
0.1 KB
|
13.9 httpwww.surfright.nlenhitmanpro.html
|
0.1 KB
|
14. Is Anti-Virus and End-Point-Protection Dangerous.mp4
|
14.0 MB
|
14. Is Anti-Virus and End-Point-Protection Dangerous.vtt
|
7.5 KB
|
14.1 High-severity bugs in 25 SymantecNorton products imperil millions.html
|
0.2 KB
|
14.2 'Ridiculous' Bug in Popular Antivirus Allows Hackers to Steal all Your Passwords.html
|
0.1 KB
|
14.3 Tavis Ormandy @taviso.html
|
0.1 KB
|
14.4 Comodo Comodo Chromodo Browser disables same origin policy, Effectively turning off web security..html
|
0.2 KB
|
14.5 Zero-day vulnerabilities reportedly found in Kaspersky and FireEye security products.html
|
0.1 KB
|
14.6 AVG can sell your browsing and search history to advertisers.html
|
0.1 KB
|
14.7 MalwareBytes multiple security issues.html
|
0.1 KB
|
2. Is Anti-Virus dead - The Threat Landscape.mp4
|
11.9 MB
|
2. Is Anti-Virus dead - The Threat Landscape.vtt
|
4.5 KB
|
2.1 kaspersky compare.html
|
0.1 KB
|
2.2 av-test.org - The best antivirus software for Windows Home User.html
|
0.1 KB
|
2.3 FUD Crypting Service (035 100% FUD) - Video.html
|
0.1 KB
|
3. Is Anti-Virus dead - Protection Methods.mp4
|
38.4 MB
|
3. Is Anti-Virus dead - Protection Methods.vtt
|
11.9 KB
|
3.1 Paper - Malicious Code Detection Technologies.html
|
0.2 KB
|
3.2 httpscybermap.kaspersky.com.html
|
0.1 KB
|
3.3 White Paper - Malicious Code Detection Technologies.html
|
0.1 KB
|
4. Ransomware.mp4
|
8.9 MB
|
4. Ransomware.vtt
|
5.2 KB
|
4.1 The cost of ransomware attacks $1 billion this year.html
|
0.1 KB
|
5. Anti-Virus and End-Point-Protection Testing.mp4
|
13.5 MB
|
5. Anti-Virus and End-Point-Protection Testing.vtt
|
6.4 KB
|
5.1 bitdefender.html
|
0.1 KB
|
5.2 List of AV Testing Labs.html
|
0.1 KB
|
5.3 httpwww.av-comparatives.org.html
|
0.1 KB
|
6. The Problem With AV and EPP Testing.mp4
|
7.0 MB
|
6. The Problem With AV and EPP Testing.vtt
|
4.2 KB
|
7. The Best of Business End-Point-Protection (EPP).mp4
|
9.9 MB
|
7. The Best of Business End-Point-Protection (EPP).vtt
|
4.7 KB
|
7.1 The best antivirus software for Windows Client Business User.html
|
0.1 KB
|
7.2 httpwww.bitdefender.co.ukbusiness.html
|
0.1 KB
|
7.3 httpwww.kaspersky.co.ukbusiness-securitysmall-to-medium-business.html
|
0.1 KB
|
8. Windows - The Best of Anti-Virus and End-Point-Protection.mp4
|
10.8 MB
|
8. Windows - The Best of Anti-Virus and End-Point-Protection.vtt
|
4.6 KB
|
8.1 httpwww.bitdefender.co.uksolutionsantivirus-comparison.html.html
|
0.1 KB
|
8.2 httpwindows.microsoft.comen-uswindows-10getstarted-protect-your-pc.html
|
0.1 KB
|
8.3 Microsoft’s Free Security Tools – Windows Defender Offline.html
|
0.2 KB
|
8.4 httpwww.kaspersky.co.ukcompare.html
|
0.1 KB
|
8.5 httpsuk.norton.comnorton-security-with-backup.html
|
0.1 KB
|
8.6 Security Essentials Download.html
|
0.1 KB
|
8.7 httpwww.bitdefender.commediahtmlfreeav-upgradeet_cid=EMM_NA_FreeAV_Upsell.html
|
0.1 KB
|
9. Business End Point Protection (EPP).mp4
|
5.4 MB
|
9. Business End Point Protection (EPP).vtt
|
2.5 KB
|
9.1 The best antivirus software for Windows Client Business User.html
|
0.1 KB
|
/5. Next Generation - Anti-Virus, End-Point-Protection, Detection & Response (EDR)/
|
1. Goals and Learning Objectives.mp4
|
5.3 MB
|
1. Goals and Learning Objectives.vtt
|
0.7 KB
|
2. Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP).mp4
|
11.2 MB
|
2. Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP).vtt
|
5.5 KB
|
2.1 Magic Quadrant for Endpoint Protection Platforms.html
|
0.1 KB
|
3. End Point Detection and Response (EDR).mp4
|
14.5 MB
|
3. End Point Detection and Response (EDR).vtt
|
7.2 KB
|
4. End-Point-Protection How it works together in layers.mp4
|
13.5 MB
|
4. End-Point-Protection How it works together in layers.vtt
|
8.5 KB
|
/6. End-Point-Protection Technology/
|
1. Goals and Learning Objectives.mp4
|
6.1 MB
|
1. Goals and Learning Objectives.vtt
|
0.8 KB
|
10. Windows - Exploitation Prevention - Traps, MBEA and HMPA.mp4
|
11.8 MB
|
10. Windows - Exploitation Prevention - Traps, MBEA and HMPA.vtt
|
4.9 KB
|
10.1 HitmanPro.Alert.html
|
0.1 KB
|
10.2 HitmanPro.Alert - Exploit Test Tool Manual.html
|
0.1 KB
|
10.3 httpswww.malwarebytes.organtiexploit.html
|
0.1 KB
|
10.4 Palo Alto Traps.html
|
0.1 KB
|
10.5 httpforums.sandboxie.comphpBB3viewtopic.phpf=17&t=19132&start=30#p110120.html
|
0.1 KB
|
11. Windows 10 - Device Guard.mp4
|
29.2 MB
|
11. Windows 10 - Device Guard.vtt
|
12.3 KB
|
11.1 IOMMU A Detailed view.html
|
0.2 KB
|
11.2 What's new in Windows 10, versions 1507 and 1511.html
|
0.1 KB
|
11.3 Device Guard and Credential Guard hardware readiness tool.html
|
0.1 KB
|
11.4 Device Guard deployment guide.html
|
0.1 KB
|
11.5 Microsoft future security strategy - black hat talk.html
|
0.2 KB
|
12. Windows - Defender Application Guard for Microsoft Edge.mp4
|
9.5 MB
|
12. Windows - Defender Application Guard for Microsoft Edge.vtt
|
2.9 KB
|
12.1 Introducing Windows Defender Application Guard for Microsoft Edge.html
|
0.2 KB
|
12.2 Windows Defender Application Guard for Microsoft Edge.html
|
0.1 KB
|
13. Linux - Access Control Models.mp4
|
14.0 MB
|
13. Linux - Access Control Models.vtt
|
8.1 KB
|
14. Linux - Security frameworks - AppArmor.mp4
|
4.6 MB
|
14. Linux - Security frameworks - AppArmor.vtt
|
2.2 KB
|
14.1 AppArmor How To Use.html
|
0.1 KB
|
14.2 AppArmor From Wikipedia.html
|
0.1 KB
|
15. Linux - Security frameworks - SElinux.mp4
|
7.0 MB
|
15. Linux - Security frameworks - SElinux.vtt
|
3.4 KB
|
15.1 Security-Enhanced Linux From Wikipedia.html
|
0.1 KB
|
15.2 SELinux on Debian.html
|
0.1 KB
|
15.3 SELinux Project Wiki.html
|
0.1 KB
|
16. Linux - Security frameworks - Grsecurity.mp4
|
13.4 MB
|
16. Linux - Security frameworks - Grsecurity.vtt
|
1.8 KB
|
16.1 grsecurity.net.html
|
0.1 KB
|
16.2 GrsecurityConfiguring and Installing grsecurity.html
|
0.1 KB
|
16.3 Hardening Debian for the Desktop Using Grsecurity.html
|
0.1 KB
|
16.4 Which distributions maintain a kernel package with grsecurity support.html
|
0.2 KB
|
16.5 Arch Linux kernel and modules with grsecurity.html
|
0.1 KB
|
16.6 Linux Kernel Security (SELinux vs AppArmor vs Grsecurity).html
|
0.1 KB
|
16.7 httpsalpinelinux.org.html
|
0.1 KB
|
16.8 Debian grsecurity kernel APT repository (unofficial).html
|
0.1 KB
|
16.9 Which is better, grsecurity, AppArmor or SELinux.html
|
0.1 KB
|
17. Linux - Security frameworks - PaX and more.mp4
|
4.0 MB
|
17. Linux - Security frameworks - PaX and more.vtt
|
1.8 KB
|
17.1 httpspax.grsecurity.net.html
|
0.1 KB
|
17.2 httpswww.rsbac.org.html
|
0.1 KB
|
17.3 httpschreuders.orgFBAC-LSM.html
|
0.1 KB
|
17.4 Yama is a Linux Security Module.html
|
0.2 KB
|
17.5 httptomoyo.osdn.jp.html
|
0.1 KB
|
18. Linux & Mac - File permissions, POSIX and ACLs.mp4
|
20.0 MB
|
18. Linux & Mac - File permissions, POSIX and ACLs.vtt
|
8.9 KB
|
19. Mac - Application control - Parental controls.mp4
|
8.4 MB
|
19. Mac - Application control - Parental controls.vtt
|
3.4 KB
|
19.1 How can I ensure only “whitelisted” applications run on OS X.html
|
0.2 KB
|
2. What is application and execution control.mp4
|
22.0 MB
|
2. What is application and execution control.vtt
|
10.6 KB
|
2.1 the-backdoor-factory.html
|
0.1 KB
|
20. Mac - Application control - Gatekeeper.mp4
|
10.7 MB
|
20. Mac - Application control - Gatekeeper.vtt
|
6.6 KB
|
20.1 Researchers slip malware onto Apple's App Store, again.html
|
0.1 KB
|
20.2 Gatekeeper Exposed - Video.html
|
0.1 KB
|
20.3 httpsobjective-see.comproductsostiarius.html.html
|
0.1 KB
|
20.4 Gatekeeper Exposed.html
|
0.1 KB
|
20.5 OS X About Gatekeeper.html
|
0.1 KB
|
21. Mac - Application control - System Integrity Protection.mp4
|
12.6 MB
|
21. Mac - Application control - System Integrity Protection.vtt
|
6.4 KB
|
21.1 El Capitan's System Integrity Protection will shift utilities' functions.html
|
0.2 KB
|
21.3 httpsdeveloper.apple.comvideosplaywwdc2015706 - Video.html
|
0.1 KB
|
21.4 About System Integrity Protection on your Mac.html
|
0.1 KB
|
22. Mac - Application control - Santa.mp4
|
7.4 MB
|
22. Mac - Application control - Santa.vtt
|
4.5 KB
|
22.1 httpsgithub.comgooglesanta.html
|
0.1 KB
|
22.2 How to bypass Google’s Santa LOCKDOWN mode.html
|
0.1 KB
|
23. Mac - Application control - Xfence (Previously Little Flocker).mp4
|
21.4 MB
|
23. Mac - Application control - Xfence (Previously Little Flocker).vtt
|
8.1 KB
|
23.1 httpscampaigns.f-secure.comxfence.html
|
0.1 KB
|
24. Mac - Other Stuff!.mp4
|
3.9 MB
|
24. Mac - Other Stuff!.vtt
|
1.7 KB
|
24.1 httpsobjective-see.comproductsdhs.html.html
|
0.1 KB
|
24.2 httpsobjective-see.comproductsoversight.html.html
|
0.1 KB
|
24.3 FREE TOOL PROTECTS MAC USERS FROM WEBCAM SURVEILLANCE.html
|
0.1 KB
|
24.4 httpsobjective-see.comproductsransomwhere.html.html
|
0.1 KB
|
25. The New Normal For End-Point-Protection Technology.mp4
|
23.5 MB
|
25. The New Normal For End-Point-Protection Technology.vtt
|
9.5 KB
|
25.1 httpswww.illusivenetworks.com.html
|
0.1 KB
|
25.10 httpwww.faronics.comen-ukproductsdeep-freezestandard.html
|
0.1 KB
|
25.2 httpswww.invincea.com.html
|
0.1 KB
|
25.3 httpswww.bromium.com.html
|
0.1 KB
|
25.4 httpbufferzonesecurity.com.html
|
0.1 KB
|
25.5 httpswww.cylance.com.html
|
0.1 KB
|
25.6 httpjavelin-networks.com.html
|
0.1 KB
|
25.7 httpsattivonetworks.com.html
|
0.1 KB
|
25.8 httpwww.deepinstinct.com.html
|
0.1 KB
|
25.9 httpscanary.tools.html
|
0.1 KB
|
26. Cylance.mp4
|
10.0 MB
|
26. Cylance.vtt
|
5.8 KB
|
3. Windows - Application control - ACLs, Windows Permission Identifier & Accessenum.mp4
|
17.1 MB
|
3. Windows - Application control - ACLs, Windows Permission Identifier & Accessenum.vtt
|
6.8 KB
|
3.1 How to Change File Permissions on Windows 7.html
|
0.1 KB
|
3.2 AccessEnum.html
|
0.1 KB
|
3.3 Windows Permission Identifier.html
|
0.1 KB
|
4. Windows - Application control - User Account Control (UAC).mp4
|
16.1 MB
|
4. Windows - Application control - User Account Control (UAC).vtt
|
5.0 KB
|
4.1 Windows 7 – How to Configure UAC (User Account Control).html
|
0.1 KB
|
4.2 User Account Control From Wikipedia.html
|
0.1 KB
|
4.3 User Account Control (UAC).html
|
0.1 KB
|
4.4 How User Account Control works.html
|
0.2 KB
|
5. Windows - Application control - Software Restriction Policies.mp4
|
11.8 MB
|
5. Windows - Application control - Software Restriction Policies.vtt
|
4.6 KB
|
5.1 Use Software Restriction Policies to block viruses and malware.html
|
0.2 KB
|
5.3 Application Whitelisting using Software Restriction Policies (version 1.1).html
|
0.1 KB
|
6. Windows - Application control - AppLocker.mp4
|
33.7 MB
|
6. Windows - Application control - AppLocker.vtt
|
10.8 KB
|
6.1 What Is AppLocker.html
|
0.1 KB
|
6.10 AppLocker Step-by-Step Guide.html
|
0.1 KB
|
6.11 NoVA Hackers Curt Shaffer & Judah Plummer - Application Whitelisting - Video.html
|
0.1 KB
|
6.2 Finding Evil in the Whitelist.html
|
0.1 KB
|
6.3 Guide to Application Whitelisting.html
|
0.1 KB
|
6.4 Bypassing Windows AppLocker using a Time of Check Time of Use vulnerability.html
|
0.2 KB
|
6.6 Lock down Windows 10 to specific apps.html
|
0.1 KB
|
6.7 Use AppLocker and Software Restriction Policies in the same domain.html
|
0.2 KB
|
6.8 Restrict Access to Programs with AppLocker in Windows 7.html
|
0.2 KB
|
6.9 Bypass the Windows AppLocker bouncer with a tweet-size command.html
|
0.1 KB
|
7. Windows - Application Control - Parental controls.mp4
|
5.1 MB
|
7. Windows - Application Control - Parental controls.vtt
|
2.9 KB
|
7.1 Test Parental control software for Windows and Mac OS X.html
|
0.2 KB
|
7.2 Ensure a Windows PC Never Gets Malware By Whitelisting Applications.html
|
0.2 KB
|
8. Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks.mp4
|
13.6 MB
|
8. Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks.vtt
|
7.3 KB
|
8.1 voodooshield.com.html
|
0.1 KB
|
8.2 AppGuard® Breach Prevention.html
|
0.1 KB
|
8.3 Kaspersky Internet Security 20xx.html
|
0.1 KB
|
8.5 Lumension Application Control.html
|
0.1 KB
|
8.6 NoVirusThanks EXE Radar Pro.html
|
0.1 KB
|
8.7 httpswww.carbonblack.comproducts.html
|
0.1 KB
|
8.8 httpwww.mcafee.comusproductsapplication-control.aspx.html
|
0.1 KB
|
9. Windows - Exploitation Prevention - EMET.mp4
|
39.2 MB
|
9. Windows - Exploitation Prevention - EMET.vtt
|
14.0 KB
|
9.1 Enhanced Mitigation Experience Toolkit (EMET).html
|
0.1 KB
|
9.2 ANGLER EXPLOIT KIT EVADING EMET.html
|
0.1 KB
|
9.3 Microsoft - Moving Beyond EMET.html
|
0.1 KB
|
9.4 Microsoft - The Enhanced Mitigation Experience Toolkit.html
|
0.1 KB
|
9.5 Whitepaper on Bypassing ASLRDEP.html
|
0.1 KB
|
9.6 EMET Guide To New Features - Video.html
|
0.1 KB
|
9.7 CVE-2015-2545 ITW EMET Evasion.html
|
0.1 KB
|
9.8 Process Explorer.html
|
0.1 KB
|
9.9 Process Explorer.html
|
0.1 KB
|
/7. Threat Detection and Monitoring/
|
1. Goals and Learning Objectives.mp4
|
7.5 MB
|
1. Goals and Learning Objectives.vtt
|
0.9 KB
|
10. Host-Based Intrusion Detection - OSSEC.mp4
|
18.6 MB
|
10. Host-Based Intrusion Detection - OSSEC.vtt
|
5.7 KB
|
10.1 httpsossec.github.io.html
|
0.1 KB
|
10.2 httpsossec.github.iodownloads.html.html
|
0.1 KB
|
11. Network Analysis - Sguil, Xplico & NetworkMiner.mp4
|
9.3 MB
|
11. Network Analysis - Sguil, Xplico & NetworkMiner.vtt
|
3.5 KB
|
11.1 httpbammv.github.iosguilindex.html.html
|
0.1 KB
|
11.2 httpsmitmproxy.org.html
|
0.1 KB
|
11.3 httpwww.xplico.org.html
|
0.1 KB
|
11.4 httpwww.netresec.compage=NetworkMiner.html
|
0.1 KB
|
11.5 Burp proxy.html
|
0.1 KB
|
11.6 OWASP Zed Attack Proxy Project.html
|
0.1 KB
|
12. File Integrity Monitoring (FIM) and Checking Part 1.mp4
|
8.1 MB
|
12. File Integrity Monitoring (FIM) and Checking Part 1.vtt
|
3.7 KB
|
12.1 AIDE (Advanced Intrusion Detection Environment) - httpaide.sourceforge.net -.html
|
0.1 KB
|
12.2 Afick - httpafick.sourceforge.net.html
|
0.1 KB
|
12.3 ADaudit.html
|
0.2 KB
|
12.4 Osiris - httpslaunchpad.netosiris.html
|
0.1 KB
|
12.5 Samhain - httpwww.la-samhna.desamhain.html
|
0.1 KB
|
12.6 What to include in FIM.html
|
0.1 KB
|
12.7 Windows FIMS.html
|
0.1 KB
|
12.8 Solar Winds.html
|
0.1 KB
|
13. File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe.mp4
|
6.6 MB
|
13. File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe.vtt
|
3.2 KB
|
13.1 httpsgithub.comTripwiretripwire-open-source.html
|
0.1 KB
|
13.2 Tripwire Open Source vs OSSEC Which Is Right For You.html
|
0.1 KB
|
13.3 httpscisofy.comlynis.html
|
0.1 KB
|
13.4 How To Use Tripwire to Detect Server Intrusions on an Ubuntu VPS.html
|
0.2 KB
|
13.5 httpseljefe.immunityinc.com.html
|
0.1 KB
|
13.6 httpslinux-audit.com.html
|
0.1 KB
|
13.7 httpswww.tripwire.com.html
|
0.1 KB
|
14. Network Security Toolkit (NST).mp4
|
5.0 MB
|
14. Network Security Toolkit (NST).vtt
|
2.5 KB
|
14.1 httpnst.sourceforge.netnst.html
|
0.1 KB
|
14.2 httpssourceforge.netprojectsnstsource=recommended.html
|
0.1 KB
|
15. Security Onion.mp4
|
6.1 MB
|
15. Security Onion.vtt
|
1.7 KB
|
15.1 httpssecurityonion.net.html
|
0.1 KB
|
16. Security Information and Event Management Software (SIEM).mp4
|
6.5 MB
|
16. Security Information and Event Management Software (SIEM).vtt
|
3.6 KB
|
16.1 httpswww.alienvault.comproductsossim.html
|
0.1 KB
|
2. A Complete Failure to Detect Threats.mp4
|
12.0 MB
|
2. A Complete Failure to Detect Threats.vtt
|
6.4 KB
|
3. Rethinking Honeypots.mp4
|
9.3 MB
|
3. Rethinking Honeypots.vtt
|
6.0 KB
|
3.1 honeynet.orgproject.html
|
0.1 KB
|
4. CanaryTokens.mp4
|
73.7 MB
|
4. CanaryTokens.vtt
|
22.4 KB
|
4.1 httpswww.stationx.netcanarytokens.html
|
0.1 KB
|
5. OpenCanary.mp4
|
40.7 MB
|
5. OpenCanary.vtt
|
14.4 KB
|
5.1 httpscanary.tools.html
|
0.1 KB
|
5.2 httpdocs.opencanary.orgenlatestindex.html.html
|
0.1 KB
|
5.3 httpsgithub.comthinkstopencanary.html
|
0.1 KB
|
6. Artillery - Binary Defense.mp4
|
11.6 MB
|
6. Artillery - Binary Defense.vtt
|
4.4 KB
|
6.1 httpswww.binarydefense.comproject-artillery.html
|
0.1 KB
|
6.2 httpsgithub.comBinaryDefenseartillery.html
|
0.1 KB
|
7. Honey Drive.mp4
|
2.7 MB
|
7. Honey Drive.vtt
|
1.5 KB
|
7.1 httpssourceforge.netprojectshoneydrive.html
|
0.1 KB
|
7.2 httpsbruteforce.grhoneydrive.html
|
0.1 KB
|
8. Intrusion Detection Systems (IDS) Part 1 - Methods.mp4
|
13.9 MB
|
8. Intrusion Detection Systems (IDS) Part 1 - Methods.vtt
|
8.8 KB
|
9. Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n.mp4
|
9.7 MB
|
9. Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n.vtt
|
5.6 KB
|
9.1 httpswww.bro.org.html
|
0.1 KB
|
9.2 httpswww.snort.org.html
|
0.1 KB
|
9.3 httpssuricata-ids.org.html
|
0.1 KB
|
9.4 httpopenwips-ng.org.html
|
0.1 KB
|
/8. Malware and Hacker Hunting on the End-Point/
|
1. Goals and Learning Objectives.mp4
|
7.5 MB
|
1. Goals and Learning Objectives.vtt
|
0.9 KB
|
10. Windows - Malware Seek & Destroy - Autoruns.mp4
|
50.7 MB
|
10. Windows - Malware Seek & Destroy - Autoruns.vtt
|
11.6 KB
|
10.1 Configure a Script to Run Once When a New User Logs On.html
|
0.1 KB
|
10.2 Autorunsc - the command-line version of Autoruns.html
|
0.1 KB
|
10.3 Autoruns.html
|
0.1 KB
|
11. Windows - Malware Seek & Destroy - Process Monitor.mp4
|
79.9 MB
|
11. Windows - Malware Seek & Destroy - Process Monitor.vtt
|
11.1 KB
|
11.1 Processmonitor.html
|
0.1 KB
|
12. Windows - Malware Seek & Destroy - Network Connections.mp4
|
25.1 MB
|
12. Windows - Malware Seek & Destroy - Network Connections.vtt
|
9.7 KB
|
12.1 httpwww.unhide-forensics.info.html
|
0.1 KB
|
12.2 httpswhois.domaintools.com.html
|
0.1 KB
|
13. Malware Seek & Destroy - Networkx.mp4
|
5.7 MB
|
13. Malware Seek & Destroy - Networkx.vtt
|
2.7 KB
|
13.1 networx.html
|
0.1 KB
|
14. Linux - Malware Seek & Destroy - Sysdig.mp4
|
31.1 MB
|
14. Linux - Malware Seek & Destroy - Sysdig.vtt
|
11.3 KB
|
14.1 httpwww.sysdig.org.html
|
0.1 KB
|
14.2 Sysdig User Guide.html
|
0.1 KB
|
15. Linux - Seek & Destroy Malware and Hackers - Csysdig.mp4
|
45.8 MB
|
15. Linux - Seek & Destroy Malware and Hackers - Csysdig.vtt
|
12.1 KB
|
15.1 httpwww.sysdig.org.html
|
0.1 KB
|
15.2 httpsgithub.comdraiossysdigwikisysdig-quick-reference-guide#wiki-basic-command-list.html
|
0.2 KB
|
15.3 httpwww.sysdig.orgwikisysdig-examples.html
|
0.1 KB
|
16. Linux - Seek & Destroy Malware and Hackers - debsums & unhide.mp4
|
4.9 MB
|
16. Linux - Seek & Destroy Malware and Hackers - debsums & unhide.vtt
|
2.1 KB
|
16.1 httpwww.unhide-forensics.info.html
|
0.1 KB
|
17. Linux & Mac OS X - Malware Seek & Destroy - netstat.mp4
|
16.0 MB
|
17. Linux & Mac OS X - Malware Seek & Destroy - netstat.vtt
|
2.3 KB
|
18. Linux & Mac OS X - Malware Seek & Destroy - lsof.mp4
|
23.3 MB
|
18. Linux & Mac OS X - Malware Seek & Destroy - lsof.vtt
|
8.7 KB
|
19. Linux - Malware Seek & Destroy - rkhunter.mp4
|
18.1 MB
|
19. Linux - Malware Seek & Destroy - rkhunter.vtt
|
6.9 KB
|
19.1 httprkhunter.sourceforge.net.html
|
0.1 KB
|
19.2 httprkhunter.cvs.sourceforge.netviewvcrkhunterrkhunterfilesFAQ.html
|
0.1 KB
|
2. Introduction to Malware and Hacker Hunting.mp4
|
17.1 MB
|
2. Introduction to Malware and Hacker Hunting.vtt
|
10.9 KB
|
2.1 httpwww.bleepingcomputer.com.html
|
0.2 KB
|
2.2 httpwww.malwareremoval.com.html
|
0.1 KB
|
20. Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD.mp4
|
6.5 MB
|
20. Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD.vtt
|
2.3 KB
|
20.1 httpwww.nongnu.orgtiger.html
|
0.1 KB
|
20.2 httpwww.clamav.net.html
|
0.1 KB
|
20.3 httpswww.rfxn.comprojectslinux-malware-detect.html
|
0.1 KB
|
20.4 httpwww.2daygeek.cominstall-linux-malware-detect-lmd-on-ubuntu-centos-debian-fedora-mint-rhel-opensuse.html
|
0.2 KB
|
20.5 Report - Linux Security Review.html
|
0.1 KB
|
20.6 Linux malware From Wikipedia.html
|
0.1 KB
|
20.7 httpwww.chkrootkit.org.html
|
0.1 KB
|
21. Linux - Malware Seek & Destroy - Linux - Persistence Part 1.mp4
|
9.7 MB
|
21. Linux - Malware Seek & Destroy - Linux - Persistence Part 1.vtt
|
3.5 KB
|
22. Linux - Malware Seek & Destroy - Linux - Persistence Part 2.mp4
|
29.0 MB
|
22. Linux - Malware Seek & Destroy - Linux - Persistence Part 2.vtt
|
9.8 KB
|
22.1 httpswww.debian.orgdocmanualsdebian-referencech03.en.html.html
|
0.1 KB
|
22.2 httpsfedoraproject.orgwikiSysVinit_to_Systemd_Cheatsheet.html
|
0.1 KB
|
23. Linux - Malware Seek & Destroy - Linux - Persistence Part 3.mp4
|
5.5 MB
|
23. Linux - Malware Seek & Destroy - Linux - Persistence Part 3.vtt
|
3.0 KB
|
23.1 httpswww.debian.orgdocmanualsdebian-referencech03.en.html.html
|
0.1 KB
|
24. Mac - Malware Seek & Destroy - Task Explorer.mp4
|
15.8 MB
|
24. Mac - Malware Seek & Destroy - Task Explorer.vtt
|
6.0 KB
|
24.1 httpsobjective-see.comproductstaskexplorer.html.html
|
0.1 KB
|
25. Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer.mp4
|
21.5 MB
|
25. Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer.vtt
|
8.7 KB
|
25.1 httpsobjective-see.comproductsblockblock.html.html
|
0.1 KB
|
25.2 httpsobjective-see.comproductskextviewr.html.html
|
0.1 KB
|
25.3 httpsobjective-see.comproductsknockknock.html.html
|
0.1 KB
|
26. Mac, Linux & Windows - OSquery.mp4
|
44.4 MB
|
26. Mac, Linux & Windows - OSquery.vtt
|
17.5 KB
|
26.1 httpsosquery.readthedocs.ioenstabledeploymentfile-integrity-monitoring.html
|
0.1 KB
|
26.2 httpsgithub.comgooglegrr.html
|
0.1 KB
|
26.3 httpsosquery.readthedocs.ioenstabledeploymentyara.html
|
0.1 KB
|
26.4 httpsgithub.comfacebookosqueryblobmastertoolsdeploymentosquery.example.conf.html
|
0.1 KB
|
26.5 httpsosquery.readthedocs.ioenstable.html
|
0.1 KB
|
26.6 httpsvirustotal.github.ioyara.html
|
0.1 KB
|
26.7 httpsosquery.io.html
|
0.1 KB
|
26.8 httpsgithub.comherokuwindmill.html
|
0.1 KB
|
26.9 httpsgithub.comfacebookosquery.html
|
0.1 KB
|
27. Firmware Rootkits – Seek and Destroy Part 1.mp4
|
16.7 MB
|
27. Firmware Rootkits – Seek and Destroy Part 1.vtt
|
8.8 KB
|
27.1 httpwww.kaspersky.comaboutnewsvirus2015Equation-Group-The-Crown-Creator-of-Cyber-Espionage.html
|
0.2 KB
|
27.2 httpsnsa.gov1.infodninsa-ant-catalogfirewalls.html
|
0.1 KB
|
27.3 hacker presentation on Hacking the Extensible Firmware Interface.html
|
0.2 KB
|
27.4 Powerful backdoorrootkit found preinstalled on 3 million Android phones.html
|
0.2 KB
|
27.6 httpswww.theguardian.comtechnology2016feb09internet-of-things-smart-home-devices-government-surveillance-james-clapper.html
|
0.2 KB
|
27.7 httpsen.wikipedia.orgwikiOpen-source_hardware.html
|
0.1 KB
|
27.8 Summary of Attacks Against BIOS and Secure Boot and related CHIPSEC modules at DEFCON 22.html
|
0.1 KB
|
28. Firmware Rootkits – Seek and Destroy Part 2.mp4
|
9.3 MB
|
28. Firmware Rootkits – Seek and Destroy Part 2.vtt
|
4.6 KB
|
28.1 UEFI Innovations for Platform Security.html
|
0.1 KB
|
28.10 darwindumper.html
|
0.1 KB
|
28.2 US-13-Butterworth-BIOS-Security-Code.zip.html
|
0.1 KB
|
28.3 httpswww.virustotal.com.html
|
0.1 KB
|
28.4 httpsgithub.comchipsecchipsec.html
|
0.1 KB
|
28.5 Virustotal output example.html
|
0.2 KB
|
28.6 httpsgithub.comchipsecchipsecblobmasterchipsec-manual.pdf.html
|
0.1 KB
|
28.7 httpsflashrom.orgFlashrom.html
|
0.1 KB
|
28.8 httpspypi.python.orgpypiuefi_firmware.html
|
0.1 KB
|
28.9 Putting the spotlight on firmware malware.html
|
0.1 KB
|
29. End-Point-Protection Recovery and Remediation Technology.mp4
|
11.0 MB
|
29. End-Point-Protection Recovery and Remediation Technology.vtt
|
3.4 KB
|
29.1 httphorizondatasys.com.html
|
0.1 KB
|
29.2 httpwww.macrium.comreflectfree.aspx.html
|
0.1 KB
|
29.3 terabyteunlimited - Image for Windows & Linux.html
|
0.1 KB
|
29.4 httpsbombich.com - Carboncopy.html
|
0.1 KB
|
29.5 httpwww.runtime.orgdriveimage-xml.htm.html
|
0.1 KB
|
29.6 httpclonezilla.org.html
|
0.1 KB
|
29.7 Acronis True Image.html
|
0.1 KB
|
3. Windows - Farbar Recovery Scanner.mp4
|
39.9 MB
|
3. Windows - Farbar Recovery Scanner.vtt
|
11.4 KB
|
3.1 httpwww.geekstogo.comforumtopic335081-frst-tutorial-how-to-use-farbar-recovery-scan-tool.html
|
0.2 KB
|
3.2 farbar recovery scan tool.html
|
0.1 KB
|
30. Encrypted Backup and Cloud Storage.mp4
|
14.8 MB
|
30. Encrypted Backup and Cloud Storage.vtt
|
7.1 KB
|
30.1 httpsleastauthority.comproduct_s4.html
|
0.1 KB
|
30.10 How To Set Up a Tahoe-LAFS Distributed Filesystem on Ubuntu 14.04 Servers.html
|
0.1 KB
|
30.11 How To Host a File Sharing Server with Pydio on Ubuntu 14.04.html
|
0.2 KB
|
30.12 How To Install and Configure Seafile on an Ubuntu 12.04 VPS.html
|
0.2 KB
|
30.13 httpssyncthing.net.html
|
0.1 KB
|
30.14 httpswww.sparkleshare.org.html
|
0.1 KB
|
30.15 httpswww.seafile.comenhome.html
|
0.1 KB
|
30.16 httpswww.tahoe-lafs.orgtractahoe-lafs.html
|
0.1 KB
|
30.2 httpsowncloud.orgproviders.html
|
0.1 KB
|
30.3 httpspydio.com.html
|
0.1 KB
|
30.4 How To Use the ownCloud One-Click Install Application.html
|
0.2 KB
|
30.5 httpswww.syncany.org.html
|
0.1 KB
|
30.6 httpwww.drobostore.com.html
|
0.1 KB
|
30.7 httpswww.qnap.comen.html
|
0.1 KB
|
30.8 httpswww.turnkeylinux.orgowncloud.html
|
0.1 KB
|
30.9 httpswww.boxcryptor.comen.html
|
0.1 KB
|
4. Automated Malware Removal Tools.mp4
|
41.9 MB
|
4. Automated Malware Removal Tools.vtt
|
13.3 KB
|
4.1 Kaspersky.html
|
0.1 KB
|
4.10 httpbrew.sh.html
|
0.1 KB
|
4.11 httpwww.bleepingcomputer.comdownloadrkill.html
|
0.1 KB
|
4.2 superantispyware.html
|
0.1 KB
|
4.3 httpwww.bleepingcomputer.comdownloadwindowsanti-rootkit.html
|
0.1 KB
|
4.4 HitmanPro.html
|
0.1 KB
|
4.5 httpswww.microsoft.comen-ussecuritypc-securitymalware-removal.aspx.html
|
0.1 KB
|
4.6 Malwarebytes.html
|
0.1 KB
|
4.7 AdwCleaner.html
|
0.1 KB
|
4.8 httpschocolatey.org.html
|
0.1 KB
|
4.9 Roguekiller.html
|
0.1 KB
|
5. Live Rescue Operating Systems, CDs, and USBs.mp4
|
19.2 MB
|
5. Live Rescue Operating Systems, CDs, and USBs.vtt
|
8.2 KB
|
5.1 httpwww.technorms.com8098create-windows-7-live-cd.html
|
0.1 KB
|
5.10 Kaspersky Rescue Disk 10.html
|
0.1 KB
|
5.11 httpsdigital-forensics.sans.orgcommunitydownloads.html
|
0.1 KB
|
5.12 httpsrufus.akeo.ie.html
|
0.1 KB
|
5.13 httpwww.hirensbootcd.orgdownload.html
|
0.1 KB
|
5.14 httptrinityhome.orgHomeindex.phpcontent=TRINITY_RESCUE_KIT_DOWNLOAD.html
|
0.1 KB
|
5.15 Hitman pro kickstart.html
|
0.1 KB
|
5.16 httpsremnux.org.html
|
0.1 KB
|
5.2 httpsen.wikipedia.orgwikiWindows_To_Go.html
|
0.1 KB
|
5.3 httpgetintopc.comsoftwaresoperating-systemswindows-7-live-cd-free-download.html
|
0.1 KB
|
5.4 httpwindowsmatters.com20150110gandalfs-windows-7-pe-x86.html
|
0.1 KB
|
5.5 Ironkey w700.html
|
0.1 KB
|
5.6 httpwww.system-rescue-cd.orgDownload.html
|
0.1 KB
|
5.7 httpwww.pendrivelinux.comuniversal-usb-installer-easy-as-1-2-3.html
|
0.1 KB
|
5.8 httpsfalconfour.wordpress.comtagf4ubcd.html
|
0.1 KB
|
5.9 httpsunetbootin.github.io.html
|
0.1 KB
|
6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.mp4
|
60.6 MB
|
6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.vtt
|
3.4 KB
|
6.1 httpstechnet.microsoft.comen-ussysinternals.html
|
0.1 KB
|
6.2 httpstechnet.microsoft.comen-ussysinternalsprocessexplorer.html
|
0.1 KB
|
7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.mp4
|
49.0 MB
|
7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.vtt
|
10.6 KB
|
7.1 httpswhois.domaintools.com.html
|
0.1 KB
|
7.2 httpstechnet.microsoft.comen-ussysinternalsprocessexplorer.html
|
0.1 KB
|
8. Windows - Malware Seek & Destroy - Process Tools.mp4
|
9.2 MB
|
8. Windows - Malware Seek & Destroy - Process Tools.vtt
|
2.2 KB
|
8.1 httpprocesshacker.sourceforge.net.html
|
0.1 KB
|
8.2 httpsgithub.commandiantShimCacheParser.html
|
0.1 KB
|
8.3 httpwww.nirsoft.netutilsuserassist_view.html.html
|
0.1 KB
|
9. Windows - Malware Seek & Destroy - Sigcheck.mp4
|
4.8 MB
|
9. Windows - Malware Seek & Destroy - Sigcheck.vtt
|
2.9 KB
|
9.1 Sigcheck.html
|
0.1 KB
|
/9. Operating System and Application Hardening/
|
1. Goals and Learning Objectives.mp4
|
7.5 MB
|
1. Goals and Learning Objectives.vtt
|
0.9 KB
|
10. Security Focused Operating Systems.mp4
|
10.3 MB
|
10. Security Focused Operating Systems.vtt
|
5.8 KB
|
10.1 Whonix workstation and gateway. A focus on anonymity and preventing leaks out of the Tor network..html
|
0.1 KB
|
10.10 OpenBSD - Good general use OS with a security focus..html
|
0.1 KB
|
10.11 Mempo - Looks interesting but nothing happening.html
|
0.1 KB
|
10.12 Security-focused operating system From Wikipedia (Most are dead).html
|
0.1 KB
|
10.13 Trisquel OS.html
|
0.1 KB
|
10.14 Debian - Good general use OS with a security focus..html
|
0.1 KB
|
10.2 Tails - For security, privacy and anonymity. Protection from local forensics..html
|
0.1 KB
|
10.3 Qubes OS - Security through isolation and compartmentalization implemented using virtualization.html
|
0.1 KB
|
10.4 Whonix OS + Qubes OS - security through isolation and compartmentalization. Privacy and anonymity..html
|
0.1 KB
|
10.5 Subgraph OS - Security, privacy and anonymity..html
|
0.1 KB
|
10.6 Hardened Gentoo Linux - With grsecurity and PaX.html
|
0.1 KB
|
10.7 Parrot Security OS - Security GNULinux distribution designed with cloud pentesting and IoT security in mind..html
|
0.1 KB
|
10.8 Astra Linux - Russian Linux-based secure operating system.html
|
0.1 KB
|
10.9 Arch Linux - Good general use OS with a security focus..html
|
0.1 KB
|
11. Monitoring for Security Drift.mp4
|
2.7 MB
|
11. Monitoring for Security Drift.vtt
|
1.4 KB
|
2. An Introduction to Hardening.mp4
|
9.3 MB
|
2. An Introduction to Hardening.vtt
|
6.5 KB
|
3. Hardening Standards.mp4
|
43.5 MB
|
3. Hardening Standards.vtt
|
11.0 KB
|
3.1 httpsbenchmarks.cisecurity.orgdownloadsmultiform.html
|
0.1 KB
|
3.2 httpsbenchmarks.cisecurity.orgmembershipacademic-institutions.html
|
0.1 KB
|
3.3 CIS Benchmarks. - (Center For Internet Security).html
|
0.1 KB
|
3.4 The United States Government Configuration Baseline (USGCB).html
|
0.1 KB
|
3.5 httpsbenchmarks.cisecurity.orgdownloadsaudit-toolsdocumentsCIS-CATUsersGuide_000.pdf.html
|
0.2 KB
|
3.6 Defence Information Systems Agency - STIGs - Security Template Implementation guide..html
|
0.1 KB
|
3.7 STIG viewer.html
|
0.1 KB
|
4. OpenSCAP.mp4
|
32.8 MB
|
4. OpenSCAP.vtt
|
14.0 KB
|
4.1 httpcsrc.nist.govpublicationsPubsSPs.html.html
|
0.1 KB
|
4.10 httpsstatic.open-scap.orgopenscap-1.2oscap_user_manual.html#_how_to_evaluate_disa_stig.html
|
0.2 KB
|
4.2 httpswww.open-scap.orgfeaturesvulnerability-assessment.html
|
0.1 KB
|
4.3 httpswww.debian.orgsecurityoval.html
|
0.1 KB
|
4.4 httpsscap.nist.gov.html
|
0.1 KB
|
4.5 httpswww.open-scap.orgresourcesdocumentationcustomizing-scap-security-guide-for-your-use-case.html
|
0.2 KB
|
4.6 httpswww.open-scap.orgdownload.html
|
0.1 KB
|
4.7 httpswww.open-scap.org.html
|
0.1 KB
|
4.8 httpswww.open-scap.orgfeaturessecurity-compliance.html
|
0.1 KB
|
4.9 httpsoval.cisecurity.orgrepositorydownload.html
|
0.1 KB
|
5. Baseline Auditing.mp4
|
13.0 MB
|
5. Baseline Auditing.vtt
|
4.0 KB
|
5.1 httpswww.tenable.comproductsnessusnessus-professionalevaluate.html
|
0.1 KB
|
5.2 httpwww.openvas.orgabout.html.html
|
0.1 KB
|
5.3 httpswww.qualys.comformsfreescan.html
|
0.1 KB
|
5.4 httpslinux-audit.com.html
|
0.1 KB
|
5.5 httpscisofy.comlynis.html
|
0.1 KB
|
5.6 httpswww.tenable.comproductsnessus-home.html
|
0.1 KB
|
6. Windows - Hardening.mp4
|
9.8 MB
|
6. Windows - Hardening.vtt
|
2.1 KB
|
6.1 hardenwindows10forsecurity.com.html
|
0.1 KB
|
6.2 The United States Government Configuration Baseline (USGCB).html
|
0.1 KB
|
6.3 CIS Benchmarks. - (Center For Internet Security).html
|
0.1 KB
|
6.4 Defence Information Systems Agency - STIGs - Security Template Implementation guide..html
|
0.1 KB
|
6.5 hardenwindows7forsecurity.com.html
|
0.1 KB
|
6.6 hardenwindows8forsecurity.com.html
|
0.1 KB
|
7. Windows - Security Compliance Manager (SCM).mp4
|
47.1 MB
|
7. Windows - Security Compliance Manager (SCM).vtt
|
12.4 KB
|
7.1 httpsblogs.technet.microsoft.comsecguide.html
|
0.1 KB
|
7.2 Attack surface analyiser.html
|
0.1 KB
|
7.3 Microsoft Security Compliance Manager.html
|
0.1 KB
|
7.4 Microsoft Baseline Security Analyzer MBSA for windows.html
|
0.1 KB
|
7.5 LGPO.exe – Local Group Policy Object Utility.html
|
0.2 KB
|
7.6 Attack surface analyiser.html
|
0.2 KB
|
7.7 Policy Analyzer.html
|
0.1 KB
|
8. Mac – Hardening.mp4
|
3.7 MB
|
8. Mac – Hardening.vtt
|
2.0 KB
|
8.1 httpsobjective-see.comproductslockdown.html.html
|
0.1 KB
|
8.2 Defence Information Systems Agency - STIGs - Security Template Implementation guide for Mac.html
|
0.1 KB
|
8.3 httpwww.apple.comsupportsecurityguides.html
|
0.1 KB
|
8.4 CIS Benchmarks for Mac.html
|
0.2 KB
|
8.5 httpsobjective-see.comproductslockdown.html.html
|
0.1 KB
|
8.6 httpdocs.hardentheworld.orgOSindex.html.html
|
0.1 KB
|
9. Linux – Hardening.mp4
|
9.5 MB
|
9. Linux – Hardening.vtt
|
4.3 KB
|
9.1 httpselinuxproject.orgpageMain_Page.html
|
0.1 KB
|
9.10 CIS Benchmarks. - (Center For Internet Security).html
|
0.1 KB
|
9.2 httpswww.open-scap.orgsecurity-policiesscap-security-guide.html
|
0.1 KB
|
9.3 Compare Security Frameworks.html
|
0.1 KB
|
9.4 httpsen.wikipedia.orgwikiAppArmor.html
|
0.1 KB
|
9.5 httpswww.debian.orgdocmanualssecuring-debian-howto.html
|
0.1 KB
|
9.6 httpsgrsecurity.netfeatures.php.html
|
0.1 KB
|
9.7 The United States Government Configuration Baseline (USGCB).html
|
0.1 KB
|
9.8 httpskernsec.orgwikiindex.phpKernel_Self_Protection_Project.html
|
0.1 KB
|
9.9 Defence Information Systems Agency - STIGs - Security Template Implementation guide..html
|
0.1 KB
|
/
|
[Tutorialsplanet.NET].url
|
0.1 KB
|
Total files 1018
|