/01. Introduction/
|
5. Study Recommendations.mp4
|
66.7 MB
|
3. Goals and Learning Objectives - Volume 1.mp4
|
50.4 MB
|
2. Security Quick Win!.mp4
|
35.7 MB
|
7. Cyber Security and Ethical Hacking Careers.mp4
|
34.6 MB
|
4. Target Audience.mp4
|
29.9 MB
|
6. Course updates.mp4
|
14.7 MB
|
1. Welcome and Introduction to the Instructor!.mp4
|
14.0 MB
|
2. Security Quick Win!.vtt
|
19.0 KB
|
5. Study Recommendations.vtt
|
7.9 KB
|
7. Cyber Security and Ethical Hacking Careers.vtt
|
5.4 KB
|
4. Target Audience.vtt
|
3.3 KB
|
3. Goals and Learning Objectives - Volume 1.vtt
|
3.2 KB
|
1. Welcome and Introduction to the Instructor!.vtt
|
2.7 KB
|
6. Course updates.vtt
|
1.0 KB
|
1. LinkedIn-Join-my-network.txt
|
0.0 KB
|
1. Nathans-Cyber-Security-Blog.txt
|
0.0 KB
|
2. https-www.stationx.net-canarytokens-.txt
|
0.0 KB
|
1. Nathans-Twitter-GotoNathan.txt
|
0.0 KB
|
/02. know Yourself - The Threat and Vulnerability Landscape/
|
9. Confidentiality, Integrity and Availability - (Security Attributes).mp4
|
98.4 MB
|
7. Threat Modeling and Risk Assessments.mp4
|
64.0 MB
|
4. What is Privacy, Anonymity and Pseudonymity.mp4
|
44.7 MB
|
11. The Zero Trust Model.mp4
|
42.2 MB
|
5. Security, Vulnerabilities, Threats and Adversaries.mp4
|
37.5 MB
|
6. Asset Selection.mp4
|
26.3 MB
|
8. Security vs Privacy vs Anonymity - Can we have it all.mp4
|
17.0 MB
|
3. Protect What You Value.mp4
|
14.6 MB
|
10. Defense In Depth.mp4
|
6.3 MB
|
1. Theory and Practical.mp4
|
3.6 MB
|
2. Goals and Learning Objectives.mp4
|
1.9 MB
|
5. The Cyber Security Landscape Diagram.jpg
|
795.8 KB
|
9. Confidentiality, Integrity and Availability - (Security Attributes).vtt
|
12.8 KB
|
7. Threat Modeling and Risk Assessments.vtt
|
11.8 KB
|
4. What is Privacy, Anonymity and Pseudonymity.vtt
|
6.2 KB
|
3. Protect What You Value.vtt
|
6.2 KB
|
5. Security, Vulnerabilities, Threats and Adversaries.vtt
|
5.7 KB
|
11. The Zero Trust Model.vtt
|
5.2 KB
|
6. Asset Selection.vtt
|
4.5 KB
|
8. Security vs Privacy vs Anonymity - Can we have it all.vtt
|
3.0 KB
|
10. Defense In Depth.vtt
|
2.0 KB
|
1. Theory and Practical.vtt
|
1.7 KB
|
2. Goals and Learning Objectives.vtt
|
0.9 KB
|
9. http-whatis.techtarget.com-definition-Confidentiality-integrity-and-availability-CIA.txt
|
0.1 KB
|
9. https-en.wikipedia.org-wiki-Non-repudiation.txt
|
0.0 KB
|
9. https-en.wikipedia.org-wiki-Parkerian-Hexad.txt
|
0.0 KB
|
9. https-en.wikipedia.org-wiki-Authentication.txt
|
0.0 KB
|
9. https-en.wikipedia.org-wiki-Authorization.txt
|
0.0 KB
|
6. https-www.iso.org-standard-56742.html.txt
|
0.0 KB
|
9. https-www.stationx.net-sabsa-.txt
|
0.0 KB
|
6. https-www.stationx.net-sabsa-.txt
|
0.0 KB
|
6. https-www.securityforum.org-.txt
|
0.0 KB
|
/03. Know Your Enemy - The Current Threat and Vulnerability Landscape/
|
15. Regulating encryption, mandating insecurity & legalizing spying.mp4
|
211.6 MB
|
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4
|
117.5 MB
|
12. Darknets, Dark Markets and Exploit kits.mp4
|
115.9 MB
|
8. What is Phishing, Vishing and SMShing.mp4
|
102.3 MB
|
16. Trust & Backdoors.mp4
|
101.5 MB
|
13. Governments, spies and secret stuff part I.mp4
|
94.8 MB
|
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4
|
93.1 MB
|
14. Governments, spies and secret stuff part II.mp4
|
73.2 MB
|
10. Social engineering - Scams, cons, tricks and fraud.mp4
|
67.4 MB
|
2. Why You Need Security – The Value Of A Hack.mp4
|
64.6 MB
|
6. Malware, viruses, rootkits and RATs.mp4
|
41.2 MB
|
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4
|
39.4 MB
|
5. Hackers, crackers and cyber criminals.mp4
|
33.4 MB
|
17. Censorship.mp4
|
32.3 MB
|
9. Spamming & Doxing.mp4
|
19.7 MB
|
18. Cyber Threat Intelligence – Stay Informed.mp4
|
12.5 MB
|
3. The Top 3 Things You Need To Stay Safe Online.mp4
|
6.9 MB
|
1. Goals and Learning Objectives.mp4
|
2.9 MB
|
15. Regulating encryption, mandating insecurity & legalizing spying.vtt
|
19.8 KB
|
8. What is Phishing, Vishing and SMShing.vtt
|
18.4 KB
|
16. Trust & Backdoors.vtt
|
13.9 KB
|
14. Governments, spies and secret stuff part II.vtt
|
13.5 KB
|
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.vtt
|
13.4 KB
|
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.vtt
|
12.2 KB
|
12. Darknets, Dark Markets and Exploit kits.vtt
|
10.5 KB
|
6. Malware, viruses, rootkits and RATs.vtt
|
9.3 KB
|
2. Why You Need Security – The Value Of A Hack.vtt
|
7.5 KB
|
10. Social engineering - Scams, cons, tricks and fraud.vtt
|
7.5 KB
|
13. Governments, spies and secret stuff part I.vtt
|
7.3 KB
|
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.vtt
|
6.5 KB
|
9. Spamming & Doxing.vtt
|
4.4 KB
|
5. Hackers, crackers and cyber criminals.vtt
|
3.7 KB
|
17. Censorship.vtt
|
3.4 KB
|
3. The Top 3 Things You Need To Stay Safe Online.vtt
|
1.8 KB
|
18. Cyber Threat Intelligence – Stay Informed.vtt
|
1.3 KB
|
1. Goals and Learning Objectives.vtt
|
1.1 KB
|
15. NSA-Admits-It-Collects-Too-MUCH-Info-to-Stop-Terror-Attacks.txt
|
0.1 KB
|
7. http-www.slate.com-articles-technology-bitwise-2015-02-lenovo-superfish-scandal-why-it-s-one-of-the-worst-consumer-computing-screw.html.txt
|
0.1 KB
|
7. http-www.telegraph.co.uk-news-worldnews-northamerica-usa-11416985-Millions-of-computers-may-be-compromised-by-US-spyware-report.html.txt
|
0.1 KB
|
15. https-www.csoonline.com-article-3213033-security-nsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.txt
|
0.1 KB
|
15. Clipper-chip.txt
|
0.1 KB
|
15. Kazakhstans-new-encryption-law.txt
|
0.1 KB
|
11. https-arstechnica.com-information-technology-2018-01-now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners-.txt
|
0.1 KB
|
17. http-searchenginewatch.com-sew-news-2351154-google-censorship-ruling-in-canada-has-worldwide-implications.txt
|
0.1 KB
|
16. Apple-removes-malware-infected-apps-from-the-app-store.txt
|
0.1 KB
|
6. SophosLabs-2018-Malware-Forecast.txt
|
0.1 KB
|
15. MATT-BLAZE-DECIPHERING-THE-DEBATE-OVER-ENCRYPTION.txt
|
0.1 KB
|
7. https-securelist.com-analysis-quarterly-malware-reports-72493-it-threat-evolution-in-q3-2015-.txt
|
0.1 KB
|
16. https-blog.torproject.org-blog-deterministic-builds-part-one-cyberwar-and-global-compromise.txt
|
0.1 KB
|
15. A-Worldwide-Survey-of-E-ncryption-Products-xls.txt
|
0.1 KB
|
11. https-www.engadget.com-2018-02-13-attackers-telegram-deliver-cryptocurrency-mining-malware-.txt
|
0.1 KB
|
15. A-Worldwide-Survey-of-Encryption-Products-pdf.txt
|
0.1 KB
|
15. Report-Keys-Under-Doormats-Mandating-insecurity-by-requiring-government-access-to-all-data-and-communication.txt
|
0.1 KB
|
6. 7-most-common-RATs.txt
|
0.1 KB
|
11. https-torrentfreak.com-pirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011-.txt
|
0.1 KB
|
16. Video-on-how-to-build-your-own-software-reproducibly.txt
|
0.1 KB
|
9. Spam-example.txt
|
0.1 KB
|
6. Report-Spotlight-perils-of-malvertisements.txt
|
0.1 KB
|
2. http-krebsonsecurity.com-2012-10-the-scrap-value-of-a-hacked-pc-revisited-.txt
|
0.1 KB
|
15. http-cis-india.org-internet-governance-blog-how-india-regulates-encryption.txt
|
0.1 KB
|
8. XSS-example-vulnerability.txt
|
0.1 KB
|
11. http-bgr.com-2018-02-13-android-malware-mining-cryptocurrency-monero-xmr-.txt
|
0.1 KB
|
7. http-www.mcafee.com-us-resources-reports-rp-quarterly-threat-q4-2014.pdf.txt
|
0.1 KB
|
8. Homograph-attack-using-internationalized-domain-name.txt
|
0.1 KB
|
16. http-blog.cryptographyengineering.com-2015-12-on-juniper-backdoor.html.txt
|
0.1 KB
|
17. https-www.google.com-transparencyreport-removals-europeprivacy-hl-en.txt
|
0.1 KB
|
2. http-krebsonsecurity.com-2013-06-the-value-of-a-hacked-email-account-.txt
|
0.1 KB
|
17. https-www.google.com-transparencyreport-removals-government-hl-en.txt
|
0.1 KB
|
11. Cryptocurrency-Mining-Malware-Infected-Over-Half-Million-PCs-Using-an-NSA-Exploit.txt
|
0.1 KB
|
10. Top-10-scams.txt
|
0.1 KB
|
16. Examples-of-backdoors.txt
|
0.1 KB
|
11. https-addons.mozilla.org-en-US-firefox-addon-ublock-origin-.txt
|
0.1 KB
|
15. UK-data-communications-bill.txt
|
0.1 KB
|
12. https-www.deepdotweb.com-dark-net-market-comparison-chart-.txt
|
0.1 KB
|
11. https-thehackernews.com-2018-02-cryptojacking-malware.html.txt
|
0.1 KB
|
11. https-addons.mozilla.org-en-GB-firefox-addon-no-coin-.txt
|
0.1 KB
|
16. Apple-backdoor-order.txt
|
0.1 KB
|
15. WhatsApp-was-Banned-for-48-Hours-in-Brazil.txt
|
0.1 KB
|
15. The-Case-against-Regulating-Encryption-Technology.txt
|
0.1 KB
|
11. https-github.com-hoshsadiq-adblock-nocoin-list-.txt
|
0.0 KB
|
10. http-www.actionfraud.police.uk-types-of-fraud.txt
|
0.0 KB
|
14. https-cryptome.org-2014-01-nsa-codenames.htm.txt
|
0.0 KB
|
15. Matt-Blaze-Speaking-to-a-US-congressional-committee.txt
|
0.0 KB
|
6. Malware-stats.txt
|
0.0 KB
|
3. https-research.google.com-pubs-pub43963.html.txt
|
0.0 KB
|
6. Chef-Jamie-Oliver-s-website-hacked-for-the-third-time.txt
|
0.0 KB
|
16. Formal-methods.txt
|
0.0 KB
|
9. Spam-stats.txt
|
0.0 KB
|
14. Through-a-PRISM-Darkly-Everything-we-know-about-NSA-spying-30c3-.txt
|
0.0 KB
|
14. https-nsa.gov1.info-dni-nsa-ant-catalog-.txt
|
0.0 KB
|
4. Exploit-Kit-Landscape-Map.txt
|
0.0 KB
|
10. http-www.consumerfraudreporting.org.txt
|
0.0 KB
|
14. https-wikileaks.org-Leaks.html.txt
|
0.0 KB
|
4. https-www.exploit-db.com-search-.txt
|
0.0 KB
|
16. https-reproducible-builds.org-.txt
|
0.0 KB
|
18. http-www.stationx.net-alerts.txt
|
0.0 KB
|
4. CVE-details.txt
|
0.0 KB
|
8. Live-phishing-links.txt
|
0.0 KB
|
14. http-www.nsaplayset.org-.txt
|
0.0 KB
|
14. https-theintercept.com-.txt
|
0.0 KB
|
11. https-coinhive.com-.txt
|
0.0 KB
|
/04. Encryption Crash Course/
|
10. Certificate Authorities and HTTPS.mp4
|
145.5 MB
|
6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4
|
124.9 MB
|
2. Symmetric Encryption.mp4
|
95.3 MB
|
12. Steganography.mp4
|
83.7 MB
|
7. SSL Stripping.mp4
|
69.2 MB
|
8. HTTPS (HTTP Secure).mp4
|
58.4 MB
|
4. Hash Functions.mp4
|
49.7 MB
|
3. Asymmetric Encryption.mp4
|
40.5 MB
|
9. Digital Certificates.mp4
|
32.3 MB
|
5. Digital Signatures.mp4
|
29.6 MB
|
13. How Security and Encryption is Really Attacked.mp4
|
12.2 MB
|
11. End-to-End Encryption (E2EE).mp4
|
3.5 MB
|
1. Goals and Learning Objectives.mp4
|
1.1 MB
|
10. Certificate Authorities and HTTPS.vtt
|
20.5 KB
|
6. Secure Sockets Layer (SSL) and Transport layer security (TLS).vtt
|
17.6 KB
|
7. SSL Stripping.vtt
|
16.7 KB
|
3. Asymmetric Encryption.vtt
|
14.2 KB
|
2. Symmetric Encryption.vtt
|
12.7 KB
|
12. Steganography.vtt
|
10.9 KB
|
8. HTTPS (HTTP Secure).vtt
|
8.7 KB
|
9. Digital Certificates.vtt
|
7.7 KB
|
4. Hash Functions.vtt
|
7.6 KB
|
5. Digital Signatures.vtt
|
6.2 KB
|
13. How Security and Encryption is Really Attacked.vtt
|
3.8 KB
|
11. End-to-End Encryption (E2EE).vtt
|
2.7 KB
|
1. Goals and Learning Objectives.vtt
|
0.6 KB
|
10. CA-example-mistake.txt
|
0.1 KB
|
5. Windows-10-Device-Guard-using-Digital-Signatures.txt
|
0.1 KB
|
13. Security-Pitfalls.txt
|
0.1 KB
|
10. Certificate-patrol.txt
|
0.1 KB
|
7. Intro-to-Sniffers.txt
|
0.1 KB
|
7. Arpwatch-Tool-to-Monitor-Ethernet-Activity-in-Linux.txt
|
0.1 KB
|
6. Steve-Gibsons-Cipher-Suite-Recommendations.txt
|
0.1 KB
|
12. OpenPuff.txt
|
0.1 KB
|
6. Wikipedia-Transport-Layer-Security-TLS-page.txt
|
0.1 KB
|
8. Server-Name-Indication-SNI-Wiki.txt
|
0.1 KB
|
6. Mozilla-Cipher-Suite-Recommendations.txt
|
0.0 KB
|
7. SSL-Strip-tool-By-Moxie-Marlinspike.txt
|
0.0 KB
|
12. OpenPuff-Manual.txt
|
0.0 KB
|
5. https-www.symantec.com-en-uk-code-signing-.txt
|
0.0 KB
|
10. SSL-Sniff.txt
|
0.0 KB
|
10. CA-Ecosystem.txt
|
0.0 KB
|
12. List-of-Steg-Tools.txt
|
0.0 KB
|
4. Example-hashes.txt
|
0.0 KB
|
10. Cert-Fingerprints.txt
|
0.0 KB
|
6. Weakdh-Cipher-Suite-Recommendations.txt
|
0.0 KB
|
7. sniffdet-Remote-Sniffer-Detection-Tool-Library.txt
|
0.0 KB
|
7. WIFI-Pineapple.txt
|
0.0 KB
|
7. Cain-Abel.txt
|
0.0 KB
|
12. http-www.spammimic.com.txt
|
0.0 KB
|
/05. Setting up a Testing Environment Using Virtual Machines (Lab)/
|
4. Virtual box.mp4
|
102.6 MB
|
2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4
|
91.8 MB
|
3. Vmware.mp4
|
77.4 MB
|
5. Kali Linux 2018.mp4
|
43.1 MB
|
1. Goals and Learning Objectives.mp4
|
1.3 MB
|
4. Virtual box.vtt
|
13.7 KB
|
3. Vmware.vtt
|
13.5 KB
|
2. Introduction to Setting up a Testing Environment Using Virtual Machines.vtt
|
13.5 KB
|
5. Kali Linux 2018.vtt
|
6.2 KB
|
1. Goals and Learning Objectives.vtt
|
0.7 KB
|
2. Vmware-Network-Adapter-Settings.txt
|
0.1 KB
|
5. Kali-images-for-Virtualbox-or-VMware.txt
|
0.1 KB
|
2. https-en.wikipedia.org-wiki-Comparison-of-platform-virtualization-software.txt
|
0.1 KB
|
2. Windows-VMs-here.txt
|
0.1 KB
|
5. Kali-on-Microsoft-App-Store-as-an-official-WSL.txt
|
0.1 KB
|
5. Kali-Arm-hardware.txt
|
0.1 KB
|
3. http-www.vmware.com-products-workstation-compare.html.txt
|
0.1 KB
|
3. http-www.vmware.com-products-player-faqs-faqs.html.txt
|
0.1 KB
|
5. Kali-AWS-appliance.txt
|
0.0 KB
|
2. Virtualbox-Network-Adapter-Settings.txt
|
0.0 KB
|
2. http-www.osboxes.org-virtualbox-images-.txt
|
0.0 KB
|
2. https-en.wikipedia.org-wiki-Hypervisor.txt
|
0.0 KB
|
2. http-www.osboxes.org-vmware-images-.txt
|
0.0 KB
|
2. https-marketplace.vmware.com-.txt
|
0.0 KB
|
2. http-www.osboxes.org-guide-.txt
|
0.0 KB
|
5. Kali-iso-here-if-you-want-to-install-on-a-computers-hard-disk-or-live-boot-it.txt
|
0.0 KB
|
2. http-virtualboxes.org-images-.txt
|
0.0 KB
|
2. http-virtual-machine.org-.txt
|
0.0 KB
|
4. https-www.virtualbox.org-.txt
|
0.0 KB
|
/06. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/
|
11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4
|
89.5 MB
|
7. Windows 10 - Tool Disable Windows 10 Tracking.mp4
|
76.9 MB
|
5. Windows 10 - Privacy & Tracking.mp4
|
67.4 MB
|
9. Windows 10 – Privacy Settings.mp4
|
64.7 MB
|
20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4
|
57.7 MB
|
3. Security Bugs and Vulnerabilities.mp4
|
47.3 MB
|
6. Windows 10 - Disable tracking automatically.mp4
|
44.7 MB
|
14. General Use Operating Systems (Windows, MacOS and Linux).mp4
|
37.9 MB
|
12. Mac - Privacy & Tracking.mp4
|
37.1 MB
|
10. Windows 10 - WiFi Sense.mp4
|
33.8 MB
|
16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).mp4
|
31.0 MB
|
13. Linux and Unix “like” Operating systems.mp4
|
30.0 MB
|
19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).mp4
|
27.2 MB
|
8. Windows 10 – Cortana.mp4
|
23.1 MB
|
2. Security Features and Functionality.mp4
|
19.9 MB
|
15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).mp4
|
17.0 MB
|
4. Usage Share.mp4
|
15.4 MB
|
17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4
|
8.9 MB
|
18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4
|
7.8 MB
|
1. Goals and Learning Objectives.mp4
|
1.7 MB
|
9. Windows 10 – Privacy Settings.vtt
|
11.9 KB
|
11. Windows 7, 8 and 8.1 - Privacy & Tracking.vtt
|
9.4 KB
|
7. Windows 10 - Tool Disable Windows 10 Tracking.vtt
|
9.4 KB
|
5. Windows 10 - Privacy & Tracking.vtt
|
8.6 KB
|
2. Security Features and Functionality.vtt
|
8.4 KB
|
3. Security Bugs and Vulnerabilities.vtt
|
7.5 KB
|
15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).vtt
|
7.5 KB
|
6. Windows 10 - Disable tracking automatically.vtt
|
7.1 KB
|
20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.vtt
|
6.9 KB
|
4. Usage Share.vtt
|
6.7 KB
|
12. Mac - Privacy & Tracking.vtt
|
6.3 KB
|
14. General Use Operating Systems (Windows, MacOS and Linux).vtt
|
6.3 KB
|
10. Windows 10 - WiFi Sense.vtt
|
5.9 KB
|
8. Windows 10 – Cortana.vtt
|
4.8 KB
|
13. Linux and Unix “like” Operating systems.vtt
|
4.7 KB
|
17. Anonymity Focused Operating Systems (Tails and Whonix OS).vtt
|
4.5 KB
|
16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).vtt
|
4.3 KB
|
19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).vtt
|
3.8 KB
|
18. Penetration Testing and Ethical Hacking Focused Operating Systems.vtt
|
1.3 KB
|
1. Goals and Learning Objectives.vtt
|
0.9 KB
|
12. Washingtonpost-How-apples-os-x-yosemite-tracks-you.txt
|
0.2 KB
|
10. https-blogs.windows.com-windowsexperience-2016-05-10-announcing-windows-10-insider-preview-build-14342-31Zq2yELkheC9HyV.99.txt
|
0.1 KB
|
5. With-Windows-10-Microsoft-Blatantly-Disregards-User-Choice-and-Privacy-A-Deep-Dive.txt
|
0.1 KB
|
3. Report-Buying-Into-the-Bias-Why-Vulnerability-Statistics-Suck.txt
|
0.1 KB
|
11. http-www.zdnet.com-article-how-to-block-windows-10-upgrades-on-your-business-network-and-at-home-too-.txt
|
0.1 KB
|
8. How-to-disable-cortana-on-Windows-10.txt
|
0.1 KB
|
9. SmartScreen-Filter-FAQ.txt
|
0.1 KB
|
9. Complete-guide-windows-10-privacy-settings.txt
|
0.1 KB
|
8. How-to-Disable-Cortana-in-Windows-10-s-Anniversary-Update.txt
|
0.1 KB
|
8. Cortana-privacy-faq.txt
|
0.1 KB
|
5. Cortana-privacy-faq.txt
|
0.1 KB
|
4. OS-usage-share.txt
|
0.1 KB
|
5. Microsoft-Service-Agreement.txt
|
0.1 KB
|
6. https-github.com-10se1ucgo-DisableWinTracking-releases.txt
|
0.1 KB
|
3. Top-50-products-vs-security-bugs.txt
|
0.1 KB
|
5. Microsoft-Privacy-Statement.txt
|
0.1 KB
|
12. https-github.com-fix-macosx-yosemite-phone-home.txt
|
0.0 KB
|
12. https-github.com-karek314-macOS-home-call-drop.txt
|
0.0 KB
|
11. Microsoft-How-to-manage-Windows-10-notification-and-upgrade-options.txt
|
0.0 KB
|
16. Hardened-Gentoo-Linux-https-wiki.gentoo.org-wiki-Project-Hardened.txt
|
0.0 KB
|
7. https-github.com-bitlog2-DisableWinTracking.txt
|
0.0 KB
|
12. https-github.com-fix-macosx-net-monitor.txt
|
0.0 KB
|
11. GWX-Control-Panel.txt
|
0.0 KB
|
16. Security-Enhanced-Linux-SELinux-https-github.com-SELinuxProject.txt
|
0.0 KB
|
19. iOS-https-developer.apple.com-ios-.txt
|
0.0 KB
|
20. Free-Debian-Books-and-Guides.txt
|
0.0 KB
|
20. Download-Debian.txt
|
0.0 KB
|
20. Debian-Live-CD-DVD.txt
|
0.0 KB
|
11. Never-10-by-Steve-Gibson-Use-this-.txt
|
0.0 KB
|
19. PureOS-Librem-5-https-puri.sm-shop-librem-5-.txt
|
0.0 KB
|
18. Parrot-GNU-Linux-https-www.parrotsec.org-.txt
|
0.0 KB
|
16. Subgraph-OS-https-subgraph.com-sgos-.txt
|
0.0 KB
|
15. Archlinux-https-www.archlinux.org-.txt
|
0.0 KB
|
13. https-www.archlinux.org-.txt
|
0.0 KB
|
16. Qubes-OS-https-www.qubes-os.org-.txt
|
0.0 KB
|
19. Replicant-Https-www.replicant.us-.txt
|
0.0 KB
|
17. Qubes-OS-https-www.qubes-os.org-.txt
|
0.0 KB
|
19. Android-https-www.android.com-.txt
|
0.0 KB
|
15. OpenBSD-https-www.openbsd.org-.txt
|
0.0 KB
|
19. OmniROM-https-www.omnirom.org-.txt
|
0.0 KB
|
13. https-www.openbsd.org-.txt
|
0.0 KB
|
12. Fix-Mac-OS-X.txt
|
0.0 KB
|
13. http-distrowatch.com-.txt
|
0.0 KB
|
15. Debian-https-www.debian.org-.txt
|
0.0 KB
|
13. https-www.debian.org-.txt
|
0.0 KB
|
17. Whonix-https-www.whonix.org-.txt
|
0.0 KB
|
14. Ubuntu-https-www.ubuntu.com-.txt
|
0.0 KB
|
16. PureOS-https-www.pureos.net-.txt
|
0.0 KB
|
17. Tails-OS-https-tails.boum.org-.txt
|
0.0 KB
|
18. Pentoo-https-www.pentoo.ch-.txt
|
0.0 KB
|
16. Trisquel-OS-https-trisquel.info-.txt
|
0.0 KB
|
14. Linux-Mint-https-linuxmint.com-.txt
|
0.0 KB
|
19. LineageOS-https-lineageos.org-.txt
|
0.0 KB
|
18. BlackArch-Linux-https-blackarch.org-.txt
|
0.0 KB
|
18. Kali-Linux-https-www.kali.org-.txt
|
0.0 KB
|
16. Astra-Linux-http-astralinux.ru-.txt
|
0.0 KB
|
18. BackBox-Linux-https-backbox.org-.txt
|
0.0 KB
|
14. Manjaro-https-manjaro.org-.txt
|
0.0 KB
|
19. MicroG-https-microg.org-.txt
|
0.0 KB
|
/07. Security Bugs and Vulnerabilities/
|
8. Linux - Debian - Patching.mp4
|
85.3 MB
|
7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4
|
59.7 MB
|
6. Windows - Criticality and Patch Tuesday.mp4
|
50.9 MB
|
9. Mac - Patching.mp4
|
49.7 MB
|
10. Firefox - Browser and extension updates.mp4
|
45.3 MB
|
2. The Importance of Patching.mp4
|
20.7 MB
|
12. IE and Edge - Browser and extention updates.mp4
|
6.3 MB
|
13. Auto updates - The Impact to privacy and anonymity.mp4
|
5.9 MB
|
5. Windows 10 - Auto Update.mp4
|
4.4 MB
|
3. Windows 7 - Auto Update.mp4
|
4.1 MB
|
4. Windows 8 & 8.1 - Auto Update.mp4
|
4.1 MB
|
11. Chrome - Browser and extension updates.mp4
|
3.4 MB
|
1. Goals and Learning Objectives.mp4
|
1.1 MB
|
8. Linux - Debian - Patching.vtt
|
15.6 KB
|
7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.vtt
|
11.2 KB
|
9. Mac - Patching.vtt
|
9.4 KB
|
10. Firefox - Browser and extension updates.vtt
|
6.1 KB
|
2. The Importance of Patching.vtt
|
6.0 KB
|
6. Windows - Criticality and Patch Tuesday.vtt
|
4.2 KB
|
13. Auto updates - The Impact to privacy and anonymity.vtt
|
2.7 KB
|
4. Windows 8 & 8.1 - Auto Update.vtt
|
1.9 KB
|
11. Chrome - Browser and extension updates.vtt
|
1.8 KB
|
5. Windows 10 - Auto Update.vtt
|
1.8 KB
|
3. Windows 7 - Auto Update.vtt
|
1.7 KB
|
12. IE and Edge - Browser and extention updates.vtt
|
1.0 KB
|
1. Goals and Learning Objectives.vtt
|
0.6 KB
|
6. Patch-Tuesday-may-be-dead-but-Microsofts-not-confessing-to-the-crime.txt
|
0.1 KB
|
6. Windows-10-Ditches-Patch-Tuesday-for-Securitys-Sake.txt
|
0.1 KB
|
7. Flexera-Personal-Software-Inspector-Previously-Secunia-PSI.txt
|
0.1 KB
|
9. igeekblogs-How-to-enable-updates.txt
|
0.1 KB
|
8. Automatic-Security-Updates.txt
|
0.1 KB
|
6. Microsoft-Security-Bulletins.txt
|
0.1 KB
|
8. Software-distributions-based-on-Debian.txt
|
0.0 KB
|
9. Apple-security-updates.txt
|
0.0 KB
|
8. Debian-Security-Page.txt
|
0.0 KB
|
9. Mac-Update.txt
|
0.0 KB
|
6. Common-Vulnerabilities-and-Exposures.txt
|
0.0 KB
|
6. National-vulnerability-database.txt
|
0.0 KB
|
9. http-brew.sh-.txt
|
0.0 KB
|
/08. Reducing Threat Privilege/
|
1. Goals and Learning Objectives - Removing Privilege.mp4
|
32.6 MB
|
3. Windows 8 and 8.1 - Not using admin.mp4
|
17.9 MB
|
2. Windows 7 - Not using admin.mp4
|
15.1 MB
|
4. Windows 10 - Not using admin.mp4
|
10.7 MB
|
3. Windows 8 and 8.1 - Not using admin.vtt
|
5.7 KB
|
2. Windows 7 - Not using admin.vtt
|
5.1 KB
|
4. Windows 10 - Not using admin.vtt
|
4.7 KB
|
1. Goals and Learning Objectives - Removing Privilege.vtt
|
3.8 KB
|
/09. Social Engineering and Social Media Offence and Defence/
|
2. Information Disclosure and Identity Strategies for Social Media.mp4
|
117.9 MB
|
5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4
|
63.0 MB
|
3. Identify Verification and Registration.mp4
|
36.9 MB
|
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4
|
23.2 MB
|
6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp4
|
20.0 MB
|
1. Goals and Learning Objectives.mp4
|
1.7 MB
|
2. Information Disclosure and Identity Strategies for Social Media.vtt
|
23.0 KB
|
5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.vtt
|
18.2 KB
|
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.vtt
|
13.3 KB
|
3. Identify Verification and Registration.vtt
|
8.6 KB
|
6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).vtt
|
8.5 KB
|
1. Goals and Learning Objectives.vtt
|
0.6 KB
|
2. http-www.telegraph.co.uk-technology-social-media-9780565-Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html.txt
|
0.1 KB
|
2. The-complete-guide-to-facebook-privacy-settings.txt
|
0.1 KB
|
3. Top-10-sites-receive-sms-online-without-phone.txt
|
0.1 KB
|
2. List-of-Personally-Identifiable-Information-PII-.txt
|
0.1 KB
|
2. https-www.eff.org-who-has-your-back-government-data-requests-2015.txt
|
0.1 KB
|
6. http-www.consumerfraudreporting.org-credit-freeze-summary.php.txt
|
0.1 KB
|
5. https-www.virustotal.com-en-documentation-email-submissions-.txt
|
0.1 KB
|
2. Twitter-Privacy-Settings.txt
|
0.1 KB
|
5. How-to-Get-Email-Headers.txt
|
0.1 KB
|
6. http-www.actionfraud.police.uk-types-of-fraud.txt
|
0.0 KB
|
3. http-10minutemail.com-10MinuteMail-index.html.txt
|
0.0 KB
|
5. https-whois.domaintools.com-bbc.co.uk.txt
|
0.0 KB
|
5. https-whois.domaintools.com-blob.com.txt
|
0.0 KB
|
3. Example-SMS-recieve-online-site.txt
|
0.0 KB
|
4. http-www.google.com.stationx.net.txt
|
0.0 KB
|
3. https-www.guerrillamail.com-.txt
|
0.0 KB
|
2. https-diasporafoundation.org-.txt
|
0.0 KB
|
3. https-www.trash-mail.com-en-.txt
|
0.0 KB
|
6. http-www.scambusters.org-.txt
|
0.0 KB
|
3. http-www.mytrashmail.com-.txt
|
0.0 KB
|
3. http-www.dispostable.com-.txt
|
0.0 KB
|
2. https-gnu.io-social-try-.txt
|
0.0 KB
|
5. https-www.parsemail.org-.txt
|
0.0 KB
|
3. http-www.mailexpire.com-.txt
|
0.0 KB
|
3. http-www.tempinbox.com.txt
|
0.0 KB
|
3. https-mailinator.com-.txt
|
0.0 KB
|
4. http-www.urlvoid.com-.txt
|
0.0 KB
|
3. http-www.migmail.net-.txt
|
0.0 KB
|
3. http-getairmail.com-.txt
|
0.0 KB
|
3. http-crapmail.dk-en-.txt
|
0.0 KB
|
2. http-friendica.com-.txt
|
0.0 KB
|
3. http-dontmail.net-.txt
|
0.0 KB
|
3. http-bugmenot.com-.txt
|
0.0 KB
|
3. https-anonbox.net-.txt
|
0.0 KB
|
3. http-freemail.ms-.txt
|
0.0 KB
|
2. https-tosdr.org-.txt
|
0.0 KB
|
/10. Security Domains/
|
2. Security Domains.mp4
|
27.6 MB
|
1. Goals and Learning Objectives.mp4
|
957.2 KB
|
2. Security Domains.vtt
|
15.5 KB
|
1. Goals and Learning Objectives.vtt
|
0.5 KB
|
/11. Security Through Isolation and Compartmentalization/
|
15. Whonix OS - Anonymous Operating system.mp4
|
170.6 MB
|
17. Qubes OS.mp4
|
128.9 MB
|
4. Physical and Hardware Isolation - Hardware Serials.mp4
|
90.7 MB
|
12. Virtual Machines.mp4
|
88.3 MB
|
9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4
|
80.9 MB
|
14. Virtual Machine Hardening.mp4
|
71.4 MB
|
13. Virtual Machine Weaknesses.mp4
|
56.3 MB
|
16. Whonix OS - Weaknesses.mp4
|
46.1 MB
|
3. Physical and Hardware Isolation - How to change the Mac Address.mp4
|
41.4 MB
|
8. Windows - Sandboxes and Application Isolation.mp4
|
40.1 MB
|
18. Security Domains, Isolation and Compartmentalization.mp4
|
35.0 MB
|
11. Mac - Sandboxes and Application Isolation.mp4
|
32.6 MB
|
5. Virtual Isolation.mp4
|
30.6 MB
|
10. Linux - Sandboxes and Application Isolation.mp4
|
24.9 MB
|
7. Built-in Sandboxes and Application Isolation.mp4
|
18.7 MB
|
6. Dual Boot.mp4
|
10.5 MB
|
2. Introduction to Isolation and Compartmentalization.mp4
|
6.1 MB
|
1. Goals and Learning Objectives.mp4
|
1.7 MB
|
15. Whonix OS - Anonymous Operating system.vtt
|
28.2 KB
|
17. Qubes OS.vtt
|
27.0 KB
|
12. Virtual Machines.vtt
|
17.5 KB
|
4. Physical and Hardware Isolation - Hardware Serials.vtt
|
16.3 KB
|
9. Windows - Sandboxes and Application Isolation - Sandboxie.vtt
|
15.6 KB
|
13. Virtual Machine Weaknesses.vtt
|
15.3 KB
|
14. Virtual Machine Hardening.vtt
|
13.4 KB
|
5. Virtual Isolation.vtt
|
13.1 KB
|
3. Physical and Hardware Isolation - How to change the Mac Address.vtt
|
10.1 KB
|
8. Windows - Sandboxes and Application Isolation.vtt
|
9.0 KB
|
11. Mac - Sandboxes and Application Isolation.vtt
|
7.7 KB
|
18. Security Domains, Isolation and Compartmentalization.vtt
|
6.7 KB
|
16. Whonix OS - Weaknesses.vtt
|
6.4 KB
|
7. Built-in Sandboxes and Application Isolation.vtt
|
4.5 KB
|
6. Dual Boot.vtt
|
4.5 KB
|
10. Linux - Sandboxes and Application Isolation.vtt
|
3.7 KB
|
2. Introduction to Isolation and Compartmentalization.vtt
|
3.1 KB
|
1. Goals and Learning Objectives.vtt
|
0.8 KB
|
11. Mac-OS-X-App-Sandbox.txt
|
0.1 KB
|
16. Whonixs-lack-of-an-Amnesic-feature.txt
|
0.1 KB
|
6. Dual-Booting-explained.txt
|
0.1 KB
|
11. How-to-run-your-Applications-in-a-Mac-OS-X-sandbox-to-enhance-security.txt
|
0.1 KB
|
11. Sandbox-Man-page.txt
|
0.1 KB
|
13. A-look-at-malware-with-VM-detection.txt
|
0.1 KB
|
13. Exploiting-dram-rowhammer-Could-be-used-on-VMs-in-the-future-.txt
|
0.1 KB
|
18. Partitioning-my-digital-life-into-security-domains.txt
|
0.1 KB
|
9. Introduction-and-quick-guide-sandboxie.txt
|
0.1 KB
|
3. Mac-OS-X-How-to-change-the-mac-address.txt
|
0.1 KB
|
11. Apple-Sandbox-Guide.txt
|
0.1 KB
|
12. Wikipedia-Comparison-of-platform-virtualization-software.txt
|
0.1 KB
|
3. Linux-How-to-use-macchanger.txt
|
0.1 KB
|
11. Firefox-profile.txt
|
0.1 KB
|
3. Diagram-of-Mac.txt
|
0.1 KB
|
15. How-to-implement-physical-isolation.txt
|
0.1 KB
|
8. Deepfreeze-Cloud-Browser-and-Desktop.txt
|
0.1 KB
|
11. SuperDuper.txt
|
0.1 KB
|
13. Example-VMware-security-bug.txt
|
0.1 KB
|
8. Deepfreeze-Standard.txt
|
0.1 KB
|
7. Chromium-sandbox-design.txt
|
0.1 KB
|
4. Mac-OS-X-Mac-Cupid.txt
|
0.1 KB
|
4. Mac-OS-X-Installing-dmidecode-with-brew.txt
|
0.1 KB
|
11. OSX-Sandbox-Seatbelt-Profiles.txt
|
0.1 KB
|
12. Wikipedia-Kernel-based-Virtual-Machine.txt
|
0.1 KB
|
8. Returnil.txt
|
0.1 KB
|
10. Script-Sandfox.txt
|
0.1 KB
|
9. Sandboxie-guide.txt
|
0.1 KB
|
15. Whonix-VM-snapshots.txt
|
0.1 KB
|
4. Windows-dmidecode.txt
|
0.1 KB
|
8. BufferZone.txt
|
0.1 KB
|
15. If-setting-up-your-own-workstations-MUST-READ.txt
|
0.1 KB
|
13. Report-Cross-VM-Side-Channels-and-Their-Use-to-Extract-Pr-ivate-Keys.txt
|
0.0 KB
|
8. Comodo.txt
|
0.0 KB
|
14. Convert-VM-to-ISO.txt
|
0.0 KB
|
13. https-en.wikipedia.org-wiki-X86-virtualization.txt
|
0.0 KB
|
3. Mac-OS-X-Macdaddyx.txt
|
0.0 KB
|
5. Aegis-Secure-Key-USB-2.0-Flash-Drive.txt
|
0.0 KB
|
15. ARM-Anonymizing-relay-monitor.txt
|
0.0 KB
|
17. Windows-templates.txt
|
0.0 KB
|
17. Debian-template-s-.txt
|
0.0 KB
|
9. Sandboxie-How-it-Works.txt
|
0.0 KB
|
17. Whonix-templates.txt
|
0.0 KB
|
17. Librem-13-laptop.txt
|
0.0 KB
|
10. Apparmor.txt
|
0.0 KB
|
13. https-en.wikipedia.org-wiki-Timing-channel.txt
|
0.0 KB
|
15. Whonix-Stream-Isolation.txt
|
0.0 KB
|
13. https-en.wikipedia.org-wiki-Covert-channel.txt
|
0.0 KB
|
4. Windows-CPU-Z.txt
|
0.0 KB
|
7. Mozilla-Sandbox-design.txt
|
0.0 KB
|
12. Wikipedia-Hypervisor.txt
|
0.0 KB
|
17. Split-GPG.txt
|
0.0 KB
|
15. Whonix-Check.txt
|
0.0 KB
|
15. Whonix-and-virtualbox.txt
|
0.0 KB
|
12. KVM-Debian-Jessie.txt
|
0.0 KB
|
5. Authentic8.txt
|
0.0 KB
|
11. Buckle-Up.txt
|
0.0 KB
|
15. Whonix-Features.txt
|
0.0 KB
|
12. Turnkey-Linux-Openvpn.txt
|
0.0 KB
|
17. Disposable-VMs-DispVMs-.txt
|
0.0 KB
|
9. Sandboxie-forum.txt
|
0.0 KB
|
16. Whonix-Warnings.txt
|
0.0 KB
|
10. Linux-Sandbox.txt
|
0.0 KB
|
17. Qubes-Download.txt
|
0.0 KB
|
4. Linux-and-Mac-OS-X-dmidecode.txt
|
0.0 KB
|
10. Firejail.txt
|
0.0 KB
|
8. f-sandbox.txt
|
0.0 KB
|
8. Shadowdefender.txt
|
0.0 KB
|
17. Video-Tour-of-Qubes.txt
|
0.0 KB
|
5. Spikes.txt
|
0.0 KB
|
17. Qubes-docs.txt
|
0.0 KB
|
12. OpenVZ.txt
|
0.0 KB
|
17. Hardware-Compatibility-List-HCL-.txt
|
0.0 KB
|
13. Venom.txt
|
0.0 KB
|
5. Pen-Drive-Apps.txt
|
0.0 KB
|
3. Windows-Tmac.txt
|
0.0 KB
|
5. Spoons.net.txt
|
0.0 KB
|
4. Linux-i-nex.txt
|
0.0 KB
|
10. Trusted-BSD.txt
|
0.0 KB
|
4. https-www.nitrokey.com-.txt
|
0.0 KB
|
12. Virt-Manager.txt
|
0.0 KB
|
5. Portable-Apps.txt
|
0.0 KB
|
15. https-www.whonix.org-.txt
|
0.0 KB
|
4. https-www.yubico.com-.txt
|
0.0 KB
|
5. Maxthon.txt
|
0.0 KB
|
3. Mac-OS-X-Wifispoof.txt
|
0.0 KB
|
/12. Wrap Up/
|
3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4
|
133.3 MB
|
6. Sample from Vol 4 - Email clients, protocols and authentication.mp4
|
115.0 MB
|
4. Sample from Vol 2 - Password cracking part 2.mp4
|
81.4 MB
|
5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4
|
62.5 MB
|
1. Congratulations.mp4
|
10.8 MB
|
2. Certificate Of Completion for CPEs.mp4
|
4.7 MB
|
3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).vtt
|
22.1 KB
|
5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.vtt
|
21.7 KB
|
6. Sample from Vol 4 - Email clients, protocols and authentication.vtt
|
19.9 KB
|
4. Sample from Vol 2 - Password cracking part 2.vtt
|
12.0 KB
|
1. Congratulations.vtt
|
1.5 KB
|
2. Certificate Of Completion for CPEs.vtt
|
1.3 KB
|
1. Link-to-The-Complete-Cyber-Security-Course-Volume-II-Network-security-discount-coupon-studentdiscount25.txt
|
0.1 KB
|
2. https-www.stationx.net-certificate-request-.txt
|
0.0 KB
|
/13. BONUS Section/
|
1. 2020-08-06_11-48-05-d0d12b6c3a68728281c4fa068994059e.png
|
245.8 KB
|
1. BONUS.html
|
1.2 KB
|
Total files 566
|