FileMood

Download Udemy - The Complete Cyber Security Course Hackers Exposed!

Udemy The Complete Cyber Security Course Hackers Exposed

Name

Udemy - The Complete Cyber Security Course Hackers Exposed!

 DOWNLOAD Copy Link

Total Size

4.5 GB

Total Files

561

Hash

64AC9808426370FF4B7EF3FE0834C7134F41401A

/1. Introduction/

2. Security Quick Win!.mp4

45.3 MB

1. Welcome and Introduction to the Instructor!.mp4

20.9 MB

5. Study Recommendations.mp4

18.8 MB

3. Goals and Learning Objectives - Volume 1.mp4

16.9 MB

4. Target Audience.mp4

7.7 MB

6. Course updates.mp4

4.6 MB

2. Security Quick Win!.vtt

15.6 KB

5. Study Recommendations.vtt

6.6 KB

4. Target Audience.vtt

3.3 KB

3. Goals and Learning Objectives - Volume 1.vtt

2.6 KB

1. Welcome and Introduction to the Instructor!.vtt

1.9 KB

6. Course updates.vtt

0.8 KB

2.1 httpswww.stationx.netcanarytokens.html

0.1 KB

1.1 Nathan's Cyber Security Blog.html

0.1 KB

1.2 Nathan's Twitter #GotoNathan.html

0.1 KB

/10. Security Domains/

2. Security Domains.mp4

22.9 MB

1. Goals and Learning Objectives.mp4

1.5 MB

2. Security Domains.vtt

15.5 KB

1. Goals and Learning Objectives.vtt

0.5 KB

/11. Security Through Isolation and Compartmentalization/

15. Whonix OS - Anonymous Operating system.mp4

93.0 MB

17. Qubes OS.mp4

82.6 MB

9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4

73.5 MB

5. Virtual Isolation.mp4

60.1 MB

4. Physical and Hardware Isolation - Hardware Serials.mp4

52.7 MB

12. Virtual Machines.mp4

46.6 MB

14. Virtual Machine Hardening.mp4

38.8 MB

8. Windows - Sandboxes and Application Isolation.mp4

27.6 MB

3. Physical and Hardware Isolation - How to change the Mac Address.mp4

26.8 MB

11. Mac - Sandboxes and Application Isolation.mp4

25.0 MB

13. Virtual Machine Weaknesses.mp4

23.8 MB

16. Whonix OS - Weaknesses.mp4

16.5 MB

18. Security Domains, Isolation and Compartmentalization.mp4

15.7 MB

10. Linux - Sandboxes and Application Isolation.mp4

14.5 MB

7. Built-in Sandboxes and Application Isolation.mp4

10.9 MB

6. Dual Boot.mp4

8.3 MB

2. Introduction to Isolation and Compartmentalization.mp4

5.9 MB

1. Goals and Learning Objectives.mp4

2.4 MB

15. Whonix OS - Anonymous Operating system.vtt

28.2 KB

17. Qubes OS.vtt

27.0 KB

12. Virtual Machines.vtt

17.5 KB

4. Physical and Hardware Isolation - Hardware Serials.vtt

16.3 KB

9. Windows - Sandboxes and Application Isolation - Sandboxie.vtt

15.6 KB

13. Virtual Machine Weaknesses.vtt

15.3 KB

14. Virtual Machine Hardening.vtt

13.4 KB

5. Virtual Isolation.vtt

13.1 KB

3. Physical and Hardware Isolation - How to change the Mac Address.vtt

10.1 KB

8. Windows - Sandboxes and Application Isolation.vtt

9.0 KB

11. Mac - Sandboxes and Application Isolation.vtt

7.7 KB

18. Security Domains, Isolation and Compartmentalization.vtt

6.7 KB

16. Whonix OS - Weaknesses.vtt

6.4 KB

7. Built-in Sandboxes and Application Isolation.vtt

4.5 KB

6. Dual Boot.vtt

4.5 KB

10. Linux - Sandboxes and Application Isolation.vtt

3.7 KB

2. Introduction to Isolation and Compartmentalization.vtt

3.1 KB

1. Goals and Learning Objectives.vtt

0.8 KB

11.1 Mac OS X - App Sandbox.html

0.2 KB

16.2 Whonix's lack of an Amnesic feature.html

0.2 KB

6.1 Dual Booting explained.html

0.2 KB

11.8 How to run your Applications in a Mac OS X sandbox to enhance security.html

0.2 KB

11.4 Sandbox Man page.html

0.2 KB

13.8 A look at malware with VM detection.html

0.2 KB

13.1 Exploiting dram rowhammer (Could be used on VMs in the future).html

0.2 KB

18.1 Partitioning my digital life into security domains.html

0.1 KB

9.2 Introduction and quick guide sandboxie.html

0.1 KB

3.5 Mac OS X - How to change the mac address.html

0.1 KB

11.6 Apple Sandbox Guide.html

0.1 KB

12.7 Wikipedia - Comparison of platform virtualization software.html

0.1 KB

11.5 Firefox profile.html

0.1 KB

3.6 Linux - How to use macchanger.html

0.1 KB

15.7 How to implement physical isolation.html

0.1 KB

3.4 Diagram of Mac.html

0.1 KB

8.1 Deepfreeze Cloud Browser and Desktop.html

0.1 KB

11.7 SuperDuper.html

0.1 KB

13.2 Example VMware security bug.html

0.1 KB

8.7 Deepfreeze Standard.html

0.1 KB

7.1 Chromium sandbox design.html

0.1 KB

4.6 Mac OS X - Mac Cupid.html

0.1 KB

4.1 Mac OS X - Installing dmidecode with brew.html

0.1 KB

12.2 Wikipedia - Kernel-based Virtual Machine.html

0.1 KB

11.3 OSX-Sandbox--Seatbelt--Profiles.html

0.1 KB

10.1 Script Sandfox.html

0.1 KB

8.6 Returnil.html

0.1 KB

9.4 Sandboxie guide.html

0.1 KB

15.9 Whonix VM snapshots.html

0.1 KB

4.4 Windows - dmidecode.html

0.1 KB

15.6 If setting up your own workstations - MUST READ.html

0.1 KB

8.2 BufferZone.html

0.1 KB

13.3 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html

0.1 KB

8.3 Comodo.html

0.1 KB

13.6 httpsen.wikipedia.orgwikiX86_virtualization.html

0.1 KB

14.1 Convert VM to ISO.html

0.1 KB

3.1 Mac OS X - Macdaddyx.html

0.1 KB

5.4 Aegis Secure Key - USB 2.0 Flash Drive.html

0.1 KB

15.5 ARM - Anonymizing relay monitor.html

0.1 KB

17.7 Windows templates.html

0.1 KB

17.1 Debian template(s).html

0.1 KB

9.1 Sandboxie How it Works.html

0.1 KB

13.5 httpsen.wikipedia.orgwikiCovert_channel.html

0.1 KB

17.6 Whonix templates.html

0.1 KB

10.5 Apparmor.html

0.1 KB

17.4 Librem 13 laptop.html

0.1 KB

15.4 Whonix Stream Isolation.html

0.1 KB

13.4 httpsen.wikipedia.orgwikiTiming_channel.html

0.1 KB

4.2 Windows - CPU Z.html

0.1 KB

7.2 Mozilla Sandbox design.html

0.1 KB

12.1 Wikipedia - Hypervisor.html

0.1 KB

17.9 Split GPG.html

0.1 KB

15.8 Whonix Check.html

0.1 KB

15.2 Whonix and virtualbox.html

0.1 KB

12.5 KVM Debian Jessie.html

0.1 KB

15.1 Whonix Features.html

0.1 KB

11.2 Buckle Up.html

0.1 KB

5.2 Authentic8.html

0.1 KB

12.6 Turnkey Linux - Openvpn.html

0.1 KB

17.8 Disposable VMs (DispVMs).html

0.1 KB

10.2 Linux Sandbox.html

0.1 KB

9.3 Sandboxie forum.html

0.1 KB

17.5 Qubes Download.html

0.1 KB

16.1 Whonix - Warnings.html

0.1 KB

4.3 Linux and Mac OS X - dmidecode.html

0.1 KB

8.5 f-sandbox.html

0.1 KB

10.4 Firejail.html

0.1 KB

8.4 Shadowdefender.html

0.1 KB

5.5 Spikes.html

0.1 KB

17.10 Video Tour of Qubes.html

0.1 KB

12.4 OpenVZ.html

0.1 KB

13.7 Venom.html

0.1 KB

17.2 Hardware Compatibility List (HCL).html

0.1 KB

17.3 Qubes docs.html

0.1 KB

5.6 Pen Drive Apps.html

0.1 KB

3.2 Windows - Tmac.html

0.1 KB

5.7 Spoons.net.html

0.1 KB

4.8 Linux - i-nex.html

0.1 KB

4.5 httpswww.nitrokey.com.html

0.1 KB

10.3 Trusted BSD.html

0.1 KB

12.3 Virt Manager.html

0.1 KB

5.1 Portable Apps.html

0.1 KB

15.3 httpswww.whonix.org.html

0.1 KB

4.7 httpswww.yubico.com.html

0.1 KB

5.3 Maxthon.html

0.1 KB

3.3 Mac OS X - Wifispoof.html

0.1 KB

/12. Wrap Up/

3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4

50.4 MB

6. Sample from Vol 4 - Email clients, protocols and authentication.mp4

40.0 MB

5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4

33.3 MB

4. Sample from Vol 2 - Password cracking part 2.mp4

25.3 MB

1. Congratulations.mp4

5.5 MB

2. Certificate Of Completion for CPEs.mp4

2.3 MB

3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).vtt

22.1 KB

5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.vtt

21.7 KB

6. Sample from Vol 4 - Email clients, protocols and authentication.vtt

19.9 KB

4. Sample from Vol 2 - Password cracking part 2.vtt

12.0 KB

1. Congratulations.vtt

1.5 KB

2. Certificate Of Completion for CPEs.vtt

1.1 KB

1.1 Link to The Complete Cyber Security Course - Volume II - Network security + discount coupon studentdiscount25.html

0.1 KB

2.1 httpswww.stationx.netcertificate-request.html

0.1 KB

/13. BONUS Section/

1. BONUS DISCOUNT COUPONS .html

5.1 KB

/2. know Yourself - The Threat and Vulnerability Landscape/

9. Confidentiality, Integrity and Availability - (Security Attributes).mp4

20.3 MB

7. Threat Modeling and Risk Assessments.mp4

18.9 MB

4. What is Privacy, Anonymity and Pseudonymity.mp4

12.4 MB

5. Security, Vulnerabilities, Threats and Adversaries.mp4

11.8 MB

11. The Zero Trust Model.mp4

10.8 MB

3. Protect What You Value.mp4

9.4 MB

6. Asset Selection.mp4

8.1 MB

8. Security vs Privacy vs Anonymity - Can we have it all.mp4

5.7 MB

10. Defense In Depth.mp4

3.1 MB

2. Goals and Learning Objectives.mp4

2.8 MB

1. Theory and Practical.mp4

2.3 MB

5.1 The Cyber Security Landscape Diagram.jpg.jpg

795.8 KB

9. Confidentiality, Integrity and Availability - (Security Attributes).vtt

10.6 KB

7. Threat Modeling and Risk Assessments.vtt

9.4 KB

4. What is Privacy, Anonymity and Pseudonymity.vtt

5.2 KB

3. Protect What You Value.vtt

4.9 KB

5. Security, Vulnerabilities, Threats and Adversaries.vtt

4.8 KB

11. The Zero Trust Model.vtt

4.4 KB

6. Asset Selection.vtt

3.6 KB

8. Security vs Privacy vs Anonymity - Can we have it all.vtt

2.6 KB

10. Defense In Depth.vtt

1.6 KB

1. Theory and Practical.vtt

1.4 KB

2. Goals and Learning Objectives.vtt

0.9 KB

9.4 httpwhatis.techtarget.comdefinitionConfidentiality-integrity-and-availability-CIA.html

0.1 KB

9.3 httpsen.wikipedia.orgwikiParkerian_Hexad.html

0.1 KB

9.5 httpsen.wikipedia.orgwikiNon-repudiation.html

0.1 KB

9.2 httpsen.wikipedia.orgwikiAuthentication.html

0.1 KB

9.6 httpsen.wikipedia.orgwikiAuthorization.html

0.1 KB

6.2 httpswww.iso.orgstandard56742.html.html

0.1 KB

6.1 httpswww.stationx.netsabsa.html

0.1 KB

9.1 httpswww.stationx.netsabsa.html

0.1 KB

6.3 httpswww.securityforum.org.html

0.1 KB

/3. Know Your Enemy - The Current Threat and Vulnerability Landscape/

15. Regulating encryption, mandating insecurity & legalizing spying.mp4

44.8 MB

4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4

40.0 MB

12. Darknets, Dark Markets and Exploit kits.mp4

34.0 MB

14. Governments, spies and secret stuff part II.mp4

31.7 MB

2. Why You Need Security – The Value Of A Hack.mp4

30.3 MB

13. Governments, spies and secret stuff part I.mp4

28.3 MB

8. What is Phishing, Vishing and SMShing.mp4

27.2 MB

16. Trust & Backdoors.mp4

25.7 MB

11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4

17.0 MB

6. Malware, viruses, rootkits and RATs.mp4

12.7 MB

10. Social engineering - Scams, cons, tricks and fraud.mp4

12.5 MB

7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4

11.3 MB

5. Hackers, crackers and cyber criminals.mp4

8.1 MB

17. Censorship.mp4

6.8 MB

9. Spamming & Doxing.mp4

5.0 MB

1. Goals and Learning Objectives.mp4

3.0 MB

18. Cyber Threat Intelligence – Stay Informed.mp4

2.7 MB

3. The Top 3 Things You Need To Stay Safe Online.mp4

2.6 MB

15. Regulating encryption, mandating insecurity & legalizing spying.vtt

16.2 KB

8. What is Phishing, Vishing and SMShing.vtt

15.7 KB

16. Trust & Backdoors.vtt

11.3 KB

14. Governments, spies and secret stuff part II.vtt

11.0 KB

4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.vtt

10.9 KB

11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.vtt

9.9 KB

12. Darknets, Dark Markets and Exploit kits.vtt

8.4 KB

6. Malware, viruses, rootkits and RATs.vtt

7.4 KB

10. Social engineering - Scams, cons, tricks and fraud.vtt

6.1 KB

13. Governments, spies and secret stuff part I.vtt

6.1 KB

2. Why You Need Security – The Value Of A Hack.vtt

6.0 KB

7. Spyware, Adware, Scareware, PUPs & Browser hijacking.vtt

5.5 KB

9. Spamming & Doxing.vtt

3.6 KB

5. Hackers, crackers and cyber criminals.vtt

3.1 KB

17. Censorship.vtt

2.8 KB

3. The Top 3 Things You Need To Stay Safe Online.vtt

1.5 KB

1. Goals and Learning Objectives.vtt

1.1 KB

18. Cyber Threat Intelligence – Stay Informed.vtt

1.1 KB

7.1 httpwww.slate.comarticlestechnologybitwise201502lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html.html

0.2 KB

7.3 httpwww.telegraph.co.uknewsworldnewsnorthamericausa11416985Millions-of-computers-may-be-compromised-by-US-spyware-report.html.html

0.2 KB

15.3 httpswww.csoonline.comarticle3213033securitynsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.html

0.2 KB

15.1 Clipper chip.html

0.2 KB

15.7 Kazakhstans new encryption law.html

0.2 KB

11.3 httpsarstechnica.cominformation-technology201801now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners.html

0.2 KB

17.2 httpsearchenginewatch.comsewnews2351154google-censorship-ruling-in-canada-has-worldwide-implications.html

0.2 KB

16.5 Apple removes malware infected apps from the app store.html

0.2 KB

15.8 httpwww.washingtonsblog.com201505nsa-admits-it-collects-too-much-info-to-stop-terror-attacks.html.html

0.2 KB

6.1 SophosLabs 2018 Malware Forecast.html

0.2 KB

7.2 httpssecurelist.comanalysisquarterly-malware-reports72493it-threat-evolution-in-q3-2015.html

0.2 KB

11.9 httpswww.engadget.com20180213attackers-telegram-deliver-cryptocurrency-mining-malware.html

0.2 KB

15.12 A Worldwide Survey of E ncryption Products - xls.html

0.2 KB

16.2 httpsblog.torproject.orgblogdeterministic-builds-part-one-cyberwar-and-global-compromise.html

0.2 KB

15.6 A Worldwide Survey of Encryption Products - pdf.html

0.2 KB

15.9 Report - Keys Under Doormats Mandating insecurity by requiring government access to all data and communication.html

0.2 KB

6.5 7 most common RATs.html

0.1 KB

11.10 httpstorrentfreak.compirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011.html

0.1 KB

9.2 Spam example.html

0.1 KB

16.8 Video on how to build your own software reproducibly.html

0.1 KB

6.4 Report - Spotlight perils of malvertisements.html

0.1 KB

15.5 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html

0.1 KB

2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html

0.1 KB

8.2 XSS example vulnerability.html

0.1 KB

11.1 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html

0.1 KB

7.4 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html

0.1 KB

8.1 Homograph attack using internationalized domain name.html

0.1 KB

16.3 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html

0.1 KB

2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html

0.1 KB

17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html

0.1 KB

11.2 Cryptocurrency Mining Malware Infected Over Half-Million PCs Using an NSA Exploit.html

0.1 KB

17.1 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html

0.1 KB

10.2 Top 10 scams.html

0.1 KB

16.1 Examples of backdoors.html

0.1 KB

11.7 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html

0.1 KB

12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html

0.1 KB

15.13 UK data communications bill.html

0.1 KB

11.5 httpsthehackernews.com201802cryptojacking-malware.html.html

0.1 KB

15.11 httpwww.crypto.compapersgovernmentreform-blaze2015.pdf.html

0.1 KB

11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html

0.1 KB

16.6 Apple backdoor order.html

0.1 KB

15.4 The Case against Regulating Encryption Technology.html

0.1 KB

15.2 WhatsApp was Banned for 48 Hours in Brazil.html

0.1 KB

11.8 httpsgithub.comhoshsadiqadblock-nocoin-list.html

0.1 KB

10.1 httpwww.actionfraud.police.uktypes_of_fraud.html

0.1 KB

15.10 Matt Blaze Speaking to a US congressional committee.html

0.1 KB

6.3 Malware stats.html

0.1 KB

14.4 httpscryptome.org201401nsa-codenames.htm.html

0.1 KB

3.1 httpsresearch.google.compubspub43963.html.html

0.1 KB

6.2 Chef Jamie Oliver’s website hacked for the third time.html

0.1 KB

16.7 Formal methods.html

0.1 KB

14.1 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html

0.1 KB

9.1 Spam stats.html

0.1 KB

14.2 httpsnsa.gov1.infodninsa-ant-catalog.html

0.1 KB

4.1 Exploit Kit Landscape Map.html

0.1 KB

10.3 httpwww.consumerfraudreporting.org.html

0.1 KB

4.3 httpswww.exploit-db.comsearch.html

0.1 KB

14.5 httpswikileaks.org-Leaks-.html.html

0.1 KB

16.4 httpsreproducible-builds.org.html

0.1 KB

18.1 httpwww.stationx.netalerts.html

0.1 KB

4.2 CVE details.html

0.1 KB

14.6 httpwww.nsaplayset.org.html

0.1 KB

8.3 Live phishing links.html

0.1 KB

14.3 httpstheintercept.com.html

0.1 KB

11.6 httpscoinhive.com.html

0.1 KB

/4. Encryption Crash Course/

10. Certificate Authorities and HTTPS.mp4

209.0 MB

6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4

168.7 MB

7. SSL Stripping.mp4

120.1 MB

12. Steganography.mp4

109.4 MB

4. Hash Functions.mp4

93.6 MB

9. Digital Certificates.mp4

85.9 MB

8. HTTPS (HTTP Secure).mp4

85.9 MB

3. Asymmetric Encryption.mp4

75.8 MB

5. Digital Signatures.mp4

44.8 MB

2. Symmetric Encryption.mp4

33.9 MB

13. How Security and Encryption is Really Attacked.mp4

18.2 MB

11. End-to-End Encryption (E2EE).mp4

8.6 MB

1. Goals and Learning Objectives.mp4

1.7 MB

10. Certificate Authorities and HTTPS.vtt

16.9 KB

6. Secure Sockets Layer (SSL) and Transport layer security (TLS).vtt

14.0 KB

7. SSL Stripping.vtt

13.7 KB

3. Asymmetric Encryption.vtt

11.7 KB

2. Symmetric Encryption.vtt

10.2 KB

12. Steganography.vtt

8.8 KB

8. HTTPS (HTTP Secure).vtt

7.1 KB

4. Hash Functions.vtt

6.5 KB

9. Digital Certificates.vtt

6.3 KB

5. Digital Signatures.vtt

5.2 KB

13. How Security and Encryption is Really Attacked.vtt

3.2 KB

11. End-to-End Encryption (E2EE).vtt

2.0 KB

1. Goals and Learning Objectives.vtt

0.6 KB

10.1 CA example mistake.html

0.2 KB

5.2 Windows 10 Device Guard using Digital Signatures.html

0.2 KB

13.1 Security Pitfalls.html

0.1 KB

7.5 Intro to Sniffers.html

0.1 KB

10.4 Certificate patrol.html

0.1 KB

7.4 Arpwatch Tool to Monitor Ethernet Activity in Linux.html

0.1 KB

6.4 Steve Gibson's Cipher Suite Recommendations.html

0.1 KB

12.4 OpenPuff.html

0.1 KB

6.3 Wikipedia Transport Layer Security (TLS) page.html

0.1 KB

8.1 Server Name Indication (SNI) Wiki.html

0.1 KB

6.2 Mozilla Cipher Suite Recommendations.html

0.1 KB

5.1 httpswww.symantec.comenukcode-signing.html

0.1 KB

12.1 OpenPuff Manual.html

0.1 KB

7.1 SSL Strip tool By Moxie Marlinspike.html

0.1 KB

10.2 SSL Sniff.html

0.1 KB

10.5 CA Ecosystem.html

0.1 KB

12.2 List of Steg Tools.html

0.1 KB

4.1 Example hashes.html

0.1 KB

10.3 Cert Fingerprints.html

0.1 KB

6.1 Weakdh Cipher Suite Recommendations.html

0.1 KB

7.2 sniffdet - Remote Sniffer Detection ToolLibrary.html

0.1 KB

7.3 WIFI Pineapple.html

0.1 KB

7.6 Cain & Abel.html

0.1 KB

12.3 httpwww.spammimic.com.html

0.1 KB

/5. Setting up a Testing Environment Using Virtual Machines (Lab)/

4. Virtual box.mp4

151.2 MB

2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4

118.9 MB

3. Vmware.mp4

115.9 MB

5. Kali Linux 2018.mp4

62.5 MB

1. Goals and Learning Objectives.mp4

1.9 MB

4. Virtual box.vtt

11.1 KB

2. Introduction to Setting up a Testing Environment Using Virtual Machines.vtt

11.0 KB

3. Vmware.vtt

10.9 KB

5. Kali Linux 2018.vtt

4.9 KB

1. Goals and Learning Objectives.vtt

0.7 KB

2.10 Vmware Network Adapter Settings.html

0.2 KB

5.5 Kali images for Virtualbox or VMware.html

0.2 KB

2.3 httpsen.wikipedia.orgwikiComparison_of_platform_virtualization_software.html

0.1 KB

2.2 Windows VMs here.html

0.1 KB

5.2 Kali on Microsoft App Store as an official WSL.html

0.1 KB

5.3 Kali Arm hardware.html

0.1 KB

3.1 httpwww.vmware.comproductsworkstationcompare.html.html

0.1 KB

3.2 httpwww.vmware.comproductsplayerfaqsfaqs.html.html

0.1 KB

5.4 Kali AWS appliance.html

0.1 KB

2.9 Virtualbox Network Adapter Settings.html

0.1 KB

2.5 httpwww.osboxes.orgvirtualbox-images.html

0.1 KB

2.11 httpsen.wikipedia.orgwikiHypervisor.html

0.1 KB

2.1 httpwww.osboxes.orgvmware-images.html

0.1 KB

2.7 httpsmarketplace.vmware.com.html

0.1 KB

2.8 httpvirtualboxes.orgimages.html

0.1 KB

2.4 httpwww.osboxes.orgguide#!.html

0.1 KB

2.6 httpvirtual-machine.org.html

0.1 KB

4.1 httpswww.virtualbox.org.html

0.1 KB

/6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/

11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4

110.7 MB

7. Windows 10 - Tool Disable Windows 10 Tracking.mp4

103.2 MB

9. Windows 10 – Privacy Settings.mp4

90.7 MB

3. Security Bugs and Vulnerabilities.mp4

88.0 MB

5. Windows 10 - Privacy & Tracking.mp4

83.8 MB

6. Windows 10 - Disable tracking automatically.mp4

71.2 MB

10. Windows 10 - WiFi Sense.mp4

62.7 MB

12. Mac - Privacy & Tracking.mp4

60.8 MB

2. Security Features and Functionality.mp4

60.7 MB

20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4

60.6 MB

14. General Use Operating Systems (Windows, MacOS and Linux).mp4

49.2 MB

19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).mp4

49.0 MB

13. Linux and Unix “like” Operating systems.mp4

48.5 MB

8. Windows 10 – Cortana.mp4

43.0 MB

15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).mp4

41.3 MB

4. Usage Share.mp4

35.9 MB

16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).mp4

33.9 MB

17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4

22.6 MB

18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4

14.0 MB

1. Goals and Learning Objectives.mp4

2.5 MB

9. Windows 10 – Privacy Settings.vtt

9.9 KB

11. Windows 7, 8 and 8.1 - Privacy & Tracking.vtt

7.9 KB

7. Windows 10 - Tool Disable Windows 10 Tracking.vtt

7.8 KB

5. Windows 10 - Privacy & Tracking.vtt

7.1 KB

2. Security Features and Functionality.vtt

7.0 KB

3. Security Bugs and Vulnerabilities.vtt

6.3 KB

15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).vtt

6.2 KB

20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.vtt

5.9 KB

6. Windows 10 - Disable tracking automatically.vtt

5.8 KB

4. Usage Share.vtt

5.7 KB

12. Mac - Privacy & Tracking.vtt

5.2 KB

14. General Use Operating Systems (Windows, MacOS and Linux).vtt

5.1 KB

10. Windows 10 - WiFi Sense.vtt

5.0 KB

8. Windows 10 – Cortana.vtt

3.9 KB

13. Linux and Unix “like” Operating systems.vtt

3.9 KB

17. Anonymity Focused Operating Systems (Tails and Whonix OS).vtt

3.6 KB

16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).vtt

3.6 KB

19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).vtt

3.1 KB

18. Penetration Testing and Ethical Hacking Focused Operating Systems.vtt

1.2 KB

1. Goals and Learning Objectives.vtt

0.9 KB

12.5 Washingtonpost - How apples os x yosemite tracks-you.html

0.2 KB

10.1 httpsblogs.windows.comwindowsexperience20160510announcing-windows-10-insider-preview-build-14342#31Zq2yELkheC9HyV.99.html

0.2 KB

5.1 With Windows 10, Microsoft Blatantly Disregards User Choice and Privacy A Deep Dive.html

0.2 KB

3.2 Report - Buying Into the Bias Why Vulnerability Statistics Suck.html

0.2 KB

11.4 httpwww.zdnet.comarticlehow-to-block-windows-10-upgrades-on-your-business-network-and-at-home-too.html

0.2 KB

8.1 How to disable cortana-on Windows 10.html

0.1 KB

9.2 SmartScreen Filter FAQ.html

0.1 KB

9.1 Complete guide windows 10 privacy settings.html

0.1 KB

8.3 How to Disable Cortana in Windows 10’s Anniversary Update.html

0.1 KB

8.2 Cortana privacy faq.html

0.1 KB

5.4 Cortana privacy faq.html

0.1 KB

4.1 OS usage share.html

0.1 KB

5.3 Microsoft Service Agreement.html

0.1 KB

6.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html

0.1 KB

7.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html

0.1 KB

5.2 Microsoft Privacy Statement.html

0.1 KB

3.1 Top 50 products vs security bugs.html

0.1 KB

12.4 httpsgithub.comfix-macosxyosemite-phone-home.html

0.1 KB

12.3 httpsgithub.comkarek314macOS-home-call-drop.html

0.1 KB

11.1 Microsoft - How to manage Windows 10 notification and upgrade options.html

0.1 KB

16.3 Hardened Gentoo Linux - httpswiki.gentoo.orgwikiProjectHardened.html

0.1 KB

12.2 httpsgithub.comfix-macosxnet-monitor.html

0.1 KB

11.3 GWX Control Panel.html

0.1 KB

16.1 Security-Enhanced Linux (SELinux) - httpsgithub.comSELinuxProject.html

0.1 KB

20.3 Free Debian Books and Guides.html

0.1 KB

19.3 iOS - httpsdeveloper.apple.comios.html

0.1 KB

20.2 Download Debian.html

0.1 KB

20.1 Debian Live CDDVD.html

0.1 KB

11.2 Never 10 by Steve Gibson (Use this!).html

0.1 KB

19.6 PureOS Librem 5 - httpspuri.smshoplibrem-5.html

0.1 KB

18.4 Parrot GNULinux - httpswww.parrotsec.org.html

0.1 KB

13.4 httpswww.archlinux.org.html

0.1 KB

15.3 Archlinux - httpswww.archlinux.org.html

0.1 KB

16.2 Subgraph OS - httpssubgraph.comsgos.html

0.1 KB

16.7 Qubes OS - httpswww.qubes-os.org.html

0.1 KB

19.7 Replicant - Httpswww.replicant.us.html

0.1 KB

17.1 Qubes OS - httpswww.qubes-os.org.html

0.1 KB

13.2 httpswww.openbsd.org.html

0.1 KB

19.1 Android - httpswww.android.com.html

0.1 KB

19.4 OmniROM - httpswww.omnirom.org.html

0.1 KB

15.1 OpenBSD - httpswww.openbsd.org.html

0.1 KB

13.1 httpdistrowatch.com.html

0.1 KB

14.1 Ubuntu - httpswww.ubuntu.com.html

0.1 KB

16.4 PureOS - httpswww.pureos.net.html

0.1 KB

12.1 Fix Mac OS X.html

0.1 KB

13.3 httpswww.debian.org.html

0.1 KB

15.2 Debian - httpswww.debian.org.html

0.1 KB

17.2 Tails OS - httpstails.boum.org.html

0.1 KB

17.3 Whonix - httpswww.whonix.org.html

0.1 KB

18.3 Pentoo - httpswww.pentoo.ch.html

0.1 KB

18.5 BlackArch Linux - httpsblackarch.org.html

0.1 KB

14.3 Linux Mint - httpslinuxmint.com.html

0.1 KB

16.6 Trisquel OS - httpstrisquel.info.html

0.1 KB

19.5 LineageOS - httpslineageos.org.html

0.1 KB

18.1 Kali Linux - httpswww.kali.org.html

0.1 KB

16.5 Astra Linux - httpastralinux.ru.html

0.1 KB

14.2 Manjaro - httpsmanjaro.org.html

0.1 KB

18.2 BackBox Linux - httpsbackbox.org.html

0.1 KB

19.2 MicroG - httpsmicrog.org.html

0.1 KB

/7. Security Bugs and Vulnerabilities/

9. Mac - Patching.mp4

58.3 MB

6. Windows - Criticality and Patch Tuesday.mp4

43.8 MB

8. Linux - Debian - Patching.mp4

40.4 MB

10. Firefox - Browser and extension updates.mp4

35.7 MB

7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4

20.3 MB

2. The Importance of Patching.mp4

12.2 MB

4. Windows 8 & 8.1 - Auto Update.mp4

6.9 MB

12. IE and Edge - Browser and extention updates.mp4

5.9 MB

3. Windows 7 - Auto Update.mp4

5.2 MB

5. Windows 10 - Auto Update.mp4

5.2 MB

13. Auto updates - The Impact to privacy and anonymity.mp4

4.5 MB

11. Chrome - Browser and extension updates.mp4

3.7 MB

1. Goals and Learning Objectives.mp4

1.7 MB

8. Linux - Debian - Patching.vtt

15.6 KB

7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.vtt

11.2 KB

9. Mac - Patching.vtt

9.4 KB

10. Firefox - Browser and extension updates.vtt

6.1 KB

2. The Importance of Patching.vtt

6.0 KB

6. Windows - Criticality and Patch Tuesday.vtt

4.2 KB

13. Auto updates - The Impact to privacy and anonymity.vtt

2.7 KB

4. Windows 8 & 8.1 - Auto Update.vtt

1.9 KB

11. Chrome - Browser and extension updates.vtt

1.8 KB

5. Windows 10 - Auto Update.vtt

1.8 KB

3. Windows 7 - Auto Update.vtt

1.7 KB

12. IE and Edge - Browser and extention updates.vtt

1.0 KB

1. Goals and Learning Objectives.vtt

0.6 KB

6.3 Patch Tuesday may be dead, but Microsoft's not confessing to the crime.html

0.2 KB

6.1 Windows 10 Ditches Patch Tuesday for Security's Sake.html

0.2 KB

7.1 Flexera Personal Software Inspector - Previously Secunia PSI.html

0.2 KB

9.2 igeekblogs - How to enable updates.html

0.1 KB

8.3 Automatic Security Updates.html

0.1 KB

6.2 Microsoft Security Bulletins.html

0.1 KB

8.1 Software distributions based on Debian.html

0.1 KB

9.3 Apple security updates.html

0.1 KB

8.2 Debian Security Page.html

0.1 KB

9.4 Mac Update.html

0.1 KB

6.4 National vulnerability database.html

0.1 KB

6.5 Common Vulnerabilities and Exposures.html

0.1 KB

9.1 httpbrew.sh.html

0.1 KB

/8. Reducing Threat Privilege/

3. Windows 8 and 8.1 - Not using admin.mp4

19.1 MB

4. Windows 10 - Not using admin.mp4

14.8 MB

1. Goals and Learning Objectives - Removing Privilege.mp4

14.3 MB

2. Windows 7 - Not using admin.mp4

11.5 MB

3. Windows 8 and 8.1 - Not using admin.vtt

5.7 KB

2. Windows 7 - Not using admin.vtt

5.1 KB

4. Windows 10 - Not using admin.vtt

4.7 KB

1. Goals and Learning Objectives - Removing Privilege.vtt

3.8 KB

/9. Social Engineering and Social Media Offence and Defence/

2. Information Disclosure and Identity Strategies for Social Media.mp4

87.9 MB

5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4

51.7 MB

3. Identify Verification and Registration.mp4

24.5 MB

4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4

24.4 MB

6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp4

15.2 MB

1. Goals and Learning Objectives.mp4

1.8 MB

2. Information Disclosure and Identity Strategies for Social Media.vtt

23.0 KB

5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.vtt

18.2 KB

4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.vtt

13.3 KB

3. Identify Verification and Registration.vtt

8.6 KB

6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).vtt

8.5 KB

1. Goals and Learning Objectives.vtt

0.6 KB

2.3 httpwww.telegraph.co.uktechnologysocial-media9780565Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html.html

0.2 KB

2.6 The complete guide to facebook privacy settings.html

0.1 KB

3.15 Top 10 sites receive sms online without phone.html

0.1 KB

2.9 List of Personally Identifiable Information (PII).html

0.1 KB

2.2 httpswww.eff.orgwho-has-your-back-government-data-requests-2015.html

0.1 KB

6.3 httpwww.consumerfraudreporting.orgcredit_freeze_summary.php.html

0.1 KB

5.1 httpswww.virustotal.comendocumentationemail-submissions.html

0.1 KB

2.5 Twitter Privacy Settings.html

0.1 KB

5.2 How to Get Email Headers.html

0.1 KB

6.1 httpwww.actionfraud.police.uktypes_of_fraud.html

0.1 KB

3.6 http10minutemail.com10MinuteMailindex.html.html

0.1 KB

5.4 httpswhois.domaintools.combbc.co.uk.html

0.1 KB

5.5 httpswhois.domaintools.comblob.com.html

0.1 KB

3.3 Example SMS recieve online site.html

0.1 KB

4.2 httpwww.google.com.stationx.net.html

0.1 KB

3.5 httpswww.guerrillamail.com.html

0.1 KB

2.7 httpsdiasporafoundation.org.html

0.1 KB

3.2 httpswww.trash-mail.comen.html

0.1 KB

3.9 httpwww.mytrashmail.com.html

0.1 KB

6.2 httpwww.scambusters.org.html

0.1 KB

3.11 httpwww.dispostable.com.html

0.1 KB

2.4 httpsgnu.iosocialtry.html

0.1 KB

5.3 httpswww.parsemail.org.html

0.1 KB

3.17 httpwww.mailexpire.com.html

0.1 KB

3.16 httpwww.tempinbox.com.html

0.1 KB

4.1 httpwww.urlvoid.com.html

0.1 KB

3.12 httpsmailinator.com.html

0.1 KB

3.1 httpwww.migmail.net.html

0.1 KB

3.4 httpcrapmail.dken.html

0.1 KB

3.8 httpgetairmail.com.html

0.1 KB

2.8 httpfriendica.com.html

0.1 KB

3.13 httpbugmenot.com.html

0.1 KB

3.14 httpsanonbox.net.html

0.1 KB

3.7 httpdontmail.net.html

0.1 KB

3.10 httpfreemail.ms.html

0.1 KB

2.1 httpstosdr.org.html

0.1 KB

 

Total files 561


Copyright © 2024 FileMood.com