Torrent Info
Title 4 - Endpoint Protection
Category Other
Size 2.83GB
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
001 Welcome to Volume 4.mp4 7.19MB
002 Introduction to the Instructor.mp4 17.13MB
003 Security Quick Win.mp4 44.61MB
004 Target Audience.mp4 7.32MB
005 Study Recommendations.mp4 20.81MB
006 Course updates.mp4 2.56MB
007 What is End Point Protection and why is it important.mp4 34.31MB
008 Goals and Learning Objectives - Volume 4.mp4 25.39MB
009 Goals and Learning Objectives.mp4 7.19MB
010 Disk Encryption What is it good for.mp4 21.72MB
011 Disk Encryption Attacks - Cryptoalgorithms Brute Force Attacks Implementation.mp4 16.78MB
012 Disk Encryption Attacks - Physical.mp4 38.31MB
013 Disk Encryption Attacks - Containers Volumes and Partitions.mp4 7.18MB
014 Windows - Disk Encryption - An Introduction.mp4 7.51MB
015 Windows - Disk Encryption - Bitlocker.mp4 30.20MB
016 Windows - Setting Up BitLocker.mp4 23.63MB
017 Windows - Disk Encryption - VeraCrypt.mp4 25.05MB
018 Windows - Disk Encryption - CipherShed Diskcryptor Symantec and Bestcrypt.mp4 6.75MB
019 Windows Mac Linux - Setting up VeraCrypt.mp4 29.80MB
020 Mac - Filevault2.mp4 13.16MB
021 Mac - Setting up Filevault2.mp4 19.72MB
022 Linux Whole Disk Encryption - Dm-crypt and LUKS.mp4 13.75MB
023 Linux - Setting up DMCryptLUKS.mp4 13.19MB
024 Linux - Encrypting the boot partition with Grub2.mp4 11.71MB
025 Self Encrypting Drives SEDs.mp4 3.16MB
026 Defense Against Disk Decryption Attacks.mp4 20.86MB
027 File Encryption.mp4 11.11MB
028 Mandatory Key Disclosure Plausible Deniability.mp4 20.53MB
029 Nesting Crypto Systems Obfuscation.mp4 8.88MB
030 Case Studies in Disk Decryption.mp4 5.87MB
031 Goals and Learning Objectives.mp4 5.61MB
032 Is Anti-Virus dead - The Threat Landscape.mp4 11.33MB
033 Is Anti-Virus dead - Protection Methods.mp4 36.60MB
034 Ransomware.mp4 8.49MB
035 Anti-Virus and End-Point-Protection Testing.mp4 12.89MB
036 The Problem With AV and EPP Testing.mp4 6.65MB
037 The Best of Business End-Point-Protection EPP.mp4 9.40MB
038 Windows - The Best of Anti-Virus and End-Point-Protection.mp4 10.28MB
039 Business End Point Protection EPP.mp4 5.14MB
040 Mac - XProtect.mp4 13.50MB
041 Mac - The Best of Anti-Virus and End-Point-Protection.mp4 6.52MB
042 Linux - The Best of Anti-Virus and End-Point-Protection.mp4 6.17MB
043 Online and Second Opinion - Anti-Virus and End-Point-Protection.mp4 9.96MB
044 Is Anti-Virus and End-Point-Protection Dangerous.mp4 13.32MB
045 Goals and Learning Objectives.mp4 5.08MB
046 Next Generation - Anti-Virus NG-AV End-Point-Protection NG-EPP.mp4 10.64MB
047 End Point Detection and Response EDR.mp4 13.80MB
048 End-Point-Protection How it works together in layers.mp4 12.86MB
049 Goals and Learning Objectives.mp4 5.78MB
050 What is application and execution control.mp4 20.95MB
051 Windows - Application control - ACLs Windows Permission Identifier Accessenum.mp4 16.27MB
052 Windows - Application control - User Account Control UAC.mp4 15.36MB
053 Windows - Application control - Software Restriction Policies.mp4 11.29MB
054 Windows - Application control - AppLocker.mp4 32.15MB
055 Windows - Application Control - Parental controls.mp4 4.87MB
056 Windows - Third Party App Control AV Appguard VoodooShield NoVirusThanks.mp4 12.91MB
057 Windows - Exploitation Prevention - EMET.mp4 37.37MB
058 Windows - Exploitation Prevention - Traps MBEA and HMPA.mp4 11.24MB
059 Windows 10 - Device Guard.mp4 27.84MB
060 Windows - Defender Application Guard for Microsoft Edge.mp4 9.07MB
061 Linux - Access Control Models.mp4 13.35MB
062 Linux - Security frameworks - AppArmor.mp4 4.39MB
063 Linux - Security frameworks - SElinux.mp4 6.67MB
064 Linux - Security frameworks - Grsecurity.mp4 12.78MB
065 Linux - Security frameworks - PaX and more.mp4 3.85MB
066 Linux Mac - File permissions POSIX and ACLs.mp4 19.03MB
067 Mac - Application control - Parental controls.mp4 8.00MB
068 Mac - Application control - Gatekeeper.mp4 10.20MB
069 Mac - Application control - System Integrity Protection.mp4 12.02MB
070 Mac - Application control - Santa.mp4 7.04MB
071 Mac - Application control - Little Flocker.mp4 18.82MB
072 Mac - Other Stuff.mp4 3.69MB
073 The New Normal For End-Point-Protection Technology.mp4 22.41MB
074 Cylance.mp4 9.54MB
075 Goals and Learning Objectives.mp4 7.15MB
076 A Complete Failure to Detect Threats.mp4 11.44MB
077 Rethinking Honeypots.mp4 8.89MB
078 CanaryTokens.mp4 70.27MB
079 OpenCanary.mp4 38.79MB
080 CanaryPi.html 568B
081 Artillery - Binary Defense.mp4 11.10MB
082 Honey Drive.mp4 2.52MB
083 Intrusion Detection Systems IDS Part 1 - Methods.mp4 13.24MB
084 Intrusion Detection Systems IDS Part 2 - Snort Suricata Bro IDS OpenWIPS-n.mp4 9.23MB
085 Host-Based Intrusion Detection - OSSEC.mp4 17.68MB
086 Network Analysis - Sguil Xplico NetworkMiner.mp4 8.85MB
087 File Integrity Monitoring FIM and Checking Part 1.mp4 7.74MB
088 File Integrity Monitoring FIM and Checking Part 2 - Tripwire and El Jefe.mp4 6.25MB
089 Network Security Toolkit NST.mp4 4.80MB
090 Security Onion.mp4 5.78MB
091 Security Information and Event Management Software SIEM.mp4 6.15MB
092 Goals and Learning Objectives.mp4 7.20MB
093 Introduction to Malware and Hacker Hunting.mp4 16.34MB
094 Windows - Farbar Recovery Scanner.mp4 38.05MB
095 Automated Malware Removal Tools.mp4 39.97MB
096 Live Rescue Operating Systems CDs and USBs.mp4 18.32MB
097 Windows - Malware Seek Destroy - Process Explorer - Part 1.mp4 57.77MB
098 Windows - Malware Seek Destroy - Process Explorer - Part 2.mp4 46.71MB
099 Windows - Malware Seek Destroy - Process Tools.mp4 8.78MB
100 Windows - Malware Seek Destroy - Sigcheck.mp4 4.55MB
101 Windows - Malware Seek Destroy - Autoruns.mp4 48.30MB
102 Windows - Malware Seek Destroy - Process Monitor.mp4 76.21MB
103 Windows - Malware Seek Destroy - Network Connections.mp4 23.96MB
104 Malware Seek Destroy - Networkx.mp4 5.41MB
105 Linux - Malware Seek Destroy - Sysdig.mp4 29.64MB
106 Linux - Seek Destroy Malware and Hackers - Csysdig.mp4 43.65MB
107 Linux - Seek Destroy Malware and Hackers - debsums unhide.mp4 4.70MB
108 Linux Mac OS X - Malware Seek Destroy - netstat.mp4 15.28MB
109 Linux Mac OS X - Malware Seek Destroy - lsof.mp4 22.22MB
110 Linux - Malware Seek Destroy - rkhunter.mp4 17.22MB
111 Linux - Malware Seek Destroy - Linux - Chkrootkit Tiger Clamav LMD.mp4 6.18MB
112 Linux - Malware Seek Destroy - Linux - Persistence Part 1.mp4 9.21MB
113 Linux - Malware Seek Destroy - Linux - Persistence Part 2.mp4 27.60MB
114 Linux - Malware Seek Destroy - Linux - Persistence Part 3.mp4 5.22MB
115 Mac - Malware Seek Destroy - Task Explorer.mp4 15.02MB
116 Mac - Malware Seek Destroy KnockKnock BlockBlock KextViewer.mp4 20.46MB
117 Mac Linux Windows - OSquery.mp4 42.29MB
118 Firmware Rootkits Seek and Destroy Part 1.mp4 15.86MB
119 Firmware Rootkits Seek and Destroy Part 2.mp4 8.88MB
120 End-Point-Protection Recovery and Remediation Technology.mp4 10.49MB
121 Encrypted Backup and Cloud Storage.mp4 14.13MB
122 Goals and Learning Objectives.mp4 7.18MB
123 An Introduction to Hardening.mp4 8.90MB
124 Hardening Standards.mp4 41.52MB
125 OpenSCAP.mp4 31.25MB
126 Baseline Auditing.mp4 12.42MB
127 Windows - Hardening.mp4 9.30MB
128 Windows - Security Compliance Manager SCM.mp4 44.87MB
129 Mac Hardening.mp4 3.51MB
130 Linux Hardening.mp4 9.03MB
131 Security Focused Operating Systems.mp4 9.84MB
132 Monitoring for Security Drift.mp4 2.54MB
133 Goals and Learning Objectives.mp4 6.49MB
134 Secure File Deletion - Mechanical drives.mp4 19.68MB
135 Secure File Deletion - Solid Sate Drives.mp4 12.09MB
136 Evidence Elimination Anti-Forensics - An Introduction.mp4 8.27MB
137 Evidence Elimination - CCleaner and Bleachit.mp4 18.26MB
138 Evidence Elimination - Virtual Memory Swap RAM Memory Cache and Buffer.mp4 14.18MB
139 Disk Wiping - Mechanical Drives.mp4 11.43MB
140 Disk Wiping - Solid State Drives SSD.mp4 23.12MB
141 Scrubbing EXIF Metadata Part 1 - Introduction.mp4 16.23MB
142 Scrubbing EXIF Metadata Part 2 - Tools.mp4 20.44MB
143 Scrubbing EXIF Metadata Part 3 - Guidance.mp4 8.41MB
144 Sensor Noise Camera Identification.mp4 9.01MB
145 Goals and Learning Objectives.mp4 9.50MB
146 Clients Protocols and Authentication.mp4 38.18MB
147 Email Weaknesses.mp4 30.77MB
148 PGP GPG Privacy.mp4 12.98MB
149 PGP GPG Clients.mp4 15.03MB
150 Windows - PGP GPG.mp4 58.30MB
151 Tail - PGP GPG.mp4 9.66MB
152 PGP GPG Weaknesses.mp4 14.71MB
153 Improving OpenPGP Security - Best Practices - Part 1.mp4 5.57MB
154 Improving OpenPGP Security - Primary and Subkeys - Part 2.mp4 28.70MB
155 Improving OpenPGP Security - SmartcardsYubikey - Part 3.mp4 22.14MB
156 Email Tracking Exploits.mp4 26.77MB
157 Email Anonymity Pseudonymity.mp4 15.89MB
158 TorBirdy.mp4 21.52MB
159 Remailers.mp4 19.53MB
160 Choosing an Email Provider.mp4 37.37MB
161 Email Alternatives.mp4 7.41MB
162 Goals and Learning Objectives.mp4 2.81MB
163 An Introduction to Instant Messengers.mp4 25.19MB
164 Instant Messenger - Signal.mp4 5.88MB
165 Instant Messengers - Chatsecure.mp4 4.00MB
166 Instant Messengers - Cryptocat.mp4 1.46MB
167 Instant Messengers - Ricochet.mp4 1.47MB
168 Instant Messengers - Other.mp4 1.54MB
169 Video and Voice Messengers - Linphone.mp4 11.50MB
170 Video and Voice Messengers - Jitsi.mp4 3.73MB
171 Video and Voice Messengers - Other.mp4 2.63MB
172 Congratulations.mp4 4.30MB
173 BONUS - Important Information.mp4 6.53MB
174 Certificate Of Completion for CPEs.html 1.61KB
175 BONUS Sample Lecture from Volume 1 - Qubes OS.mp4 56.31MB
176 BONUS Sample Lecture from Volume 2 - Effective Network Isolation.mp4 28.04MB
177 BONUS Sample Lecture from Volume 3 - Socks5 proxy tunneling.mp4 22.99MB
178 BONUS DISCOUNT COUPONS.html 6.61KB
links.txt 127B
links.txt 8.86KB
links.txt 4.44KB
links.txt 116B
links.txt 9.68KB
links.txt 2.24KB
links.txt 7.93KB
links.txt 5.50KB
links.txt 7.45KB
links.txt 7.85KB
links.txt 1.29KB
links.txt 267B
readme.txt 914B
Media Info
Video Format AVC
Resolution 1280 x720
FPS 30
Audio Languages
Subtitle Languages
Distribution statistics by country
Russia (RU) 5
France (FR) 1
Portugal (PT) 1
Bulgaria (BG) 1
Total 8
IP List List of IP addresses which were distributed this torrent