Torrent Info
Title [Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course Hackers Exposed!
Category
Size 4.26GB
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[Tutorialsplanet.NET].url 128B
1.1 Link to The Complete Cyber Security Course - Volume II - Network security + discount coupon studentdiscount25.html 136B
1.1 Nathan's Twitter #GotoNathan.html 91B
1.2 Nathan's Cyber Security Blog.html 99B
1. BONUS DISCOUNT COUPONS .html 4.95KB
1. Congratulations.mp4 5.29MB
1. Congratulations.vtt 1.43KB
1. Goals and Learning Objectives.mp4 1.43MB
1. Goals and Learning Objectives.mp4 2.30MB
1. Goals and Learning Objectives.mp4 2.90MB
1. Goals and Learning Objectives.mp4 1.63MB
1. Goals and Learning Objectives.mp4 1.84MB
1. Goals and Learning Objectives.mp4 2.43MB
1. Goals and Learning Objectives.mp4 1.66MB
1. Goals and Learning Objectives.mp4 1.73MB
1. Goals and Learning Objectives.vtt 463B
1. Goals and Learning Objectives.vtt 758B
1. Goals and Learning Objectives.vtt 1.09KB
1. Goals and Learning Objectives.vtt 592B
1. Goals and Learning Objectives.vtt 704B
1. Goals and Learning Objectives.vtt 852B
1. Goals and Learning Objectives.vtt 584B
1. Goals and Learning Objectives.vtt 639B
1. Goals and Learning Objectives - Removing Privilege.mp4 13.59MB
1. Goals and Learning Objectives - Removing Privilege.vtt 3.72KB
1. Theory and Practical.mp4 2.25MB
1. Theory and Practical.vtt 1.35KB
1. Welcome and Introduction to the Instructor!.mp4 19.90MB
1. Welcome and Introduction to the Instructor!.vtt 1.88KB
10.1 Apparmor.html 105B
10.1 CA Ecosystem.html 105B
10.1 httpsblogs.windows.comwindowsexperience20160510announcing-windows-10-insider-preview-build-14342#31Zq2yELkheC9HyV.99.html 186B
10.1 Top 10 scams.html 127B
10.2 CA example mistake.html 180B
10.2 httpwww.actionfraud.police.uktypes_of_fraud.html 108B
10.2 Script Sandfox.html 118B
10.3 Firejail.html 92B
10.3 httpwww.consumerfraudreporting.org.html 98B
10.3 SSL Sniff.html 107B
10.4 Cert Fingerprints.html 97B
10.4 Linux Sandbox.html 96B
10.5 Certificate patrol.html 127B
10.5 Trusted BSD.html 87B
10. Certificate Authorities and HTTPS.mp4 199.31MB
10. Certificate Authorities and HTTPS.vtt 16.46KB
10. Defense In Depth.mp4 3.00MB
10. Defense In Depth.vtt 1.59KB
10. Firefox - Browser and extension updates.mp4 34.02MB
10. Firefox - Browser and extension updates.vtt 5.96KB
10. Linux - Sandboxes and Application Isolation.mp4 13.86MB
10. Linux - Sandboxes and Application Isolation.vtt 3.58KB
10. Social engineering - Scams, cons, tricks and fraud.mp4 11.92MB
10. Social engineering - Scams, cons, tricks and fraud.vtt 5.94KB
10. Windows 10 - WiFi Sense.mp4 59.76MB
10. Windows 10 - WiFi Sense.vtt 4.85KB
11.10 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html 116B
11.1 Cryptocurrency Mining Malware Infected Over Half-Million PCs Using an NSA Exploit.html 129B
11.1 GWX Control Panel.html 100B
11.1 Sandbox Man page.html 165B
11.2 Apple Sandbox Guide.html 139B
11.2 httpstorrentfreak.compirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011.html 146B
11.2 httpwww.zdnet.comarticlehow-to-block-windows-10-upgrades-on-your-business-network-and-at-home-too.html 164B
11.3 httpsgithub.comhoshsadiqadblock-nocoin-list.html 110B
11.3 Microsoft - How to manage Windows 10 notification and upgrade options.html 107B
11.3 OSX-Sandbox--Seatbelt--Profiles.html 119B
11.4 httpsthehackernews.com201802cryptojacking-malware.html.html 121B
11.4 Mac OS X - App Sandbox.html 193B
11.4 Never 10 by Steve Gibson (Use this!).html 92B
11.5 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html 136B
11.5 SuperDuper.html 127B
11.6 Firefox profile.html 132B
11.6 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html 122B
11.7 Buckle Up.html 97B
11.7 httpswww.engadget.com20180213attackers-telegram-deliver-cryptocurrency-mining-malware.html 154B
11.8 How to run your Applications in a Mac OS X sandbox to enhance security.html 176B
11.8 httpsarstechnica.cominformation-technology201801now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners.html 184B
11.9 httpscoinhive.com.html 82B
11. Chrome - Browser and extension updates.mp4 3.57MB
11. Chrome - Browser and extension updates.vtt 1.75KB
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 16.19MB
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.vtt 9.64KB
11. End-to-End Encryption (E2EE).mp4 8.19MB
11. End-to-End Encryption (E2EE).vtt 2.00KB
11. Mac - Sandboxes and Application Isolation.mp4 23.80MB
11. Mac - Sandboxes and Application Isolation.vtt 7.54KB
11. The Zero Trust Model.mp4 10.27MB
11. The Zero Trust Model.vtt 4.27KB
11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4 105.52MB
11. Windows 7, 8 and 8.1 - Privacy & Tracking.vtt 7.71KB
12.1 httpsgithub.comfix-macosxyosemite-phone-home.html 110B
12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html 121B
12.1 OpenPuff Manual.html 107B
12.1 Virt Manager.html 86B
12.2 httpsgithub.comkarek314macOS-home-call-drop.html 109B
12.2 OpenPuff.html 116B
12.2 Wikipedia - Hypervisor.html 101B
12.3 KVM Debian Jessie.html 98B
12.3 List of Steg Tools.html 105B
12.3 Washingtonpost - How apples os x yosemite tracks-you.html 213B
12.4 Fix Mac OS X.html 84B
12.4 httpwww.spammimic.com.html 85B
12.4 Wikipedia - Kernel-based Virtual Machine.html 119B
12.5 httpsgithub.comfix-macosxnet-monitor.html 102B
12.5 Wikipedia - Comparison of platform virtualization software.html 137B
12.6 OpenVZ.html 90B
12.7 Turnkey Linux - Openvpn.html 97B
12. Darknets, Dark Markets and Exploit kits.mp4 32.43MB
12. Darknets, Dark Markets and Exploit kits.vtt 8.24KB
12. IE and Edge - Browser and extention updates.mp4 5.64MB
12. IE and Edge - Browser and extention updates.vtt 1.02KB
12. Mac - Privacy & Tracking.mp4 57.97MB
12. Mac - Privacy & Tracking.vtt 5.11KB
12. Steganography.mp4 104.31MB
12. Steganography.vtt 8.60KB
12. Virtual Machines.mp4 44.44MB
12. Virtual Machines.vtt 17.10KB
13.1 Example VMware security bug.html 123B
13.1 httpswww.debian.org.html 84B
13.1 Security Pitfalls.html 135B
13.2 httpdistrowatch.com.html 84B
13.2 Venom.html 90B
13.3 A look at malware with VM detection.html 161B
13.3 httpswww.openbsd.org.html 85B
13.4 httpsen.wikipedia.orgwikiX86_virtualization.html 109B
13.4 httpswww.archlinux.org.html 87B
13.5 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html 110B
13.6 Exploiting dram rowhammer (Could be used on VMs in the future).html 152B
13.7 httpsen.wikipedia.orgwikiCovert_channel.html 105B
13.8 httpsen.wikipedia.orgwikiTiming_channel.html 105B
13. Auto updates - The Impact to privacy and anonymity.mp4 4.30MB
13. Auto updates - The Impact to privacy and anonymity.vtt 2.67KB
13. Governments, spies and secret stuff part I.mp4 27.03MB
13. Governments, spies and secret stuff part I.vtt 5.91KB
13. How Security and Encryption is Really Attacked.mp4 17.36MB
13. How Security and Encryption is Really Attacked.vtt 3.09KB
13. Linux and Unix “like” Operating systems.mp4 46.23MB
13. Linux and Unix “like” Operating systems.vtt 3.79KB
13. Virtual Machine Weaknesses.mp4 22.74MB
13. Virtual Machine Weaknesses.vtt 14.92KB
14.1 Convert VM to ISO.html 109B
14.1 httpwww.nsaplayset.org.html 87B
14.1 Manjaro - httpsmanjaro.org.html 81B
14.2 httpsnsa.gov1.infodninsa-ant-catalog.html 103B
14.2 Ubuntu - httpswww.ubuntu.com.html 84B
14.3 httpscryptome.org201401nsa-codenames.htm.html 107B
14.3 Linux Mint - httpslinuxmint.com.html 83B
14.4 httpswikileaks.org-Leaks-.html.html 95B
14.5 httpstheintercept.com.html 86B
14.6 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html 104B
14. General Use Operating Systems (Windows, MacOS and Linux).mp4 46.91MB
14. General Use Operating Systems (Windows, MacOS and Linux).vtt 5.01KB
14. Governments, spies and secret stuff part II.mp4 30.24MB
14. Governments, spies and secret stuff part II.vtt 10.72KB
14. Virtual Machine Hardening.mp4 36.97MB
14. Virtual Machine Hardening.vtt 13.06KB
15.10 A Worldwide Survey of Encryption Products - pdf.html 153B
15.11 httpswww.csoonline.comarticle3213033securitynsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.html 193B
15.12 Report - Keys Under Doormats Mandating insecurity by requiring government access to all data and communication.html 150B
15.13 httpwww.crypto.compapersgovernmentreform-blaze2015.pdf.html 120B
15.1 Debian - httpswww.debian.org.html 84B
15.1 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html 137B
15.1 httpswww.whonix.org.html 84B
15.2 Archlinux - httpswww.archlinux.org.html 87B
15.2 Kazakhstans new encryption law.html 185B
15.2 Whonix Stream Isolation.html 105B
15.3 OpenBSD - httpswww.openbsd.org.html 85B
15.3 WhatsApp was Banned for 48 Hours in Brazil.html 112B
15.3 Whonix and virtualbox.html 99B
15.4 ARM - Anonymizing relay monitor.html 108B
15.4 UK data communications bill.html 121B
15.5 Clipper chip.html 192B
15.5 Whonix Check.html 100B
15.6 Matt Blaze Speaking to a US congressional committee.html 107B
15.6 Whonix Features.html 97B
15.7 How to implement physical isolation.html 131B
15.7 The Case against Regulating Encryption Technology.html 112B
15.8 A Worldwide Survey of E ncryption Products - xls.html 154B
15.8 Whonix VM snapshots.html 116B
15.9 httpwww.washingtonsblog.com201505nsa-admits-it-collects-too-much-info-to-stop-terror-attacks.html.html 164B
15.9 If setting up your own workstations - MUST READ.html 112B
15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).mp4 39.41MB
15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).vtt 6.06KB
15. Regulating encryption, mandating insecurity & legalizing spying.mp4 42.74MB
15. Regulating encryption, mandating insecurity & legalizing spying.vtt 15.78KB
15. Whonix OS - Anonymous Operating system.mp4 88.65MB
15. Whonix OS - Anonymous Operating system.vtt 27.52KB
16.1 Apple removes malware infected apps from the app store.html 165B
16.1 Trisquel OS - httpstrisquel.info.html 83B
16.1 Whonix's lack of an Amnesic feature.html 190B
16.2 Astra Linux - httpastralinux.ru.html 82B
16.2 Examples of backdoors.html 123B
16.2 Whonix - Warnings.html 96B
16.3 Apple backdoor order.html 112B
16.3 Subgraph OS - httpssubgraph.comsgos.html 87B
16.4 Formal methods.html 105B
16.4 Qubes OS - httpswww.qubes-os.org.html 86B
16.5 Hardened Gentoo Linux - httpswiki.gentoo.orgwikiProjectHardened.html 106B
16.5 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html 133B
16.6 Security-Enhanced Linux (SELinux) - httpsgithub.comSELinuxProject.html 94B
16.6 Video on how to build your own software reproducibly.html 142B
16.7 httpsblog.torproject.orgblogdeterministic-builds-part-one-cyberwar-and-global-compromise.html 154B
16.7 PureOS - httpswww.pureos.net.html 84B
16.8 httpsreproducible-builds.org.html 93B
16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).mp4 32.32MB
16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).vtt 3.49KB
16. Trust & Backdoors.mp4 24.49MB
16. Trust & Backdoors.vtt 11.01KB
16. Whonix OS - Weaknesses.mp4 15.79MB
16. Whonix OS - Weaknesses.vtt 6.24KB
17.10 Hardware Compatibility List (HCL).html 90B
17.1 Disposable VMs (DispVMs).html 97B
17.1 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html 129B
17.1 Whonix - httpswww.whonix.org.html 84B
17.2 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html 132B
17.2 Qubes docs.html 90B
17.2 Qubes OS - httpswww.qubes-os.org.html 86B
17.3 Debian template(s).html 107B
17.3 httpsearchenginewatch.comsewnews2351154google-censorship-ruling-in-canada-has-worldwide-implications.html 168B
17.3 Tails OS - httpstails.boum.org.html 84B
17.4 Qubes Download.html 96B
17.5 Windows templates.html 108B
17.6 Whonix templates.html 105B
17.7 Split GPG.html 100B
17.8 Librem 13 laptop.html 105B
17.9 Video Tour of Qubes.html 91B
17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4 21.54MB
17. Anonymity Focused Operating Systems (Tails and Whonix OS).vtt 3.53KB
17. Censorship.mp4 6.49MB
17. Censorship.vtt 2.73KB
17. Qubes OS.mp4 78.73MB
17. Qubes OS.vtt 26.33KB
18.1 httpwww.stationx.netalerts.html 91B
18.1 Kali Linux - httpswww.kali.org.html 82B
18.1 Partitioning my digital life into security domains.html 145B
18.2 BlackArch Linux - httpsblackarch.org.html 83B
18.3 BackBox Linux - httpsbackbox.org.html 81B
18.4 Parrot GNULinux - httpswww.parrotsec.org.html 87B
18.5 Pentoo - httpswww.pentoo.ch.html 83B
18. Cyber Threat Intelligence – Stay Informed.mp4 2.61MB
18. Cyber Threat Intelligence – Stay Informed.vtt 1.07KB
18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4 13.38MB
18. Penetration Testing and Ethical Hacking Focused Operating Systems.vtt 1.15KB
18. Security Domains, Isolation and Compartmentalization.mp4 14.98MB
18. Security Domains, Isolation and Compartmentalization.vtt 6.55KB
19.1 iOS - httpsdeveloper.apple.comios.html 93B
19.2 LineageOS - httpslineageos.org.html 83B
19.3 Replicant - Httpswww.replicant.us.html 86B
19.4 PureOS Librem 5 - httpspuri.smshoplibrem-5.html 91B
19.5 Android - httpswww.android.com.html 85B
19.6 MicroG - httpsmicrog.org.html 80B
19.7 OmniROM - httpswww.omnirom.org.html 85B
19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).mp4 46.71MB
19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).vtt 2.99KB
2.10 httpvirtualboxes.orgimages.html 92B
2.11 Windows VMs here.html 124B
2.1 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html 132B
2.1 httpsen.wikipedia.orgwikiHypervisor.html 101B
2.1 httpstosdr.org.html 79B
2.1 httpswww.stationx.netcanarytokens.html 99B
2.1 httpswww.stationx.netcertificate-request.html 106B
2.2 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html 137B
2.2 httpsen.wikipedia.orgwikiComparison_of_platform_virtualization_software.html 137B
2.2 httpwww.telegraph.co.uktechnologysocial-media9780565Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html.html 188B
2.3 httpswww.eff.orgwho-has-your-back-government-data-requests-2015.html 128B
2.3 httpwww.osboxes.orgvirtualbox-images.html 102B
2.4 httpwww.osboxes.orgguide#!.html 92B
2.4 The complete guide to facebook privacy settings.html 136B
2.5 httpfriendica.com.html 82B
2.5 httpwww.osboxes.orgvmware-images.html 98B
2.6 httpsdiasporafoundation.org.html 92B
2.6 httpvirtual-machine.org.html 88B
2.7 Twitter Privacy Settings.html 120B
2.7 Vmware Network Adapter Settings.html 191B
2.8 httpsgnu.iosocialtry.html 87B
2.8 Virtualbox Network Adapter Settings.html 104B
2.9 httpsmarketplace.vmware.com.html 92B
2.9 List of Personally Identifiable Information (PII).html 134B
2. Certificate Of Completion for CPEs.mp4 2.20MB
2. Certificate Of Completion for CPEs.vtt 1.12KB
2. Goals and Learning Objectives.mp4 2.70MB
2. Goals and Learning Objectives.vtt 905B
2. Information Disclosure and Identity Strategies for Social Media.mp4 83.82MB
2. Information Disclosure and Identity Strategies for Social Media.vtt 22.48KB
2. Introduction to Isolation and Compartmentalization.mp4 5.67MB
2. Introduction to Isolation and Compartmentalization.vtt 3.04KB
2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 113.36MB
2. Introduction to Setting up a Testing Environment Using Virtual Machines.vtt 10.77KB
2. Security Domains.mp4 21.84MB
2. Security Domains.vtt 15.14KB
2. Security Features and Functionality.mp4 57.90MB
2. Security Features and Functionality.vtt 6.88KB
2. Security Quick Win!.mp4 43.20MB
2. Security Quick Win!.vtt 15.27KB
2. Symmetric Encryption.mp4 32.31MB
2. Symmetric Encryption.vtt 9.99KB
2. The Importance of Patching.mp4 11.66MB
2. The Importance of Patching.vtt 5.84KB
2. Why You Need Security – The Value Of A Hack.mp4 28.93MB
2. Why You Need Security – The Value Of A Hack.vtt 5.90KB
2. Windows 7 - Not using admin.mp4 11.00MB
2. Windows 7 - Not using admin.vtt 4.98KB
20.1 Download Debian.html 92B
20.2 Debian Live CDDVD.html 92B
20.3 Free Debian Books and Guides.html 93B
20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 57.78MB
20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.vtt 57.78MB
3.10 httpfreemail.ms.html 80B
3.11 httpsanonbox.net.html 81B
3.12 httpgetairmail.com.html 83B
3.13 http10minutemail.com10MinuteMailindex.html.html 108B
3.14 httpwww.migmail.net.html 84B
3.15 Example SMS recieve online site.html 96B
3.16 Top 10 sites receive sms online without phone.html 135B
3.17 httpdontmail.net.html 81B
3.1 Diagram of Mac.html 131B
3.1 httpsmailinator.com.html 84B
3.1 httpsresearch.google.compubspub43963.html.html 107B
3.1 httpwww.vmware.comproductsworkstationcompare.html.html 116B
3.1 Top 50 products vs security bugs.html 114B
3.2 httpbugmenot.com.html 81B
3.2 httpwww.vmware.comproductsplayerfaqsfaqs.html.html 113B
3.2 Report - Buying Into the Bias Why Vulnerability Statistics Suck.html 168B
3.2 Windows - Tmac.html 89B
3.3 httpswww.guerrillamail.com.html 92B
3.3 Linux - How to use macchanger.html 132B
3.4 httpwww.mytrashmail.com.html 88B
3.4 Mac OS X - How to change the mac address.html 141B
3.5 httpwww.dispostable.com.html 88B
3.5 Mac OS X - Macdaddyx.html 109B
3.6 httpwww.mailexpire.com.html 87B
3.6 Mac OS X - Wifispoof.html 83B
3.7 httpwww.tempinbox.com.html 85B
3.8 httpswww.trash-mail.comen.html 91B
3.9 httpcrapmail.dken.html 83B
3. Asymmetric Encryption.mp4 72.32MB
3. Asymmetric Encryption.vtt 11.46KB
3. Goals and Learning Objectives - Volume 1.mp4 16.11MB
3. Goals and Learning Objectives - Volume 1.vtt 2.55KB
3. Identify Verification and Registration.mp4 23.40MB
3. Identify Verification and Registration.vtt 8.44KB
3. Physical and Hardware Isolation - How to change the Mac Address.mp4 25.58MB
3. Physical and Hardware Isolation - How to change the Mac Address.vtt 9.91KB
3. Protect What You Value.mp4 8.94MB
3. Protect What You Value.vtt 4.76KB
3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4 48.07MB
3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).vtt 21.59KB
3. Security Bugs and Vulnerabilities.mp4 83.90MB
3. Security Bugs and Vulnerabilities.vtt 6.17KB
3. The Top 3 Things You Need To Stay Safe Online.mp4 2.50MB
3. The Top 3 Things You Need To Stay Safe Online.vtt 1.45KB
3. Vmware.mp4 110.48MB
3. Vmware.vtt 10.66KB
3. Windows 7 - Auto Update.mp4 4.94MB
3. Windows 7 - Auto Update.vtt 1.63KB
3. Windows 8 and 8.1 - Not using admin.mp4 18.24MB
3. Windows 8 and 8.1 - Not using admin.vtt 5.58KB
4.1 Example hashes.html 104B
4.1 Exploit Kit Landscape Map.html 99B
4.1 httpswww.virtualbox.org.html 88B
4.1 httpwww.google.com.stationx.net.html 95B
4.1 OS usage share.html 125B
4.1 Windows - CPU Z.html 103B
4.2 CVE details.html 88B
4.2 httpwww.urlvoid.com.html 84B
4.2 Windows - dmidecode.html 115B
4.3 httpswww.exploit-db.comsearch.html 95B
4.3 Mac OS X - Mac Cupid.html 120B
4.4 Linux - i-nex.html 88B
4.5 Linux and Mac OS X - dmidecode.html 93B
4.6 Mac OS X - Installing dmidecode with brew.html 119B
4.7 httpswww.yubico.com.html 84B
4.8 httpswww.nitrokey.com.html 87B
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4 23.30MB
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.vtt 12.95KB
4. Hash Functions.mp4 89.24MB
4. Hash Functions.vtt 6.30KB
4. Physical and Hardware Isolation - Hardware Serials.mp4 50.25MB
4. Physical and Hardware Isolation - Hardware Serials.vtt 15.96KB
4. Sample from Vol 2 - Password cracking part 2.mp4 24.16MB
4. Sample from Vol 2 - Password cracking part 2.vtt 11.74KB
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 38.11MB
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.vtt 10.62KB
4. Target Audience.mp4 7.33MB
4. Target Audience.vtt 3.23KB
4. Usage Share.mp4 34.29MB
4. Usage Share.vtt 5.53KB
4. Virtual box.mp4 144.16MB
4. Virtual box.vtt 10.82KB
4. What is Privacy, Anonymity and Pseudonymity.mp4 11.87MB
4. What is Privacy, Anonymity and Pseudonymity.vtt 5.07KB
4. Windows 10 - Not using admin.mp4 14.15MB
4. Windows 10 - Not using admin.vtt 4.58KB
4. Windows 8 & 8.1 - Auto Update.mp4 6.54MB
4. Windows 8 & 8.1 - Auto Update.vtt 1.84KB
5.1 httpswww.parsemail.org.html 87B
5.1 httpswww.symantec.comenukcode-signing.html 107B
5.1 Kali iso here if you want to install on a computer's hard disk or live boot it..html 92B
5.1 Microsoft Privacy Statement.html 114B
5.1 Portable Apps.html 85B
5.1 The Cyber Security Landscape Diagram.jpg.jpg 777.15KB
5.2 How to Get Email Headers.html 111B
5.2 Kali on Microsoft App Store as an official WSL.html 123B
5.2 Pen Drive Apps.html 89B
5.2 Windows 10 Device Guard using Digital Signatures.html 174B
5.2 With Windows 10, Microsoft Blatantly Disregards User Choice and Privacy A Deep Dive.html 174B
5.3 Aegis Secure Key - USB 2.0 Flash Drive.html 108B
5.3 httpswww.virustotal.comendocumentationemail-submissions.html 123B
5.3 Kali AWS appliance.html 109B
5.3 Microsoft Service Agreement.html 123B
5.4 Cortana privacy faq.html 126B
5.4 httpswhois.domaintools.combbc.co.uk.html 100B
5.4 Kali images for Virtualbox or VMware.html 150B
5.4 Maxthon.html 84B
5.5 Authentic8.html 97B
5.5 httpswhois.domaintools.comblob.com.html 99B
5.5 Kali Arm hardware.html 118B
5.6 Spoons.net.html 88B
5.7 Spikes.html 91B
5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4 49.31MB
5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.vtt 17.75KB
5. Digital Signatures.mp4 42.73MB
5. Digital Signatures.vtt 5.08KB
5. Hackers, crackers and cyber criminals.mp4 7.70MB
5. Hackers, crackers and cyber criminals.vtt 2.99KB
5. Kali Linux 2018.mp4 59.63MB
5. Kali Linux 2018.vtt 4.77KB
5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4 31.76MB
5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.vtt 21.23KB
5. Security, Vulnerabilities, Threats and Adversaries.mp4 11.23MB
5. Security, Vulnerabilities, Threats and Adversaries.vtt 4.65KB
5. Study Recommendations.mp4 17.95MB
5. Study Recommendations.vtt 6.48KB
5. Virtual Isolation.mp4 57.32MB
5. Virtual Isolation.vtt 12.84KB
5. Windows 10 - Auto Update.mp4 4.94MB
5. Windows 10 - Auto Update.vtt 1.73KB
5. Windows 10 - Privacy & Tracking.mp4 79.95MB
5. Windows 10 - Privacy & Tracking.vtt 6.96KB
6.1 Common Vulnerabilities and Exposures.html 85B
6.1 Dual Booting explained.html 177B
6.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html 117B
6.1 httpswww.securityforum.org.html 91B
6.1 httpwww.consumerfraudreporting.orgcredit_freeze_summary.php.html 124B
6.1 Malware stats.html 107B
6.1 Mozilla Cipher Suite Recommendations.html 110B
6.2 7 most common RATs.html 149B
6.2 httpswww.iso.orgstandard56742.html.html 100B
6.2 httpwww.scambusters.org.html 88B
6.2 National vulnerability database.html 85B
6.2 Wikipedia Transport Layer Security (TLS) page.html 115B
6.3 httpswww.stationx.netsabsa.html 92B
6.3 httpwww.actionfraud.police.uktypes_of_fraud.html 108B
6.3 Microsoft Security Bulletins.html 115B
6.3 Report - Spotlight perils of malvertisements.html 142B
6.3 Weakdh Cipher Suite Recommendations.html 93B
6.4 Chef Jamie Oliver’s website hacked for the third time.html 106B
6.4 Steve Gibson's Cipher Suite Recommendations.html 117B
6.4 Windows 10 Ditches Patch Tuesday for Security's Sake.html 178B
6.5 Patch Tuesday may be dead, but Microsoft's not confessing to the crime.html 197B
6.5 SophosLabs 2018 Malware Forecast.html 162B
6. Asset Selection.mp4 7.68MB
6. Asset Selection.vtt 3.55KB
6. Course updates.mp4 4.39MB
6. Course updates.vtt 787B
6. Dual Boot.mp4 7.93MB
6. Dual Boot.vtt 4.42KB
6. Malware, viruses, rootkits and RATs.mp4 12.14MB
6. Malware, viruses, rootkits and RATs.vtt 7.27KB
6. Sample from Vol 4 - Email clients, protocols and authentication.mp4 38.19MB
6. Sample from Vol 4 - Email clients, protocols and authentication.vtt 19.41KB
6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 160.85MB
6. Secure Sockets Layer (SSL) and Transport layer security (TLS).vtt 13.65KB
6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp4 14.52MB
6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).vtt 8.29KB
6. Windows 10 - Disable tracking automatically.mp4 67.89MB
6. Windows 10 - Disable tracking automatically.vtt 5.67KB
6. Windows - Criticality and Patch Tuesday.mp4 41.81MB
6. Windows - Criticality and Patch Tuesday.vtt 4.09KB
7.1 Chromium sandbox design.html 121B
7.1 Flexera Personal Software Inspector - Previously Secunia PSI.html 174B
7.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html 117B
7.1 httpwww.telegraph.co.uknewsworldnewsnorthamericausa11416985Millions-of-computers-may-be-compromised-by-US-spyware-report.html.html 195B
7.1 SSL Strip tool By Moxie Marlinspike.html 107B
7.2 Cain & Abel.html 89B
7.2 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html 135B
7.2 Mozilla Sandbox design.html 102B
7.3 httpssecurelist.comanalysisquarterly-malware-reports72493it-threat-evolution-in-q3-2015.html 156B
7.3 Intro to Sniffers.html 127B
7.4 httpwww.slate.comarticlestechnologybitwise201502lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html.html 198B
7.4 sniffdet - Remote Sniffer Detection ToolLibrary.html 93B
7.5 Arpwatch Tool to Monitor Ethernet Activity in Linux.html 119B
7.6 WIFI Pineapple.html 91B
7. Built-in Sandboxes and Application Isolation.mp4 10.40MB
7. Built-in Sandboxes and Application Isolation.vtt 4.43KB
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 10.77MB
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.vtt 5.33KB
7. SSL Stripping.mp4 114.51MB
7. SSL Stripping.vtt 13.34KB
7. Threat Modeling and Risk Assessments.mp4 18.03MB
7. Threat Modeling and Risk Assessments.vtt 9.18KB
7. Windows 10 - Tool Disable Windows 10 Tracking.mp4 98.43MB
7. Windows 10 - Tool Disable Windows 10 Tracking.vtt 7.63KB
7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4 19.36MB
7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.vtt 10.96KB
8.1 BufferZone.html 112B
8.1 Cortana privacy faq.html 126B
8.1 Debian Security Page.html 93B
8.1 Server Name Indication (SNI) Wiki.html 113B
8.1 XSS example vulnerability.html 136B
8.2 How to disable cortana-on Windows 10.html 147B
8.2 Live phishing links.html 87B
8.2 Shadowdefender.html 91B
8.2 Software distributions based on Debian.html 105B
8.3 Automatic Security Updates.html 119B
8.3 Deepfreeze Standard.html 121B
8.3 Homograph attack using internationalized domain name.html 134B
8.3 How to Disable Cortana in Windows 10’s Anniversary Update.html 130B
8.4 Deepfreeze Cloud Browser and Desktop.html 129B
8.5 f-sandbox.html 92B
8.6 Returnil.html 118B
8.7 Comodo.html 110B
8. HTTPS (HTTP Secure).mp4 81.90MB
8. HTTPS (HTTP Secure).vtt 6.98KB
8. Linux - Debian - Patching.mp4 38.49MB
8. Linux - Debian - Patching.vtt 15.21KB
8. Security vs Privacy vs Anonymity - Can we have it all.mp4 5.44MB
8. Security vs Privacy vs Anonymity - Can we have it all.vtt 2.52KB
8. What is Phishing, Vishing and SMShing.mp4 25.99MB
8. What is Phishing, Vishing and SMShing.vtt 15.35KB
8. Windows 10 – Cortana.mp4 41.02MB
8. Windows 10 – Cortana.vtt 3.80KB
8. Windows - Sandboxes and Application Isolation.mp4 26.36MB
8. Windows - Sandboxes and Application Isolation.vtt 8.78KB
9.1 Apple security updates.html 101B
9.1 httpswww.stationx.netsabsa.html 92B
9.1 Sandboxie How it Works.html 106B
9.1 SmartScreen Filter FAQ.html 145B
9.1 Spam example.html 142B
9.2 Complete guide windows 10 privacy settings.html 134B
9.2 httpbrew.sh.html 76B
9.2 Introduction and quick guide sandboxie.html 143B
9.2 Spam stats.html 104B
9.3 httpsen.wikipedia.orgwikiParkerian_Hexad.html 106B
9.3 igeekblogs - How to enable updates.html 134B
9.3 Sandboxie guide.html 118B
9.4 httpsen.wikipedia.orgwikiNon-repudiation.html 106B
9.4 Mac Update.html 86B
9.4 Sandboxie forum.html 96B
9.5 httpsen.wikipedia.orgwikiAuthorization.html 104B
9.6 httpsen.wikipedia.orgwikiAuthentication.html 105B
9. Confidentiality, Integrity and Availability - (Security Attributes).mp4 19.34MB
9. Confidentiality, Integrity and Availability - (Security Attributes).vtt 10.37KB
9. Digital Certificates.mp4 81.97MB
9. Digital Certificates.vtt 6.13KB
9. Mac - Patching.mp4 55.58MB
9. Mac - Patching.vtt 9.23KB
9. Spamming & Doxing.mp4 4.79MB
9. Spamming & Doxing.vtt 3.51KB
9. Windows 10 – Privacy Settings.mp4 86.46MB
9. Windows 10 – Privacy Settings.vtt 9.65KB
9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4 70.12MB
9. Windows - Sandboxes and Application Isolation - Sandboxie.vtt 15.22KB
Distribution statistics by country
Russia (RU) 2
France (FR) 1
United Kingdom (GB) 1
India (IN) 1
Total 5
IP List List of IP addresses which were distributed this torrent