Torrent Info
Title The Complete Cyber Security Course Hackers Exposed!
Category
Size 4.30GB
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
[TGx]Downloaded from torrentgalaxy.to .txt 585B
0 951.65KB
1 152.06KB
1.1 Link to The Complete Cyber Security Course - Volume II - Network security + discount coupon studentdiscount25.html 136B
1.1 Nathan's Twitter #GotoNathan.html 91B
1.2 LinkedIn - Join my network..html 101B
1.3 Nathan's Cyber Security Blog.html 99B
1. BONUS - How to Start a Career in Cyber Security.html 1.21KB
1. Congratulations.mp4 5.29MB
1. Congratulations.srt 1.56KB
1. Goals and Learning Objectives.mp4 2.89MB
1. Goals and Learning Objectives.mp4 2.43MB
1. Goals and Learning Objectives.mp4 2.29MB
1. Goals and Learning Objectives.mp4 1.84MB
1. Goals and Learning Objectives.mp4 1.73MB
1. Goals and Learning Objectives.mp4 1.66MB
1. Goals and Learning Objectives.mp4 1.63MB
1. Goals and Learning Objectives.mp4 1.43MB
1. Goals and Learning Objectives.srt 1.20KB
1. Goals and Learning Objectives.srt 637B
1. Goals and Learning Objectives.srt 764B
1. Goals and Learning Objectives.srt 937B
1. Goals and Learning Objectives.srt 823B
1. Goals and Learning Objectives.srt 691B
1. Goals and Learning Objectives.srt 640B
1. Goals and Learning Objectives.srt 501B
1. Goals and Learning Objectives - Removing Privilege.mp4 13.59MB
1. Goals and Learning Objectives - Removing Privilege.srt 4.15KB
1. Theory and Practical.mp4 2.24MB
1. Theory and Practical.srt 1.51KB
1. Welcome and Introduction to the Instructor!.mp4 19.90MB
1. Welcome and Introduction to the Instructor!.srt 2.11KB
10 369.40KB
10.1 Apparmor.html 105B
10.1 httpsblogs.windows.comwindowsexperience20160510announcing-windows-10-insider-preview-build-14342#31Zq2yELkheC9HyV.99.html 186B
10.1 SSL Sniff.html 107B
10.1 Top 10 scams.html 127B
10.2 Cert Fingerprints.html 97B
10.2 httpwww.actionfraud.police.uktypes_of_fraud.html 108B
10.2 Trusted BSD.html 87B
10.3 Certificate patrol.html 127B
10.3 httpwww.consumerfraudreporting.org.html 98B
10.3 Linux Sandbox.html 96B
10.4 CA Ecosystem.html 105B
10.4 Firejail.html 92B
10.5 CA example mistake.html 180B
10.5 Script Sandfox.html 118B
10. Certificate Authorities and HTTPS.mp4 199.30MB
10. Certificate Authorities and HTTPS.srt 18.71KB
10. Defense In Depth.mp4 2.99MB
10. Defense In Depth.srt 1.79KB
10. Firefox - Browser and extension updates.mp4 34.01MB
10. Firefox - Browser and extension updates.srt 6.56KB
10. Linux - Sandboxes and Application Isolation.mp4 13.85MB
10. Linux - Sandboxes and Application Isolation.srt 3.89KB
10. Social engineering - Scams, cons, tricks and fraud.mp4 11.92MB
10. Social engineering - Scams, cons, tricks and fraud.srt 6.71KB
10. Windows 10 - WiFi Sense.mp4 59.76MB
10. Windows 10 - WiFi Sense.srt 5.48KB
100 348.06KB
101 379.54KB
102 575.62KB
103 727.29KB
104 47.34KB
105 74.94KB
106 212.78KB
107 721.03KB
108 442.36KB
109 12.34KB
11 557.22KB
11.10 httpstorrentfreak.compirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011.html 146B
11.1 httpsthehackernews.com201802cryptojacking-malware.html.html 121B
11.1 httpwww.zdnet.comarticlehow-to-block-windows-10-upgrades-on-your-business-network-and-at-home-too.html 164B
11.1 OSX-Sandbox--Seatbelt--Profiles.html 119B
11.2 Firefox profile.html 132B
11.2 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html 136B
11.2 Never 10 by Steve Gibson (Use this!).html 92B
11.3 Apple Sandbox Guide.html 139B
11.3 GWX Control Panel.html 100B
11.3 httpswww.engadget.com20180213attackers-telegram-deliver-cryptocurrency-mining-malware.html 154B
11.4 Buckle Up.html 97B
11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html 116B
11.4 Microsoft - How to manage Windows 10 notification and upgrade options.html 107B
11.5 httpscoinhive.com.html 82B
11.5 SuperDuper.html 127B
11.6 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html 122B
11.6 Mac OS X - App Sandbox.html 193B
11.7 How to run your Applications in a Mac OS X sandbox to enhance security.html 176B
11.7 httpsgithub.comhoshsadiqadblock-nocoin-list.html 110B
11.8 httpsarstechnica.cominformation-technology201801now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners.html 184B
11.8 Sandbox Man page.html 165B
11.9 Cryptocurrency Mining Malware Infected Over Half-Million PCs Using an NSA Exploit.html 129B
11. Chrome - Browser and extension updates.mp4 3.57MB
11. Chrome - Browser and extension updates.srt 1.93KB
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 16.19MB
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.srt 10.83KB
11. End-to-End Encryption (E2EE).mp4 8.19MB
11. End-to-End Encryption (E2EE).srt 2.22KB
11. Mac - Sandboxes and Application Isolation.mp4 23.79MB
11. Mac - Sandboxes and Application Isolation.srt 8.25KB
11. The Zero Trust Model.mp4 10.28MB
11. The Zero Trust Model.srt 4.86KB
11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4 105.52MB
11. Windows 7, 8 and 8.1 - Privacy & Tracking.srt 8.74KB
110 111.47KB
111 305.22KB
112 396.95KB
113 514.75KB
114 586.66KB
115 725.55KB
116 780.21KB
117 820.19KB
118 162.29KB
119 278.90KB
12 109.04KB
12.1 Fix Mac OS X.html 84B
12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html 121B
12.1 httpwww.spammimic.com.html 85B
12.1 Wikipedia - Hypervisor.html 101B
12.2 httpsgithub.comfix-macosxnet-monitor.html 102B
12.2 OpenPuff Manual.html 107B
12.2 OpenVZ.html 90B
12.3 OpenPuff.html 116B
12.3 Turnkey Linux - Openvpn.html 97B
12.3 Washingtonpost - How apples os x yosemite tracks-you.html 213B
12.4 httpsgithub.comfix-macosxyosemite-phone-home.html 110B
12.4 List of Steg Tools.html 105B
12.4 Virt Manager.html 86B
12.5 httpsgithub.comkarek314macOS-home-call-drop.html 109B
12.5 KVM Debian Jessie.html 98B
12.6 Wikipedia - Kernel-based Virtual Machine.html 119B
12.7 Wikipedia - Comparison of platform virtualization software.html 137B
12. Darknets, Dark Markets and Exploit kits.mp4 32.43MB
12. Darknets, Dark Markets and Exploit kits.srt 9.36KB
12. IE and Edge - Browser and extention updates.mp4 5.63MB
12. IE and Edge - Browser and extention updates.srt 1.11KB
12. Mac - Privacy & Tracking.mp4 57.97MB
12. Mac - Privacy & Tracking.srt 5.80KB
12. Steganography.mp4 104.30MB
12. Steganography.srt 9.75KB
12. Virtual Machines.mp4 44.43MB
12. Virtual Machines.srt 19.02KB
120 346.09KB
121 374.19KB
13 195.61KB
13.1 httpsen.wikipedia.orgwikiTiming_channel.html 105B
13.1 httpswww.openbsd.org.html 85B
13.1 Security Pitfalls.html 135B
13.2 httpswww.debian.org.html 84B
13.2 Venom.html 90B
13.3 Example VMware security bug.html 123B
13.3 httpdistrowatch.com.html 84B
13.4 httpsen.wikipedia.orgwikiX86_virtualization.html 109B
13.4 httpswww.archlinux.org.html 87B
13.5 A look at malware with VM detection.html 161B
13.6 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html 110B
13.7 Exploiting dram rowhammer (Could be used on VMs in the future).html 152B
13.8 httpsen.wikipedia.orgwikiCovert_channel.html 105B
13. Auto updates - The Impact to privacy and anonymity.mp4 4.30MB
13. Auto updates - The Impact to privacy and anonymity.srt 2.94KB
13. Governments, spies and secret stuff part I.mp4 27.02MB
13. Governments, spies and secret stuff part I.srt 6.64KB
13. How Security and Encryption is Really Attacked.mp4 17.36MB
13. How Security and Encryption is Really Attacked.srt 3.50KB
13. Linux and Unix “like” Operating systems.mp4 46.23MB
13. Linux and Unix “like” Operating systems.srt 4.27KB
13. Virtual Machine Weaknesses.mp4 22.73MB
13. Virtual Machine Weaknesses.srt 16.37KB
14 35.34KB
14.1 Convert VM to ISO.html 109B
14.1 httpstheintercept.com.html 86B
14.1 Manjaro - httpsmanjaro.org.html 81B
14.2 httpwww.nsaplayset.org.html 87B
14.2 Linux Mint - httpslinuxmint.com.html 83B
14.3 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html 104B
14.3 Ubuntu - httpswww.ubuntu.com.html 84B
14.4 httpswikileaks.org-Leaks-.html.html 95B
14.5 httpsnsa.gov1.infodninsa-ant-catalog.html 103B
14.6 httpscryptome.org201401nsa-codenames.htm.html 107B
14. General Use Operating Systems (Windows, MacOS and Linux).mp4 46.90MB
14. General Use Operating Systems (Windows, MacOS and Linux).srt 5.67KB
14. Governments, spies and secret stuff part II.mp4 30.24MB
14. Governments, spies and secret stuff part II.srt 12.15KB
14. Virtual Machine Hardening.mp4 36.96MB
14. Virtual Machine Hardening.srt 14.41KB
15 102.19KB
15.10 httpswww.csoonline.comarticle3213033securitynsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.html 193B
15.11 Matt Blaze Speaking to a US congressional committee.html 107B
15.12 A Worldwide Survey of E ncryption Products - xls.html 154B
15.13 Kazakhstans new encryption law.html 185B
15.1 A Worldwide Survey of Encryption Products - pdf.html 153B
15.1 httpswww.whonix.org.html 84B
15.1 OpenBSD - httpswww.openbsd.org.html 85B
15.2 Debian - httpswww.debian.org.html 84B
15.2 NSA Admits It Collects Too MUCH Info to Stop Terror Attacks.html 204B
15.2 Whonix Stream Isolation.html 105B
15.3 Archlinux - httpswww.archlinux.org.html 87B
15.3 How to implement physical isolation.html 131B
15.3 The Case against Regulating Encryption Technology.html 112B
15.4 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html 137B
15.4 Whonix and virtualbox.html 99B
15.5 Clipper chip.html 192B
15.5 Whonix Features.html 97B
15.6 MATT BLAZE - DECIPHERING THE DEBATE OVER ENCRYPTION.html 160B
15.6 Whonix VM snapshots.html 116B
15.7 ARM - Anonymizing relay monitor.html 108B
15.7 WhatsApp was Banned for 48 Hours in Brazil.html 112B
15.8 If setting up your own workstations - MUST READ.html 112B
15.8 UK data communications bill.html 121B
15.9 Report - Keys Under Doormats Mandating insecurity by requiring government access to all data and communication.html 150B
15.9 Whonix Check.html 100B
15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).mp4 39.40MB
15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).srt 6.87KB
15. Regulating encryption, mandating insecurity & legalizing spying.mp4 42.73MB
15. Regulating encryption, mandating insecurity & legalizing spying.srt 17.91KB
15. Whonix OS - Anonymous Operating system.mp4 88.64MB
15. Whonix OS - Anonymous Operating system.srt 30.56KB
16 58.35KB
16.1 Qubes OS - httpswww.qubes-os.org.html 86B
16.1 Video on how to build your own software reproducibly.html 142B
16.1 Whonix's lack of an Amnesic feature.html 190B
16.2 Apple removes malware infected apps from the app store.html 165B
16.2 Astra Linux - httpastralinux.ru.html 82B
16.2 Whonix - Warnings.html 96B
16.3 httpsreproducible-builds.org.html 93B
16.3 Trisquel OS - httpstrisquel.info.html 83B
16.4 Apple backdoor order.html 112B
16.4 PureOS - httpswww.pureos.net.html 84B
16.5 httpsblog.torproject.orgblogdeterministic-builds-part-one-cyberwar-and-global-compromise.html 154B
16.5 Subgraph OS - httpssubgraph.comsgos.html 87B
16.6 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html 133B
16.6 Security-Enhanced Linux (SELinux) - httpsgithub.comSELinuxProject.html 94B
16.7 Examples of backdoors.html 123B
16.7 Hardened Gentoo Linux - httpswiki.gentoo.orgwikiProjectHardened.html 106B
16.8 Formal methods.html 105B
16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).mp4 32.31MB
16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).srt 3.93KB
16. Trust & Backdoors.mp4 24.48MB
16. Trust & Backdoors.srt 12.51KB
16. Whonix OS - Weaknesses.mp4 15.78MB
16. Whonix OS - Weaknesses.srt 6.79KB
17 286.67KB
17.10 Debian template(s).html 107B
17.1 httpsearchenginewatch.comsewnews2351154google-censorship-ruling-in-canada-has-worldwide-implications.html 168B
17.1 Qubes Download.html 96B
17.1 Qubes OS - httpswww.qubes-os.org.html 86B
17.2 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html 129B
17.2 Qubes docs.html 90B
17.2 Whonix - httpswww.whonix.org.html 84B
17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html 132B
17.3 Librem 13 laptop.html 105B
17.3 Tails OS - httpstails.boum.org.html 84B
17.4 Split GPG.html 100B
17.5 Video Tour of Qubes.html 91B
17.6 Disposable VMs (DispVMs).html 97B
17.7 Windows templates.html 108B
17.8 Hardware Compatibility List (HCL).html 90B
17.9 Whonix templates.html 105B
17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4 21.54MB
17. Anonymity Focused Operating Systems (Tails and Whonix OS).srt 3.95KB
17. Censorship.mp4 6.48MB
17. Censorship.srt 3.07KB
17. Qubes OS.mp4 78.72MB
17. Qubes OS.srt 29.09KB
18 702.22KB
18.1 BackBox Linux - httpsbackbox.org.html 81B
18.1 httpwww.stationx.netalerts.html 91B
18.1 Partitioning my digital life into security domains.html 145B
18.2 Parrot GNULinux - httpswww.parrotsec.org.html 87B
18.3 Kali Linux - httpswww.kali.org.html 82B
18.4 Pentoo - httpswww.pentoo.ch.html 83B
18.5 BlackArch Linux - httpsblackarch.org.html 83B
18. Cyber Threat Intelligence – Stay Informed.mp4 2.61MB
18. Cyber Threat Intelligence – Stay Informed.srt 1.19KB
18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4 13.37MB
18. Penetration Testing and Ethical Hacking Focused Operating Systems.srt 1.31KB
18. Security Domains, Isolation and Compartmentalization.mp4 14.97MB
18. Security Domains, Isolation and Compartmentalization.srt 7.14KB
19 915.11KB
19.1 LineageOS - httpslineageos.org.html 83B
19.2 MicroG - httpsmicrog.org.html 80B
19.3 PureOS Librem 5 - httpspuri.smshoplibrem-5.html 91B
19.4 iOS - httpsdeveloper.apple.comios.html 93B
19.5 Replicant - Httpswww.replicant.us.html 86B
19.6 Android - httpswww.android.com.html 85B
19.7 OmniROM - httpswww.omnirom.org.html 85B
19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).mp4 46.71MB
19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).srt 3.39KB
2 866.52KB
2.10 httpsen.wikipedia.orgwikiHypervisor.html 101B
2.11 httpsen.wikipedia.orgwikiComparison_of_platform_virtualization_software.html 137B
2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html 137B
2.1 httpsdiasporafoundation.org.html 92B
2.1 httpswww.stationx.netcanarytokens.html 99B
2.1 httpswww.stationx.netcertificate-request.html 106B
2.1 Windows VMs here.html 124B
2.2 httpfriendica.com.html 82B
2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html 132B
2.2 Vmware Network Adapter Settings.html 191B
2.3 httpstosdr.org.html 79B
2.3 Virtualbox Network Adapter Settings.html 104B
2.4 httpvirtualboxes.orgimages.html 92B
2.4 The complete guide to facebook privacy settings.html 136B
2.5 httpwww.osboxes.orgguide#!.html 92B
2.5 List of Personally Identifiable Information (PII).html 134B
2.6 httpvirtual-machine.org.html 88B
2.6 Twitter Privacy Settings.html 120B
2.7 httpswww.eff.orgwho-has-your-back-government-data-requests-2015.html 128B
2.7 httpwww.osboxes.orgvirtualbox-images.html 102B
2.8 httpwww.osboxes.orgvmware-images.html 98B
2.8 httpwww.telegraph.co.uktechnologysocial-media9780565Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html.html 188B
2.9 httpsgnu.iosocialtry.html 87B
2.9 httpsmarketplace.vmware.com.html 92B
2. Certificate Of Completion for CPEs.mp4 2.20MB
2. Certificate Of Completion for CPEs.srt 1.25KB
2. Goals and Learning Objectives.mp4 2.70MB
2. Goals and Learning Objectives.srt 973B
2. Information Disclosure and Identity Strategies for Social Media.mp4 83.81MB
2. Information Disclosure and Identity Strategies for Social Media.srt 25.19KB
2. Introduction to Isolation and Compartmentalization.mp4 5.66MB
2. Introduction to Isolation and Compartmentalization.srt 3.30KB
2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 113.35MB
2. Introduction to Setting up a Testing Environment Using Virtual Machines.srt 12.21KB
2. Security Domains.mp4 21.84MB
2. Security Domains.srt 16.63KB
2. Security Features and Functionality.mp4 57.89MB
2. Security Features and Functionality.srt 7.80KB
2. Security Quick Win!.mp4 43.19MB
2. Security Quick Win!.srt 17.56KB
2. Symmetric Encryption.mp4 32.30MB
2. Symmetric Encryption.srt 11.30KB
2. The Importance of Patching.mp4 11.66MB
2. The Importance of Patching.srt 6.41KB
2. Why You Need Security – The Value Of A Hack.mp4 28.93MB
2. Why You Need Security – The Value Of A Hack.srt 6.68KB
2. Windows 7 - Not using admin.mp4 10.99MB
2. Windows 7 - Not using admin.srt 5.46KB
20 117.76KB
20.1 Download Debian.html 92B
20.2 Debian Live CDDVD.html 92B
20.3 Free Debian Books and Guides.html 93B
20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 57.78MB
20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.srt 6.67KB
21 248.58KB
22 374.14KB
23 33.39KB
24 113.29KB
25 221.84KB
26 707.81KB
27 432.43KB
28 775.16KB
29 712.08KB
3 489.77KB
3.10 httpgetairmail.com.html 83B
3.11 Example SMS recieve online site.html 96B
3.12 httpwww.migmail.net.html 84B
3.13 httpcrapmail.dken.html 83B
3.14 Top 10 sites receive sms online without phone.html 135B
3.15 httpdontmail.net.html 81B
3.16 httpswww.trash-mail.comen.html 91B
3.17 http10minutemail.com10MinuteMailindex.html.html 108B
3.1 Diagram of Mac.html 131B
3.1 httpsmailinator.com.html 84B
3.1 httpsresearch.google.compubspub43963.html.html 107B
3.1 httpwww.vmware.comproductsworkstationcompare.html.html 116B
3.1 Top 50 products vs security bugs.html 114B
3.2 httpwww.mytrashmail.com.html 88B
3.2 httpwww.vmware.comproductsplayerfaqsfaqs.html.html 113B
3.2 Linux - How to use macchanger.html 132B
3.2 Report - Buying Into the Bias Why Vulnerability Statistics Suck.html 168B
3.3 httpwww.dispostable.com.html 88B
3.3 Windows - Tmac.html 89B
3.4 httpbugmenot.com.html 81B
3.4 Mac OS X - How to change the mac address.html 141B
3.5 httpfreemail.ms.html 80B
3.5 Mac OS X - Wifispoof.html 83B
3.6 httpswww.guerrillamail.com.html 92B
3.6 Mac OS X - Macdaddyx.html 109B
3.7 httpwww.tempinbox.com.html 85B
3.8 httpwww.mailexpire.com.html 87B
3.9 httpsanonbox.net.html 81B
3. Asymmetric Encryption.mp4 72.31MB
3. Asymmetric Encryption.srt 12.99KB
3. Goals and Learning Objectives - Volume 1.mp4 16.10MB
3. Goals and Learning Objectives - Volume 1.srt 2.88KB
3. Identify Verification and Registration.mp4 23.39MB
3. Identify Verification and Registration.srt 9.36KB
3. Physical and Hardware Isolation - How to change the Mac Address.mp4 25.57MB
3. Physical and Hardware Isolation - How to change the Mac Address.srt 10.90KB
3. Protect What You Value.mp4 8.94MB
3. Protect What You Value.srt 5.35KB
3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4 48.07MB
3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).srt 24.00KB
3. Security Bugs and Vulnerabilities.mp4 83.89MB
3. Security Bugs and Vulnerabilities.srt 6.99KB
3. The Top 3 Things You Need To Stay Safe Online.mp4 2.50MB
3. The Top 3 Things You Need To Stay Safe Online.srt 1.62KB
3. Vmware.mp4 110.48MB
3. Vmware.srt 12.13KB
3. Windows 7 - Auto Update.mp4 4.95MB
3. Windows 7 - Auto Update.srt 1.78KB
3. Windows 8 and 8.1 - Not using admin.mp4 18.24MB
3. Windows 8 and 8.1 - Not using admin.srt 6.13KB
30 953.88KB
31 104.36KB
32 298.92KB
33 786.26KB
34 586.62KB
35 827.87KB
36 273.54KB
37 275.84KB
38 192.71KB
39 1005.92KB
4 666.39KB
4.1 CVE details.html 88B
4.1 Example hashes.html 104B
4.1 httpswww.nitrokey.com.html 87B
4.1 httpswww.virtualbox.org.html 88B
4.1 httpwww.urlvoid.com.html 84B
4.1 OS usage share.html 125B
4.2 httpswww.exploit-db.comsearch.html 95B
4.2 httpwww.google.com.stationx.net.html 95B
4.2 Linux and Mac OS X - dmidecode.html 93B
4.3 Exploit Kit Landscape Map.html 99B
4.3 Windows - dmidecode.html 115B
4.4 Linux - i-nex.html 88B
4.5 Windows - CPU Z.html 103B
4.6 Mac OS X - Mac Cupid.html 120B
4.7 Mac OS X - Installing dmidecode with brew.html 119B
4.8 httpswww.yubico.com.html 84B
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4 23.29MB
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.srt 14.44KB
4. Hash Functions.mp4 89.23MB
4. Hash Functions.srt 7.19KB
4. Physical and Hardware Isolation - Hardware Serials.mp4 50.24MB
4. Physical and Hardware Isolation - Hardware Serials.srt 17.61KB
4. Sample from Vol 2 - Password cracking part 2.mp4 24.15MB
4. Sample from Vol 2 - Password cracking part 2.srt 13.08KB
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 38.11MB
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt 12.04KB
4. Target Audience.mp4 7.33MB
4. Target Audience.srt 3.52KB
4. Usage Share.mp4 34.28MB
4. Usage Share.srt 6.32KB
4. Virtual box.mp4 144.15MB
4. Virtual box.srt 12.43KB
4. What is Privacy, Anonymity and Pseudonymity.mp4 11.87MB
4. What is Privacy, Anonymity and Pseudonymity.srt 5.76KB
4. Windows 10 - Not using admin.mp4 14.14MB
4. Windows 10 - Not using admin.srt 5.04KB
4. Windows 8 & 8.1 - Auto Update.mp4 6.54MB
4. Windows 8 & 8.1 - Auto Update.srt 2.01KB
40 610.79KB
41 522.38KB
42 837.93KB
43 907.81KB
44 44.82KB
45 736.10KB
46 1017.21KB
47 582.71KB
48 701.89KB
49 718.55KB
5 527.92KB
5.1 Authentic8.html 97B
5.1 httpswww.parsemail.org.html 87B
5.1 httpswww.symantec.comenukcode-signing.html 107B
5.1 Kali AWS appliance.html 109B
5.1 The Cyber Security Landscape Diagram.jpg 777.15KB
5.1 With Windows 10, Microsoft Blatantly Disregards User Choice and Privacy A Deep Dive.html 174B
5.2 httpswww.virustotal.comendocumentationemail-submissions.html 123B
5.2 Kali iso here if you want to install on a computer's hard disk or live boot it..html 92B
5.2 Microsoft Service Agreement.html 123B
5.2 Spoons.net.html 88B
5.2 Windows 10 Device Guard using Digital Signatures.html 174B
5.3 httpswhois.domaintools.comblob.com.html 99B
5.3 Kali images for Virtualbox or VMware.html 150B
5.3 Microsoft Privacy Statement.html 114B
5.3 Portable Apps.html 85B
5.4 Cortana privacy faq.html 126B
5.4 httpswhois.domaintools.combbc.co.uk.html 100B
5.4 Kali on Microsoft App Store as an official WSL.html 123B
5.4 Spikes.html 91B
5.5 Aegis Secure Key - USB 2.0 Flash Drive.html 108B
5.5 How to Get Email Headers.html 111B
5.5 Kali Arm hardware.html 118B
5.6 Pen Drive Apps.html 89B
5.7 Maxthon.html 84B
5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4 49.30MB
5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.srt 19.84KB
5. Digital Signatures.mp4 42.73MB
5. Digital Signatures.srt 5.74KB
5. Hackers, crackers and cyber criminals.mp4 7.70MB
5. Hackers, crackers and cyber criminals.srt 3.36KB
5. Kali Linux 2018.mp4 59.63MB
5. Kali Linux 2018.srt 5.34KB
5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4 31.75MB
5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.srt 23.73KB
5. Security, Vulnerabilities, Threats and Adversaries.mp4 11.23MB
5. Security, Vulnerabilities, Threats and Adversaries.srt 5.23KB
5. Study Recommendations.mp4 17.94MB
5. Study Recommendations.srt 7.33KB
5. Virtual Isolation.mp4 57.31MB
5. Virtual Isolation.srt 14.07KB
5. Windows 10 - Auto Update.mp4 4.93MB
5. Windows 10 - Auto Update.srt 1.90KB
5. Windows 10 - Privacy & Tracking.mp4 79.94MB
5. Windows 10 - Privacy & Tracking.srt 7.88KB
50 254.97KB
51 794.23KB
52 775.84KB
53 71.48KB
54 1000.65KB
55 654.87KB
56 21.20KB
57 438.45KB
58 528.31KB
59 865.65KB
6 495.08KB
6.1 7 most common RATs.html 149B
6.1 Dual Booting explained.html 177B
6.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html 117B
6.1 httpswww.stationx.netsabsa.html 92B
6.1 httpwww.scambusters.org.html 88B
6.1 Microsoft Security Bulletins.html 115B
6.1 Steve Gibson's Cipher Suite Recommendations.html 117B
6.2 httpswww.securityforum.org.html 91B
6.2 httpwww.actionfraud.police.uktypes_of_fraud.html 108B
6.2 Malware stats.html 107B
6.2 National vulnerability database.html 85B
6.2 Weakdh Cipher Suite Recommendations.html 93B
6.3 Chef Jamie Oliver’s website hacked for the third time.html 106B
6.3 httpswww.iso.orgstandard56742.html.html 100B
6.3 httpwww.consumerfraudreporting.orgcredit_freeze_summary.php.html 124B
6.3 Wikipedia Transport Layer Security (TLS) page.html 115B
6.3 Windows 10 Ditches Patch Tuesday for Security's Sake.html 178B
6.4 Common Vulnerabilities and Exposures.html 85B
6.4 Mozilla Cipher Suite Recommendations.html 110B
6.4 SophosLabs 2018 Malware Forecast.html 162B
6.5 Patch Tuesday may be dead, but Microsoft's not confessing to the crime.html 197B
6.5 Report - Spotlight perils of malvertisements.html 142B
6. Asset Selection.mp4 7.68MB
6. Asset Selection.srt 3.95KB
6. Course updates.mp4 13.93MB
6. Course updates.srt 892B
6. Dual Boot.mp4 7.92MB
6. Dual Boot.srt 4.82KB
6. Malware, viruses, rootkits and RATs.mp4 12.14MB
6. Malware, viruses, rootkits and RATs.srt 8.22KB
6. Sample from Vol 4 - Email clients, protocols and authentication.mp4 38.18MB
6. Sample from Vol 4 - Email clients, protocols and authentication.srt 21.72KB
6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 160.85MB
6. Secure Sockets Layer (SSL) and Transport layer security (TLS).srt 15.38KB
6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp4 14.51MB
6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).srt 9.19KB
6. Windows 10 - Disable tracking automatically.mp4 67.88MB
6. Windows 10 - Disable tracking automatically.srt 6.39KB
6. Windows - Criticality and Patch Tuesday.mp4 41.81MB
6. Windows - Criticality and Patch Tuesday.srt 4.50KB
60 214.29KB
61 626.93KB
62 725.46KB
63 271.42KB
64 167.40KB
65 473.49KB
66 101.97KB
67 661.26KB
68 686.32KB
69 777.12KB
7 714.57KB
7.1 Chromium sandbox design.html 121B
7.1 Flexera Personal Software Inspector - Previously Secunia PSI.html 174B
7.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html 117B
7.1 httpwww.slate.comarticlestechnologybitwise201502lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html.html 198B
7.1 Intro to Sniffers.html 127B
7.2 Arpwatch Tool to Monitor Ethernet Activity in Linux.html 119B
7.2 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html 135B
7.2 Mozilla Sandbox design.html 102B
7.3 httpssecurelist.comanalysisquarterly-malware-reports72493it-threat-evolution-in-q3-2015.html 156B
7.3 SSL Strip tool By Moxie Marlinspike.html 107B
7.4 httpwww.telegraph.co.uknewsworldnewsnorthamericausa11416985Millions-of-computers-may-be-compromised-by-US-spyware-report.html.html 195B
7.4 WIFI Pineapple.html 91B
7.5 Cain & Abel.html 89B
7.6 sniffdet - Remote Sniffer Detection ToolLibrary.html 93B
7. Built-in Sandboxes and Application Isolation.mp4 10.40MB
7. Built-in Sandboxes and Application Isolation.srt 4.85KB
7. Cyber Security and Ethical Hacking Careers.mp4 31.22MB
7. Cyber Security and Ethical Hacking Careers.srt 5.06KB
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 10.77MB
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt 6.03KB
7. SSL Stripping.mp4 114.52MB
7. SSL Stripping.srt 15.13KB
7. Threat Modeling and Risk Assessments.mp4 18.03MB
7. Threat Modeling and Risk Assessments.srt 10.34KB
7. Windows 10 - Tool Disable Windows 10 Tracking.mp4 98.43MB
7. Windows 10 - Tool Disable Windows 10 Tracking.srt 8.79KB
7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4 19.35MB
7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.srt 12.15KB
70 993.22KB
71 62.72KB
72 658.02KB
73 825.82KB
74 923.40KB
75 228.17KB
76 32.41KB
77 506.24KB
78 878.77KB
79 69.44KB
8 588.63KB
8.1 Debian Security Page.html 93B
8.1 How to disable cortana-on Windows 10.html 147B
8.1 Live phishing links.html 87B
8.1 Server Name Indication (SNI) Wiki.html 113B
8.1 Shadowdefender.html 91B
8.2 Automatic Security Updates.html 119B
8.2 Cortana privacy faq.html 126B
8.2 Deepfreeze Cloud Browser and Desktop.html 129B
8.2 Homograph attack using internationalized domain name.html 134B
8.3 BufferZone.html 112B
8.3 How to Disable Cortana in Windows 10’s Anniversary Update.html 130B
8.3 Software distributions based on Debian.html 105B
8.3 XSS example vulnerability.html 136B
8.4 Comodo.html 110B
8.5 Deepfreeze Standard.html 121B
8.6 f-sandbox.html 92B
8.7 Returnil.html 118B
8. HTTPS (HTTP Secure).mp4 81.90MB
8. HTTPS (HTTP Secure).srt 7.90KB
8. Linux - Debian - Patching.mp4 38.49MB
8. Linux - Debian - Patching.srt 17.00KB
8. Security vs Privacy vs Anonymity - Can we have it all.mp4 5.44MB
8. Security vs Privacy vs Anonymity - Can we have it all.srt 2.87KB
8. What is Phishing, Vishing and SMShing.mp4 25.98MB
8. What is Phishing, Vishing and SMShing.srt 17.48KB
8. Windows 10 – Cortana.mp4 41.02MB
8. Windows 10 – Cortana.srt 4.33KB
8. Windows - Sandboxes and Application Isolation.mp4 26.36MB
8. Windows - Sandboxes and Application Isolation.srt 9.63KB
80 152.89KB
81 424.79KB
82 643.07KB
83 883.71KB
84 79.75KB
85 135.84KB
86 343.08KB
87 791.95KB
88 9.24KB
89 238.45KB
9 787.94KB
9.1 Apple security updates.html 101B
9.1 Complete guide windows 10 privacy settings.html 134B
9.1 httpsen.wikipedia.orgwikiAuthentication.html 105B
9.1 Introduction and quick guide sandboxie.html 143B
9.1 Spam example.html 142B
9.2 httpwhatis.techtarget.comdefinitionConfidentiality-integrity-and-availability-CIA.html 147B
9.2 Mac Update.html 86B
9.2 Sandboxie How it Works.html 106B
9.2 SmartScreen Filter FAQ.html 145B
9.2 Spam stats.html 104B
9.3 httpsen.wikipedia.orgwikiAuthorization.html 104B
9.3 igeekblogs - How to enable updates.html 134B
9.3 Sandboxie forum.html 96B
9.4 httpbrew.sh.html 76B
9.4 httpswww.stationx.netsabsa.html 92B
9.4 Sandboxie guide.html 118B
9.5 httpsen.wikipedia.orgwikiNon-repudiation.html 106B
9.6 httpsen.wikipedia.orgwikiParkerian_Hexad.html 106B
9. Confidentiality, Integrity and Availability - (Security Attributes).mp4 19.33MB
9. Confidentiality, Integrity and Availability - (Security Attributes).srt 11.81KB
9. Digital Certificates.mp4 81.97MB
9. Digital Certificates.srt 7.00KB
9. Mac - Patching.mp4 55.58MB
9. Mac - Patching.srt 10.17KB
9. Spamming & Doxing.mp4 4.79MB
9. Spamming & Doxing.srt 3.93KB
9. Windows 10 – Privacy Settings.mp4 86.46MB
9. Windows 10 – Privacy Settings.srt 11.11KB
9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4 70.11MB
9. Windows - Sandboxes and Application Isolation - Sandboxie.srt 16.80KB
90 615.30KB
91 740.45KB
92 59.25KB
93 832.11KB
94 84.16KB
95 309.93KB
96 330.31KB
97 687.68KB
98 473.86KB
99 533.46KB
TutsNode.com.txt 63B
Distribution statistics by country
Bangladesh (BD) 3
United States (US) 3
Ethiopia (ET) 2
Bulgaria (BG) 2
Spain (ES) 1
United Kingdom (GB) 1
Norway (NO) 1
Portugal (PT) 1
Ghana (GH) 1
Ukraine (UA) 1
Total 16
IP List List of IP addresses which were distributed this torrent