|
Please note that this page does not hosts or makes available any of the listed filenames. You
cannot download any of those files from here.
|
| [TGx]Downloaded from torrentgalaxy.to .txt |
585B |
| 0 |
951.65KB |
| 1 |
152.06KB |
| 1.1 Link to The Complete Cyber Security Course - Volume II - Network security + discount coupon studentdiscount25.html |
136B |
| 1.1 Nathan's Twitter #GotoNathan.html |
91B |
| 1.2 LinkedIn - Join my network..html |
101B |
| 1.3 Nathan's Cyber Security Blog.html |
99B |
| 1. BONUS - How to Start a Career in Cyber Security.html |
1.21KB |
| 1. Congratulations.mp4 |
5.29MB |
| 1. Congratulations.srt |
1.56KB |
| 1. Goals and Learning Objectives.mp4 |
2.89MB |
| 1. Goals and Learning Objectives.mp4 |
2.43MB |
| 1. Goals and Learning Objectives.mp4 |
2.29MB |
| 1. Goals and Learning Objectives.mp4 |
1.84MB |
| 1. Goals and Learning Objectives.mp4 |
1.73MB |
| 1. Goals and Learning Objectives.mp4 |
1.66MB |
| 1. Goals and Learning Objectives.mp4 |
1.63MB |
| 1. Goals and Learning Objectives.mp4 |
1.43MB |
| 1. Goals and Learning Objectives.srt |
1.20KB |
| 1. Goals and Learning Objectives.srt |
637B |
| 1. Goals and Learning Objectives.srt |
764B |
| 1. Goals and Learning Objectives.srt |
937B |
| 1. Goals and Learning Objectives.srt |
823B |
| 1. Goals and Learning Objectives.srt |
691B |
| 1. Goals and Learning Objectives.srt |
640B |
| 1. Goals and Learning Objectives.srt |
501B |
| 1. Goals and Learning Objectives - Removing Privilege.mp4 |
13.59MB |
| 1. Goals and Learning Objectives - Removing Privilege.srt |
4.15KB |
| 1. Theory and Practical.mp4 |
2.24MB |
| 1. Theory and Practical.srt |
1.51KB |
| 1. Welcome and Introduction to the Instructor!.mp4 |
19.90MB |
| 1. Welcome and Introduction to the Instructor!.srt |
2.11KB |
| 10 |
369.40KB |
| 10.1 Apparmor.html |
105B |
| 10.1 httpsblogs.windows.comwindowsexperience20160510announcing-windows-10-insider-preview-build-14342#31Zq2yELkheC9HyV.99.html |
186B |
| 10.1 SSL Sniff.html |
107B |
| 10.1 Top 10 scams.html |
127B |
| 10.2 Cert Fingerprints.html |
97B |
| 10.2 httpwww.actionfraud.police.uktypes_of_fraud.html |
108B |
| 10.2 Trusted BSD.html |
87B |
| 10.3 Certificate patrol.html |
127B |
| 10.3 httpwww.consumerfraudreporting.org.html |
98B |
| 10.3 Linux Sandbox.html |
96B |
| 10.4 CA Ecosystem.html |
105B |
| 10.4 Firejail.html |
92B |
| 10.5 CA example mistake.html |
180B |
| 10.5 Script Sandfox.html |
118B |
| 10. Certificate Authorities and HTTPS.mp4 |
199.30MB |
| 10. Certificate Authorities and HTTPS.srt |
18.71KB |
| 10. Defense In Depth.mp4 |
2.99MB |
| 10. Defense In Depth.srt |
1.79KB |
| 10. Firefox - Browser and extension updates.mp4 |
34.01MB |
| 10. Firefox - Browser and extension updates.srt |
6.56KB |
| 10. Linux - Sandboxes and Application Isolation.mp4 |
13.85MB |
| 10. Linux - Sandboxes and Application Isolation.srt |
3.89KB |
| 10. Social engineering - Scams, cons, tricks and fraud.mp4 |
11.92MB |
| 10. Social engineering - Scams, cons, tricks and fraud.srt |
6.71KB |
| 10. Windows 10 - WiFi Sense.mp4 |
59.76MB |
| 10. Windows 10 - WiFi Sense.srt |
5.48KB |
| 100 |
348.06KB |
| 101 |
379.54KB |
| 102 |
575.62KB |
| 103 |
727.29KB |
| 104 |
47.34KB |
| 105 |
74.94KB |
| 106 |
212.78KB |
| 107 |
721.03KB |
| 108 |
442.36KB |
| 109 |
12.34KB |
| 11 |
557.22KB |
| 11.10 httpstorrentfreak.compirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011.html |
146B |
| 11.1 httpsthehackernews.com201802cryptojacking-malware.html.html |
121B |
| 11.1 httpwww.zdnet.comarticlehow-to-block-windows-10-upgrades-on-your-business-network-and-at-home-too.html |
164B |
| 11.1 OSX-Sandbox--Seatbelt--Profiles.html |
119B |
| 11.2 Firefox profile.html |
132B |
| 11.2 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html |
136B |
| 11.2 Never 10 by Steve Gibson (Use this!).html |
92B |
| 11.3 Apple Sandbox Guide.html |
139B |
| 11.3 GWX Control Panel.html |
100B |
| 11.3 httpswww.engadget.com20180213attackers-telegram-deliver-cryptocurrency-mining-malware.html |
154B |
| 11.4 Buckle Up.html |
97B |
| 11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html |
116B |
| 11.4 Microsoft - How to manage Windows 10 notification and upgrade options.html |
107B |
| 11.5 httpscoinhive.com.html |
82B |
| 11.5 SuperDuper.html |
127B |
| 11.6 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html |
122B |
| 11.6 Mac OS X - App Sandbox.html |
193B |
| 11.7 How to run your Applications in a Mac OS X sandbox to enhance security.html |
176B |
| 11.7 httpsgithub.comhoshsadiqadblock-nocoin-list.html |
110B |
| 11.8 httpsarstechnica.cominformation-technology201801now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners.html |
184B |
| 11.8 Sandbox Man page.html |
165B |
| 11.9 Cryptocurrency Mining Malware Infected Over Half-Million PCs Using an NSA Exploit.html |
129B |
| 11. Chrome - Browser and extension updates.mp4 |
3.57MB |
| 11. Chrome - Browser and extension updates.srt |
1.93KB |
| 11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 |
16.19MB |
| 11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.srt |
10.83KB |
| 11. End-to-End Encryption (E2EE).mp4 |
8.19MB |
| 11. End-to-End Encryption (E2EE).srt |
2.22KB |
| 11. Mac - Sandboxes and Application Isolation.mp4 |
23.79MB |
| 11. Mac - Sandboxes and Application Isolation.srt |
8.25KB |
| 11. The Zero Trust Model.mp4 |
10.28MB |
| 11. The Zero Trust Model.srt |
4.86KB |
| 11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4 |
105.52MB |
| 11. Windows 7, 8 and 8.1 - Privacy & Tracking.srt |
8.74KB |
| 110 |
111.47KB |
| 111 |
305.22KB |
| 112 |
396.95KB |
| 113 |
514.75KB |
| 114 |
586.66KB |
| 115 |
725.55KB |
| 116 |
780.21KB |
| 117 |
820.19KB |
| 118 |
162.29KB |
| 119 |
278.90KB |
| 12 |
109.04KB |
| 12.1 Fix Mac OS X.html |
84B |
| 12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html |
121B |
| 12.1 httpwww.spammimic.com.html |
85B |
| 12.1 Wikipedia - Hypervisor.html |
101B |
| 12.2 httpsgithub.comfix-macosxnet-monitor.html |
102B |
| 12.2 OpenPuff Manual.html |
107B |
| 12.2 OpenVZ.html |
90B |
| 12.3 OpenPuff.html |
116B |
| 12.3 Turnkey Linux - Openvpn.html |
97B |
| 12.3 Washingtonpost - How apples os x yosemite tracks-you.html |
213B |
| 12.4 httpsgithub.comfix-macosxyosemite-phone-home.html |
110B |
| 12.4 List of Steg Tools.html |
105B |
| 12.4 Virt Manager.html |
86B |
| 12.5 httpsgithub.comkarek314macOS-home-call-drop.html |
109B |
| 12.5 KVM Debian Jessie.html |
98B |
| 12.6 Wikipedia - Kernel-based Virtual Machine.html |
119B |
| 12.7 Wikipedia - Comparison of platform virtualization software.html |
137B |
| 12. Darknets, Dark Markets and Exploit kits.mp4 |
32.43MB |
| 12. Darknets, Dark Markets and Exploit kits.srt |
9.36KB |
| 12. IE and Edge - Browser and extention updates.mp4 |
5.63MB |
| 12. IE and Edge - Browser and extention updates.srt |
1.11KB |
| 12. Mac - Privacy & Tracking.mp4 |
57.97MB |
| 12. Mac - Privacy & Tracking.srt |
5.80KB |
| 12. Steganography.mp4 |
104.30MB |
| 12. Steganography.srt |
9.75KB |
| 12. Virtual Machines.mp4 |
44.43MB |
| 12. Virtual Machines.srt |
19.02KB |
| 120 |
346.09KB |
| 121 |
374.19KB |
| 13 |
195.61KB |
| 13.1 httpsen.wikipedia.orgwikiTiming_channel.html |
105B |
| 13.1 httpswww.openbsd.org.html |
85B |
| 13.1 Security Pitfalls.html |
135B |
| 13.2 httpswww.debian.org.html |
84B |
| 13.2 Venom.html |
90B |
| 13.3 Example VMware security bug.html |
123B |
| 13.3 httpdistrowatch.com.html |
84B |
| 13.4 httpsen.wikipedia.orgwikiX86_virtualization.html |
109B |
| 13.4 httpswww.archlinux.org.html |
87B |
| 13.5 A look at malware with VM detection.html |
161B |
| 13.6 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html |
110B |
| 13.7 Exploiting dram rowhammer (Could be used on VMs in the future).html |
152B |
| 13.8 httpsen.wikipedia.orgwikiCovert_channel.html |
105B |
| 13. Auto updates - The Impact to privacy and anonymity.mp4 |
4.30MB |
| 13. Auto updates - The Impact to privacy and anonymity.srt |
2.94KB |
| 13. Governments, spies and secret stuff part I.mp4 |
27.02MB |
| 13. Governments, spies and secret stuff part I.srt |
6.64KB |
| 13. How Security and Encryption is Really Attacked.mp4 |
17.36MB |
| 13. How Security and Encryption is Really Attacked.srt |
3.50KB |
| 13. Linux and Unix “like” Operating systems.mp4 |
46.23MB |
| 13. Linux and Unix “like” Operating systems.srt |
4.27KB |
| 13. Virtual Machine Weaknesses.mp4 |
22.73MB |
| 13. Virtual Machine Weaknesses.srt |
16.37KB |
| 14 |
35.34KB |
| 14.1 Convert VM to ISO.html |
109B |
| 14.1 httpstheintercept.com.html |
86B |
| 14.1 Manjaro - httpsmanjaro.org.html |
81B |
| 14.2 httpwww.nsaplayset.org.html |
87B |
| 14.2 Linux Mint - httpslinuxmint.com.html |
83B |
| 14.3 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html |
104B |
| 14.3 Ubuntu - httpswww.ubuntu.com.html |
84B |
| 14.4 httpswikileaks.org-Leaks-.html.html |
95B |
| 14.5 httpsnsa.gov1.infodninsa-ant-catalog.html |
103B |
| 14.6 httpscryptome.org201401nsa-codenames.htm.html |
107B |
| 14. General Use Operating Systems (Windows, MacOS and Linux).mp4 |
46.90MB |
| 14. General Use Operating Systems (Windows, MacOS and Linux).srt |
5.67KB |
| 14. Governments, spies and secret stuff part II.mp4 |
30.24MB |
| 14. Governments, spies and secret stuff part II.srt |
12.15KB |
| 14. Virtual Machine Hardening.mp4 |
36.96MB |
| 14. Virtual Machine Hardening.srt |
14.41KB |
| 15 |
102.19KB |
| 15.10 httpswww.csoonline.comarticle3213033securitynsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.html |
193B |
| 15.11 Matt Blaze Speaking to a US congressional committee.html |
107B |
| 15.12 A Worldwide Survey of E ncryption Products - xls.html |
154B |
| 15.13 Kazakhstans new encryption law.html |
185B |
| 15.1 A Worldwide Survey of Encryption Products - pdf.html |
153B |
| 15.1 httpswww.whonix.org.html |
84B |
| 15.1 OpenBSD - httpswww.openbsd.org.html |
85B |
| 15.2 Debian - httpswww.debian.org.html |
84B |
| 15.2 NSA Admits It Collects Too MUCH Info to Stop Terror Attacks.html |
204B |
| 15.2 Whonix Stream Isolation.html |
105B |
| 15.3 Archlinux - httpswww.archlinux.org.html |
87B |
| 15.3 How to implement physical isolation.html |
131B |
| 15.3 The Case against Regulating Encryption Technology.html |
112B |
| 15.4 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html |
137B |
| 15.4 Whonix and virtualbox.html |
99B |
| 15.5 Clipper chip.html |
192B |
| 15.5 Whonix Features.html |
97B |
| 15.6 MATT BLAZE - DECIPHERING THE DEBATE OVER ENCRYPTION.html |
160B |
| 15.6 Whonix VM snapshots.html |
116B |
| 15.7 ARM - Anonymizing relay monitor.html |
108B |
| 15.7 WhatsApp was Banned for 48 Hours in Brazil.html |
112B |
| 15.8 If setting up your own workstations - MUST READ.html |
112B |
| 15.8 UK data communications bill.html |
121B |
| 15.9 Report - Keys Under Doormats Mandating insecurity by requiring government access to all data and communication.html |
150B |
| 15.9 Whonix Check.html |
100B |
| 15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).mp4 |
39.40MB |
| 15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).srt |
6.87KB |
| 15. Regulating encryption, mandating insecurity & legalizing spying.mp4 |
42.73MB |
| 15. Regulating encryption, mandating insecurity & legalizing spying.srt |
17.91KB |
| 15. Whonix OS - Anonymous Operating system.mp4 |
88.64MB |
| 15. Whonix OS - Anonymous Operating system.srt |
30.56KB |
| 16 |
58.35KB |
| 16.1 Qubes OS - httpswww.qubes-os.org.html |
86B |
| 16.1 Video on how to build your own software reproducibly.html |
142B |
| 16.1 Whonix's lack of an Amnesic feature.html |
190B |
| 16.2 Apple removes malware infected apps from the app store.html |
165B |
| 16.2 Astra Linux - httpastralinux.ru.html |
82B |
| 16.2 Whonix - Warnings.html |
96B |
| 16.3 httpsreproducible-builds.org.html |
93B |
| 16.3 Trisquel OS - httpstrisquel.info.html |
83B |
| 16.4 Apple backdoor order.html |
112B |
| 16.4 PureOS - httpswww.pureos.net.html |
84B |
| 16.5 httpsblog.torproject.orgblogdeterministic-builds-part-one-cyberwar-and-global-compromise.html |
154B |
| 16.5 Subgraph OS - httpssubgraph.comsgos.html |
87B |
| 16.6 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html |
133B |
| 16.6 Security-Enhanced Linux (SELinux) - httpsgithub.comSELinuxProject.html |
94B |
| 16.7 Examples of backdoors.html |
123B |
| 16.7 Hardened Gentoo Linux - httpswiki.gentoo.orgwikiProjectHardened.html |
106B |
| 16.8 Formal methods.html |
105B |
| 16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).mp4 |
32.31MB |
| 16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).srt |
3.93KB |
| 16. Trust & Backdoors.mp4 |
24.48MB |
| 16. Trust & Backdoors.srt |
12.51KB |
| 16. Whonix OS - Weaknesses.mp4 |
15.78MB |
| 16. Whonix OS - Weaknesses.srt |
6.79KB |
| 17 |
286.67KB |
| 17.10 Debian template(s).html |
107B |
| 17.1 httpsearchenginewatch.comsewnews2351154google-censorship-ruling-in-canada-has-worldwide-implications.html |
168B |
| 17.1 Qubes Download.html |
96B |
| 17.1 Qubes OS - httpswww.qubes-os.org.html |
86B |
| 17.2 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html |
129B |
| 17.2 Qubes docs.html |
90B |
| 17.2 Whonix - httpswww.whonix.org.html |
84B |
| 17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html |
132B |
| 17.3 Librem 13 laptop.html |
105B |
| 17.3 Tails OS - httpstails.boum.org.html |
84B |
| 17.4 Split GPG.html |
100B |
| 17.5 Video Tour of Qubes.html |
91B |
| 17.6 Disposable VMs (DispVMs).html |
97B |
| 17.7 Windows templates.html |
108B |
| 17.8 Hardware Compatibility List (HCL).html |
90B |
| 17.9 Whonix templates.html |
105B |
| 17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4 |
21.54MB |
| 17. Anonymity Focused Operating Systems (Tails and Whonix OS).srt |
3.95KB |
| 17. Censorship.mp4 |
6.48MB |
| 17. Censorship.srt |
3.07KB |
| 17. Qubes OS.mp4 |
78.72MB |
| 17. Qubes OS.srt |
29.09KB |
| 18 |
702.22KB |
| 18.1 BackBox Linux - httpsbackbox.org.html |
81B |
| 18.1 httpwww.stationx.netalerts.html |
91B |
| 18.1 Partitioning my digital life into security domains.html |
145B |
| 18.2 Parrot GNULinux - httpswww.parrotsec.org.html |
87B |
| 18.3 Kali Linux - httpswww.kali.org.html |
82B |
| 18.4 Pentoo - httpswww.pentoo.ch.html |
83B |
| 18.5 BlackArch Linux - httpsblackarch.org.html |
83B |
| 18. Cyber Threat Intelligence – Stay Informed.mp4 |
2.61MB |
| 18. Cyber Threat Intelligence – Stay Informed.srt |
1.19KB |
| 18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4 |
13.37MB |
| 18. Penetration Testing and Ethical Hacking Focused Operating Systems.srt |
1.31KB |
| 18. Security Domains, Isolation and Compartmentalization.mp4 |
14.97MB |
| 18. Security Domains, Isolation and Compartmentalization.srt |
7.14KB |
| 19 |
915.11KB |
| 19.1 LineageOS - httpslineageos.org.html |
83B |
| 19.2 MicroG - httpsmicrog.org.html |
80B |
| 19.3 PureOS Librem 5 - httpspuri.smshoplibrem-5.html |
91B |
| 19.4 iOS - httpsdeveloper.apple.comios.html |
93B |
| 19.5 Replicant - Httpswww.replicant.us.html |
86B |
| 19.6 Android - httpswww.android.com.html |
85B |
| 19.7 OmniROM - httpswww.omnirom.org.html |
85B |
| 19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).mp4 |
46.71MB |
| 19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).srt |
3.39KB |
| 2 |
866.52KB |
| 2.10 httpsen.wikipedia.orgwikiHypervisor.html |
101B |
| 2.11 httpsen.wikipedia.orgwikiComparison_of_platform_virtualization_software.html |
137B |
| 2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html |
137B |
| 2.1 httpsdiasporafoundation.org.html |
92B |
| 2.1 httpswww.stationx.netcanarytokens.html |
99B |
| 2.1 httpswww.stationx.netcertificate-request.html |
106B |
| 2.1 Windows VMs here.html |
124B |
| 2.2 httpfriendica.com.html |
82B |
| 2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html |
132B |
| 2.2 Vmware Network Adapter Settings.html |
191B |
| 2.3 httpstosdr.org.html |
79B |
| 2.3 Virtualbox Network Adapter Settings.html |
104B |
| 2.4 httpvirtualboxes.orgimages.html |
92B |
| 2.4 The complete guide to facebook privacy settings.html |
136B |
| 2.5 httpwww.osboxes.orgguide#!.html |
92B |
| 2.5 List of Personally Identifiable Information (PII).html |
134B |
| 2.6 httpvirtual-machine.org.html |
88B |
| 2.6 Twitter Privacy Settings.html |
120B |
| 2.7 httpswww.eff.orgwho-has-your-back-government-data-requests-2015.html |
128B |
| 2.7 httpwww.osboxes.orgvirtualbox-images.html |
102B |
| 2.8 httpwww.osboxes.orgvmware-images.html |
98B |
| 2.8 httpwww.telegraph.co.uktechnologysocial-media9780565Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html.html |
188B |
| 2.9 httpsgnu.iosocialtry.html |
87B |
| 2.9 httpsmarketplace.vmware.com.html |
92B |
| 2. Certificate Of Completion for CPEs.mp4 |
2.20MB |
| 2. Certificate Of Completion for CPEs.srt |
1.25KB |
| 2. Goals and Learning Objectives.mp4 |
2.70MB |
| 2. Goals and Learning Objectives.srt |
973B |
| 2. Information Disclosure and Identity Strategies for Social Media.mp4 |
83.81MB |
| 2. Information Disclosure and Identity Strategies for Social Media.srt |
25.19KB |
| 2. Introduction to Isolation and Compartmentalization.mp4 |
5.66MB |
| 2. Introduction to Isolation and Compartmentalization.srt |
3.30KB |
| 2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 |
113.35MB |
| 2. Introduction to Setting up a Testing Environment Using Virtual Machines.srt |
12.21KB |
| 2. Security Domains.mp4 |
21.84MB |
| 2. Security Domains.srt |
16.63KB |
| 2. Security Features and Functionality.mp4 |
57.89MB |
| 2. Security Features and Functionality.srt |
7.80KB |
| 2. Security Quick Win!.mp4 |
43.19MB |
| 2. Security Quick Win!.srt |
17.56KB |
| 2. Symmetric Encryption.mp4 |
32.30MB |
| 2. Symmetric Encryption.srt |
11.30KB |
| 2. The Importance of Patching.mp4 |
11.66MB |
| 2. The Importance of Patching.srt |
6.41KB |
| 2. Why You Need Security – The Value Of A Hack.mp4 |
28.93MB |
| 2. Why You Need Security – The Value Of A Hack.srt |
6.68KB |
| 2. Windows 7 - Not using admin.mp4 |
10.99MB |
| 2. Windows 7 - Not using admin.srt |
5.46KB |
| 20 |
117.76KB |
| 20.1 Download Debian.html |
92B |
| 20.2 Debian Live CDDVD.html |
92B |
| 20.3 Free Debian Books and Guides.html |
93B |
| 20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 |
57.78MB |
| 20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.srt |
6.67KB |
| 21 |
248.58KB |
| 22 |
374.14KB |
| 23 |
33.39KB |
| 24 |
113.29KB |
| 25 |
221.84KB |
| 26 |
707.81KB |
| 27 |
432.43KB |
| 28 |
775.16KB |
| 29 |
712.08KB |
| 3 |
489.77KB |
| 3.10 httpgetairmail.com.html |
83B |
| 3.11 Example SMS recieve online site.html |
96B |
| 3.12 httpwww.migmail.net.html |
84B |
| 3.13 httpcrapmail.dken.html |
83B |
| 3.14 Top 10 sites receive sms online without phone.html |
135B |
| 3.15 httpdontmail.net.html |
81B |
| 3.16 httpswww.trash-mail.comen.html |
91B |
| 3.17 http10minutemail.com10MinuteMailindex.html.html |
108B |
| 3.1 Diagram of Mac.html |
131B |
| 3.1 httpsmailinator.com.html |
84B |
| 3.1 httpsresearch.google.compubspub43963.html.html |
107B |
| 3.1 httpwww.vmware.comproductsworkstationcompare.html.html |
116B |
| 3.1 Top 50 products vs security bugs.html |
114B |
| 3.2 httpwww.mytrashmail.com.html |
88B |
| 3.2 httpwww.vmware.comproductsplayerfaqsfaqs.html.html |
113B |
| 3.2 Linux - How to use macchanger.html |
132B |
| 3.2 Report - Buying Into the Bias Why Vulnerability Statistics Suck.html |
168B |
| 3.3 httpwww.dispostable.com.html |
88B |
| 3.3 Windows - Tmac.html |
89B |
| 3.4 httpbugmenot.com.html |
81B |
| 3.4 Mac OS X - How to change the mac address.html |
141B |
| 3.5 httpfreemail.ms.html |
80B |
| 3.5 Mac OS X - Wifispoof.html |
83B |
| 3.6 httpswww.guerrillamail.com.html |
92B |
| 3.6 Mac OS X - Macdaddyx.html |
109B |
| 3.7 httpwww.tempinbox.com.html |
85B |
| 3.8 httpwww.mailexpire.com.html |
87B |
| 3.9 httpsanonbox.net.html |
81B |
| 3. Asymmetric Encryption.mp4 |
72.31MB |
| 3. Asymmetric Encryption.srt |
12.99KB |
| 3. Goals and Learning Objectives - Volume 1.mp4 |
16.10MB |
| 3. Goals and Learning Objectives - Volume 1.srt |
2.88KB |
| 3. Identify Verification and Registration.mp4 |
23.39MB |
| 3. Identify Verification and Registration.srt |
9.36KB |
| 3. Physical and Hardware Isolation - How to change the Mac Address.mp4 |
25.57MB |
| 3. Physical and Hardware Isolation - How to change the Mac Address.srt |
10.90KB |
| 3. Protect What You Value.mp4 |
8.94MB |
| 3. Protect What You Value.srt |
5.35KB |
| 3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4 |
48.07MB |
| 3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).srt |
24.00KB |
| 3. Security Bugs and Vulnerabilities.mp4 |
83.89MB |
| 3. Security Bugs and Vulnerabilities.srt |
6.99KB |
| 3. The Top 3 Things You Need To Stay Safe Online.mp4 |
2.50MB |
| 3. The Top 3 Things You Need To Stay Safe Online.srt |
1.62KB |
| 3. Vmware.mp4 |
110.48MB |
| 3. Vmware.srt |
12.13KB |
| 3. Windows 7 - Auto Update.mp4 |
4.95MB |
| 3. Windows 7 - Auto Update.srt |
1.78KB |
| 3. Windows 8 and 8.1 - Not using admin.mp4 |
18.24MB |
| 3. Windows 8 and 8.1 - Not using admin.srt |
6.13KB |
| 30 |
953.88KB |
| 31 |
104.36KB |
| 32 |
298.92KB |
| 33 |
786.26KB |
| 34 |
586.62KB |
| 35 |
827.87KB |
| 36 |
273.54KB |
| 37 |
275.84KB |
| 38 |
192.71KB |
| 39 |
1005.92KB |
| 4 |
666.39KB |
| 4.1 CVE details.html |
88B |
| 4.1 Example hashes.html |
104B |
| 4.1 httpswww.nitrokey.com.html |
87B |
| 4.1 httpswww.virtualbox.org.html |
88B |
| 4.1 httpwww.urlvoid.com.html |
84B |
| 4.1 OS usage share.html |
125B |
| 4.2 httpswww.exploit-db.comsearch.html |
95B |
| 4.2 httpwww.google.com.stationx.net.html |
95B |
| 4.2 Linux and Mac OS X - dmidecode.html |
93B |
| 4.3 Exploit Kit Landscape Map.html |
99B |
| 4.3 Windows - dmidecode.html |
115B |
| 4.4 Linux - i-nex.html |
88B |
| 4.5 Windows - CPU Z.html |
103B |
| 4.6 Mac OS X - Mac Cupid.html |
120B |
| 4.7 Mac OS X - Installing dmidecode with brew.html |
119B |
| 4.8 httpswww.yubico.com.html |
84B |
| 4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4 |
23.29MB |
| 4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.srt |
14.44KB |
| 4. Hash Functions.mp4 |
89.23MB |
| 4. Hash Functions.srt |
7.19KB |
| 4. Physical and Hardware Isolation - Hardware Serials.mp4 |
50.24MB |
| 4. Physical and Hardware Isolation - Hardware Serials.srt |
17.61KB |
| 4. Sample from Vol 2 - Password cracking part 2.mp4 |
24.15MB |
| 4. Sample from Vol 2 - Password cracking part 2.srt |
13.08KB |
| 4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 |
38.11MB |
| 4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt |
12.04KB |
| 4. Target Audience.mp4 |
7.33MB |
| 4. Target Audience.srt |
3.52KB |
| 4. Usage Share.mp4 |
34.28MB |
| 4. Usage Share.srt |
6.32KB |
| 4. Virtual box.mp4 |
144.15MB |
| 4. Virtual box.srt |
12.43KB |
| 4. What is Privacy, Anonymity and Pseudonymity.mp4 |
11.87MB |
| 4. What is Privacy, Anonymity and Pseudonymity.srt |
5.76KB |
| 4. Windows 10 - Not using admin.mp4 |
14.14MB |
| 4. Windows 10 - Not using admin.srt |
5.04KB |
| 4. Windows 8 & 8.1 - Auto Update.mp4 |
6.54MB |
| 4. Windows 8 & 8.1 - Auto Update.srt |
2.01KB |
| 40 |
610.79KB |
| 41 |
522.38KB |
| 42 |
837.93KB |
| 43 |
907.81KB |
| 44 |
44.82KB |
| 45 |
736.10KB |
| 46 |
1017.21KB |
| 47 |
582.71KB |
| 48 |
701.89KB |
| 49 |
718.55KB |
| 5 |
527.92KB |
| 5.1 Authentic8.html |
97B |
| 5.1 httpswww.parsemail.org.html |
87B |
| 5.1 httpswww.symantec.comenukcode-signing.html |
107B |
| 5.1 Kali AWS appliance.html |
109B |
| 5.1 The Cyber Security Landscape Diagram.jpg |
777.15KB |
| 5.1 With Windows 10, Microsoft Blatantly Disregards User Choice and Privacy A Deep Dive.html |
174B |
| 5.2 httpswww.virustotal.comendocumentationemail-submissions.html |
123B |
| 5.2 Kali iso here if you want to install on a computer's hard disk or live boot it..html |
92B |
| 5.2 Microsoft Service Agreement.html |
123B |
| 5.2 Spoons.net.html |
88B |
| 5.2 Windows 10 Device Guard using Digital Signatures.html |
174B |
| 5.3 httpswhois.domaintools.comblob.com.html |
99B |
| 5.3 Kali images for Virtualbox or VMware.html |
150B |
| 5.3 Microsoft Privacy Statement.html |
114B |
| 5.3 Portable Apps.html |
85B |
| 5.4 Cortana privacy faq.html |
126B |
| 5.4 httpswhois.domaintools.combbc.co.uk.html |
100B |
| 5.4 Kali on Microsoft App Store as an official WSL.html |
123B |
| 5.4 Spikes.html |
91B |
| 5.5 Aegis Secure Key - USB 2.0 Flash Drive.html |
108B |
| 5.5 How to Get Email Headers.html |
111B |
| 5.5 Kali Arm hardware.html |
118B |
| 5.6 Pen Drive Apps.html |
89B |
| 5.7 Maxthon.html |
84B |
| 5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4 |
49.30MB |
| 5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.srt |
19.84KB |
| 5. Digital Signatures.mp4 |
42.73MB |
| 5. Digital Signatures.srt |
5.74KB |
| 5. Hackers, crackers and cyber criminals.mp4 |
7.70MB |
| 5. Hackers, crackers and cyber criminals.srt |
3.36KB |
| 5. Kali Linux 2018.mp4 |
59.63MB |
| 5. Kali Linux 2018.srt |
5.34KB |
| 5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4 |
31.75MB |
| 5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.srt |
23.73KB |
| 5. Security, Vulnerabilities, Threats and Adversaries.mp4 |
11.23MB |
| 5. Security, Vulnerabilities, Threats and Adversaries.srt |
5.23KB |
| 5. Study Recommendations.mp4 |
17.94MB |
| 5. Study Recommendations.srt |
7.33KB |
| 5. Virtual Isolation.mp4 |
57.31MB |
| 5. Virtual Isolation.srt |
14.07KB |
| 5. Windows 10 - Auto Update.mp4 |
4.93MB |
| 5. Windows 10 - Auto Update.srt |
1.90KB |
| 5. Windows 10 - Privacy & Tracking.mp4 |
79.94MB |
| 5. Windows 10 - Privacy & Tracking.srt |
7.88KB |
| 50 |
254.97KB |
| 51 |
794.23KB |
| 52 |
775.84KB |
| 53 |
71.48KB |
| 54 |
1000.65KB |
| 55 |
654.87KB |
| 56 |
21.20KB |
| 57 |
438.45KB |
| 58 |
528.31KB |
| 59 |
865.65KB |
| 6 |
495.08KB |
| 6.1 7 most common RATs.html |
149B |
| 6.1 Dual Booting explained.html |
177B |
| 6.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html |
117B |
| 6.1 httpswww.stationx.netsabsa.html |
92B |
| 6.1 httpwww.scambusters.org.html |
88B |
| 6.1 Microsoft Security Bulletins.html |
115B |
| 6.1 Steve Gibson's Cipher Suite Recommendations.html |
117B |
| 6.2 httpswww.securityforum.org.html |
91B |
| 6.2 httpwww.actionfraud.police.uktypes_of_fraud.html |
108B |
| 6.2 Malware stats.html |
107B |
| 6.2 National vulnerability database.html |
85B |
| 6.2 Weakdh Cipher Suite Recommendations.html |
93B |
| 6.3 Chef Jamie Oliver’s website hacked for the third time.html |
106B |
| 6.3 httpswww.iso.orgstandard56742.html.html |
100B |
| 6.3 httpwww.consumerfraudreporting.orgcredit_freeze_summary.php.html |
124B |
| 6.3 Wikipedia Transport Layer Security (TLS) page.html |
115B |
| 6.3 Windows 10 Ditches Patch Tuesday for Security's Sake.html |
178B |
| 6.4 Common Vulnerabilities and Exposures.html |
85B |
| 6.4 Mozilla Cipher Suite Recommendations.html |
110B |
| 6.4 SophosLabs 2018 Malware Forecast.html |
162B |
| 6.5 Patch Tuesday may be dead, but Microsoft's not confessing to the crime.html |
197B |
| 6.5 Report - Spotlight perils of malvertisements.html |
142B |
| 6. Asset Selection.mp4 |
7.68MB |
| 6. Asset Selection.srt |
3.95KB |
| 6. Course updates.mp4 |
13.93MB |
| 6. Course updates.srt |
892B |
| 6. Dual Boot.mp4 |
7.92MB |
| 6. Dual Boot.srt |
4.82KB |
| 6. Malware, viruses, rootkits and RATs.mp4 |
12.14MB |
| 6. Malware, viruses, rootkits and RATs.srt |
8.22KB |
| 6. Sample from Vol 4 - Email clients, protocols and authentication.mp4 |
38.18MB |
| 6. Sample from Vol 4 - Email clients, protocols and authentication.srt |
21.72KB |
| 6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 |
160.85MB |
| 6. Secure Sockets Layer (SSL) and Transport layer security (TLS).srt |
15.38KB |
| 6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp4 |
14.51MB |
| 6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).srt |
9.19KB |
| 6. Windows 10 - Disable tracking automatically.mp4 |
67.88MB |
| 6. Windows 10 - Disable tracking automatically.srt |
6.39KB |
| 6. Windows - Criticality and Patch Tuesday.mp4 |
41.81MB |
| 6. Windows - Criticality and Patch Tuesday.srt |
4.50KB |
| 60 |
214.29KB |
| 61 |
626.93KB |
| 62 |
725.46KB |
| 63 |
271.42KB |
| 64 |
167.40KB |
| 65 |
473.49KB |
| 66 |
101.97KB |
| 67 |
661.26KB |
| 68 |
686.32KB |
| 69 |
777.12KB |
| 7 |
714.57KB |
| 7.1 Chromium sandbox design.html |
121B |
| 7.1 Flexera Personal Software Inspector - Previously Secunia PSI.html |
174B |
| 7.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html |
117B |
| 7.1 httpwww.slate.comarticlestechnologybitwise201502lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html.html |
198B |
| 7.1 Intro to Sniffers.html |
127B |
| 7.2 Arpwatch Tool to Monitor Ethernet Activity in Linux.html |
119B |
| 7.2 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html |
135B |
| 7.2 Mozilla Sandbox design.html |
102B |
| 7.3 httpssecurelist.comanalysisquarterly-malware-reports72493it-threat-evolution-in-q3-2015.html |
156B |
| 7.3 SSL Strip tool By Moxie Marlinspike.html |
107B |
| 7.4 httpwww.telegraph.co.uknewsworldnewsnorthamericausa11416985Millions-of-computers-may-be-compromised-by-US-spyware-report.html.html |
195B |
| 7.4 WIFI Pineapple.html |
91B |
| 7.5 Cain & Abel.html |
89B |
| 7.6 sniffdet - Remote Sniffer Detection ToolLibrary.html |
93B |
| 7. Built-in Sandboxes and Application Isolation.mp4 |
10.40MB |
| 7. Built-in Sandboxes and Application Isolation.srt |
4.85KB |
| 7. Cyber Security and Ethical Hacking Careers.mp4 |
31.22MB |
| 7. Cyber Security and Ethical Hacking Careers.srt |
5.06KB |
| 7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 |
10.77MB |
| 7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt |
6.03KB |
| 7. SSL Stripping.mp4 |
114.52MB |
| 7. SSL Stripping.srt |
15.13KB |
| 7. Threat Modeling and Risk Assessments.mp4 |
18.03MB |
| 7. Threat Modeling and Risk Assessments.srt |
10.34KB |
| 7. Windows 10 - Tool Disable Windows 10 Tracking.mp4 |
98.43MB |
| 7. Windows 10 - Tool Disable Windows 10 Tracking.srt |
8.79KB |
| 7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4 |
19.35MB |
| 7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.srt |
12.15KB |
| 70 |
993.22KB |
| 71 |
62.72KB |
| 72 |
658.02KB |
| 73 |
825.82KB |
| 74 |
923.40KB |
| 75 |
228.17KB |
| 76 |
32.41KB |
| 77 |
506.24KB |
| 78 |
878.77KB |
| 79 |
69.44KB |
| 8 |
588.63KB |
| 8.1 Debian Security Page.html |
93B |
| 8.1 How to disable cortana-on Windows 10.html |
147B |
| 8.1 Live phishing links.html |
87B |
| 8.1 Server Name Indication (SNI) Wiki.html |
113B |
| 8.1 Shadowdefender.html |
91B |
| 8.2 Automatic Security Updates.html |
119B |
| 8.2 Cortana privacy faq.html |
126B |
| 8.2 Deepfreeze Cloud Browser and Desktop.html |
129B |
| 8.2 Homograph attack using internationalized domain name.html |
134B |
| 8.3 BufferZone.html |
112B |
| 8.3 How to Disable Cortana in Windows 10’s Anniversary Update.html |
130B |
| 8.3 Software distributions based on Debian.html |
105B |
| 8.3 XSS example vulnerability.html |
136B |
| 8.4 Comodo.html |
110B |
| 8.5 Deepfreeze Standard.html |
121B |
| 8.6 f-sandbox.html |
92B |
| 8.7 Returnil.html |
118B |
| 8. HTTPS (HTTP Secure).mp4 |
81.90MB |
| 8. HTTPS (HTTP Secure).srt |
7.90KB |
| 8. Linux - Debian - Patching.mp4 |
38.49MB |
| 8. Linux - Debian - Patching.srt |
17.00KB |
| 8. Security vs Privacy vs Anonymity - Can we have it all.mp4 |
5.44MB |
| 8. Security vs Privacy vs Anonymity - Can we have it all.srt |
2.87KB |
| 8. What is Phishing, Vishing and SMShing.mp4 |
25.98MB |
| 8. What is Phishing, Vishing and SMShing.srt |
17.48KB |
| 8. Windows 10 – Cortana.mp4 |
41.02MB |
| 8. Windows 10 – Cortana.srt |
4.33KB |
| 8. Windows - Sandboxes and Application Isolation.mp4 |
26.36MB |
| 8. Windows - Sandboxes and Application Isolation.srt |
9.63KB |
| 80 |
152.89KB |
| 81 |
424.79KB |
| 82 |
643.07KB |
| 83 |
883.71KB |
| 84 |
79.75KB |
| 85 |
135.84KB |
| 86 |
343.08KB |
| 87 |
791.95KB |
| 88 |
9.24KB |
| 89 |
238.45KB |
| 9 |
787.94KB |
| 9.1 Apple security updates.html |
101B |
| 9.1 Complete guide windows 10 privacy settings.html |
134B |
| 9.1 httpsen.wikipedia.orgwikiAuthentication.html |
105B |
| 9.1 Introduction and quick guide sandboxie.html |
143B |
| 9.1 Spam example.html |
142B |
| 9.2 httpwhatis.techtarget.comdefinitionConfidentiality-integrity-and-availability-CIA.html |
147B |
| 9.2 Mac Update.html |
86B |
| 9.2 Sandboxie How it Works.html |
106B |
| 9.2 SmartScreen Filter FAQ.html |
145B |
| 9.2 Spam stats.html |
104B |
| 9.3 httpsen.wikipedia.orgwikiAuthorization.html |
104B |
| 9.3 igeekblogs - How to enable updates.html |
134B |
| 9.3 Sandboxie forum.html |
96B |
| 9.4 httpbrew.sh.html |
76B |
| 9.4 httpswww.stationx.netsabsa.html |
92B |
| 9.4 Sandboxie guide.html |
118B |
| 9.5 httpsen.wikipedia.orgwikiNon-repudiation.html |
106B |
| 9.6 httpsen.wikipedia.orgwikiParkerian_Hexad.html |
106B |
| 9. Confidentiality, Integrity and Availability - (Security Attributes).mp4 |
19.33MB |
| 9. Confidentiality, Integrity and Availability - (Security Attributes).srt |
11.81KB |
| 9. Digital Certificates.mp4 |
81.97MB |
| 9. Digital Certificates.srt |
7.00KB |
| 9. Mac - Patching.mp4 |
55.58MB |
| 9. Mac - Patching.srt |
10.17KB |
| 9. Spamming & Doxing.mp4 |
4.79MB |
| 9. Spamming & Doxing.srt |
3.93KB |
| 9. Windows 10 – Privacy Settings.mp4 |
86.46MB |
| 9. Windows 10 – Privacy Settings.srt |
11.11KB |
| 9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4 |
70.11MB |
| 9. Windows - Sandboxes and Application Isolation - Sandboxie.srt |
16.80KB |
| 90 |
615.30KB |
| 91 |
740.45KB |
| 92 |
59.25KB |
| 93 |
832.11KB |
| 94 |
84.16KB |
| 95 |
309.93KB |
| 96 |
330.31KB |
| 97 |
687.68KB |
| 98 |
473.86KB |
| 99 |
533.46KB |
| TutsNode.com.txt |
63B |