Torrent Info
Title The Complete Cyber Security Course Hackers Exposed!
Category
Size 3.53GB
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
001 Nathans-Cyber-Security-Blog.txt 40B
001 Nathans-Twitter-GotoNathan.txt 32B
001 Welcome and Introduction to the Instructor.mp4 19.90MB
001 Welcome and Introduction to the Instructor-en.srt 2.19KB
001 Welcome and Introduction to the Instructor-es.srt 2.31KB
001 Welcome and Introduction to the Instructor-it.srt 2.32KB
001 Welcome and Introduction to the Instructor-ja.srt 402B
001 Welcome and Introduction to the Instructor-pt.srt 2.28KB
001 Welcome and Introduction to the Instructor-tr.srt 2.08KB
002 https-www.stationx.net-canarytokens-.txt 40B
002 Security Quick Win.mp4 43.19MB
002 Security Quick Win-en.srt 18.25KB
002 Security Quick Win-es.srt 18.82KB
002 Security Quick Win-it.srt 18.59KB
002 Security Quick Win-ja.srt 3.63KB
002 Security Quick Win-pt.srt 18.33KB
002 Security Quick Win-tr.srt 16.86KB
003 Goals and Learning Objectives - Volume 1.mp4 16.10MB
003 Goals and Learning Objectives - Volume 1-en.srt 2.98KB
003 Goals and Learning Objectives - Volume 1-es.srt 3.10KB
003 Goals and Learning Objectives - Volume 1-it.srt 3.12KB
003 Goals and Learning Objectives - Volume 1-ja.srt 721B
003 Goals and Learning Objectives - Volume 1-pt.srt 3.10KB
003 Goals and Learning Objectives - Volume 1-tr.srt 2.87KB
004 Target Audience.mp4 7.33MB
004 Target Audience-en.srt 4.80KB
004 Target Audience-es.srt 3.66KB
004 Target Audience-it.srt 3.62KB
004 Target Audience-ja.srt 498B
004 Target Audience-pt.srt 3.53KB
004 Target Audience-tr.srt 3.28KB
005 Study Recommendations.mp4 17.94MB
005 Study Recommendations-en.srt 7.59KB
005 Study Recommendations-es.srt 7.79KB
005 Study Recommendations-it.srt 7.86KB
005 Study Recommendations-ja.srt 1.77KB
005 Study Recommendations-pt.srt 7.67KB
005 Study Recommendations-tr.srt 7.15KB
006 Course updates.mp4 4.39MB
006 Course updates-en.srt 924B
006 Course updates-es.srt 918B
006 Course updates-it.srt 990B
006 Course updates-ja.srt 48B
006 Course updates-pt.srt 937B
006 Course updates-tr.srt 863B
007 Theory and Practical.mp4 2.24MB
007 Theory and Practical-en.srt 1.57KB
007 Theory and Practical-es.srt 1.66KB
007 Theory and Practical-it.srt 1.59KB
007 Theory and Practical-ja.srt 231B
007 Theory and Practical-pt.srt 1.59KB
007 Theory and Practical-tr.srt 1.48KB
008 Goals and Learning Objectives.mp4 2.70MB
008 Goals and Learning Objectives-en.srt 1.27KB
008 Goals and Learning Objectives-es.srt 980B
008 Goals and Learning Objectives-it.srt 999B
008 Goals and Learning Objectives-ja.srt 91B
008 Goals and Learning Objectives-pt.srt 953B
008 Goals and Learning Objectives-tr.srt 844B
009 Protect What You Value.mp4 8.93MB
009 Protect What You Value-en.srt 5.54KB
010 What is Privacy Anonymity and Pseudonymity.mp4 11.87MB
010 What is Privacy Anonymity and Pseudonymity-en.srt 5.98KB
010 What is Privacy Anonymity and Pseudonymity-es.srt 6.28KB
010 What is Privacy Anonymity and Pseudonymity-it.srt 6.19KB
010 What is Privacy Anonymity and Pseudonymity-ja.srt 1.14KB
010 What is Privacy Anonymity and Pseudonymity-pt.srt 6.14KB
010 What is Privacy Anonymity and Pseudonymity-tr.srt 5.62KB
011 Security Vulnerabilities Threats and Adversaries.mp4 11.23MB
011 Security Vulnerabilities Threats and Adversaries-en.srt 5.42KB
011 Security Vulnerabilities Threats and Adversaries-es.srt 5.80KB
011 Security Vulnerabilities Threats and Adversaries-it.srt 5.80KB
011 Security Vulnerabilities Threats and Adversaries-ja.srt 1.23KB
011 Security Vulnerabilities Threats and Adversaries-pt.srt 5.58KB
011 Security Vulnerabilities Threats and Adversaries-tr.srt 4.97KB
011 The-Cyber-Security-Landscape-Diagram.jpg 777.15KB
012 Asset Selection.mp4 7.68MB
012 Asset Selection-en.srt 4.08KB
012 Asset Selection-es.srt 4.39KB
012 Asset Selection-it.srt 4.39KB
012 Asset Selection-ja.srt 866B
012 Asset Selection-pt.srt 4.22KB
012 Asset Selection-tr.srt 3.81KB
012 https-www.iso.org-standard-56742.html.txt 41B
012 https-www.securityforum.org-.txt 32B
012 https-www.stationx.net-sabsa-.txt 33B
013 Threat Modeling and Risk Assessments.mp4 18.03MB
013 Threat Modeling and Risk Assessments-en.srt 10.71KB
013 Threat Modeling and Risk Assessments-es.srt 11.31KB
013 Threat Modeling and Risk Assessments-it.srt 11.38KB
013 Threat Modeling and Risk Assessments-ja.srt 1.85KB
013 Threat Modeling and Risk Assessments-pt.srt 10.90KB
013 Threat Modeling and Risk Assessments-tr.srt 10.06KB
014 Security vs Privacy vs Anonymity - Can we have it all.mp4 5.43MB
014 Security vs Privacy vs Anonymity - Can we have it all-en.srt 2.99KB
014 Security vs Privacy vs Anonymity - Can we have it all-es.srt 3.15KB
014 Security vs Privacy vs Anonymity - Can we have it all-it.srt 3.13KB
014 Security vs Privacy vs Anonymity - Can we have it all-ja.srt 734B
014 Security vs Privacy vs Anonymity - Can we have it all-pt.srt 3.02KB
014 Security vs Privacy vs Anonymity - Can we have it all-tr.srt 2.81KB
015 Confidentiality Integrity and Availability - (Security Attributes).mp4 19.33MB
015 Confidentiality Integrity and Availability - (Security Attributes)-en.srt 12.26KB
015 Confidentiality Integrity and Availability - (Security Attributes)-es.srt 12.77KB
015 Confidentiality Integrity and Availability - (Security Attributes)-it.srt 12.87KB
015 Confidentiality Integrity and Availability - (Security Attributes)-ja.srt 2.44KB
015 Confidentiality Integrity and Availability - (Security Attributes)-pt.srt 12.50KB
015 Confidentiality Integrity and Availability - (Security Attributes)-tr.srt 11.50KB
015 https-en.wikipedia.org-wiki-Authentication.txt 46B
015 https-en.wikipedia.org-wiki-Authorization.txt 45B
015 https-en.wikipedia.org-wiki-Non-repudiation.txt 47B
015 https-en.wikipedia.org-wiki-Parkerian-Hexad.txt 47B
015 https-www.stationx.net-sabsa-.txt 33B
015 http-whatis.techtarget.com-definition-Confidentiality-integrity-and-availability-CIA.txt 88B
016 Defense In Depth.mp4 2.99MB
016 Defense In Depth-en.srt 1.86KB
016 Defense In Depth-es.srt 2.01KB
016 Defense In Depth-it.srt 1.98KB
016 Defense In Depth-ja.srt 329B
016 Defense In Depth-pt.srt 1.92KB
016 Defense In Depth-tr.srt 1.69KB
017 The Zero Trust Model.mp4 10.27MB
017 The Zero Trust Model-en.srt 5.05KB
017 The Zero Trust Model-es.srt 5.33KB
017 The Zero Trust Model-it.srt 5.29KB
017 The Zero Trust Model-ja.srt 932B
017 The Zero Trust Model-pt.srt 5.29KB
017 The Zero Trust Model-tr.srt 4.83KB
018 Goals and Learning Objectives.mp4 2.89MB
018 Goals and Learning Objectives-en.srt 1.56KB
018 Goals and Learning Objectives-es.srt 1.26KB
018 Goals and Learning Objectives-it.srt 1.26KB
018 Goals and Learning Objectives-ja.srt 236B
018 Goals and Learning Objectives-pt.srt 1.20KB
018 Goals and Learning Objectives-tr.srt 1.17KB
019 http-krebsonsecurity.com-E2-10-the-scrap-value-of-a-hacked-pc-revisited-.txt 78B
019 http-krebsonsecurity.com-E3-06-the-value-of-a-hacked-email-account-.txt 73B
019 Why You Need Security The Value Of A Hack.mp4 28.92MB
019 Why You Need Security The Value Of A Hack-en.srt 6.93KB
019 Why You Need Security The Value Of A Hack-es.srt 7.18KB
019 Why You Need Security The Value Of A Hack-it.srt 7.33KB
019 Why You Need Security The Value Of A Hack-ja.srt 1.56KB
019 Why You Need Security The Value Of A Hack-pt.srt 7.12KB
019 Why You Need Security The Value Of A Hack-tr.srt 6.45KB
020 https-research.google.com-pubs-pub43963.html.txt 48B
020 The Top 3 Things You Need To Stay Safe Online.mp4 2.50MB
020 The Top 3 Things You Need To Stay Safe Online-en.srt 1.68KB
020 The Top 3 Things You Need To Stay Safe Online-es.srt 1.79KB
020 The Top 3 Things You Need To Stay Safe Online-it.srt 1.76KB
020 The Top 3 Things You Need To Stay Safe Online-ja.srt 476B
020 The Top 3 Things You Need To Stay Safe Online-pt.srt 1.75KB
020 The Top 3 Things You Need To Stay Safe Online-tr.srt 1.70KB
021 CVE-details.txt 29B
021 Exploit-Kit-Landscape-Map.txt 40B
021 https-www.exploit-db.com-search-.txt 36B
021 Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 38.10MB
021 Security Bugs and Vulnerabilities - The Vulnerability Landscape-en.srt 12.48KB
021 Security Bugs and Vulnerabilities - The Vulnerability Landscape-es.srt 13.07KB
021 Security Bugs and Vulnerabilities - The Vulnerability Landscape-it.srt 12.91KB
021 Security Bugs and Vulnerabilities - The Vulnerability Landscape-ja.srt 3.09KB
021 Security Bugs and Vulnerabilities - The Vulnerability Landscape-pt.srt 12.86KB
021 Security Bugs and Vulnerabilities - The Vulnerability Landscape-tr.srt 11.85KB
022 Hackers crackers and cyber criminals.mp4 7.70MB
022 Hackers crackers and cyber criminals-en.srt 3.48KB
022 Hackers crackers and cyber criminals-es.srt 3.61KB
022 Hackers crackers and cyber criminals-it.srt 3.60KB
022 Hackers crackers and cyber criminals-ja.srt 571B
022 Hackers crackers and cyber criminals-pt.srt 3.49KB
022 Hackers crackers and cyber criminals-tr.srt 3.18KB
023 7-most-common-RATs.txt 90B
023 Chef-Jamie-Oliver-s-website-hacked-for-the-third-time.txt 47B
023 Malware-stats.txt 48B
023 Malware viruses rootkits and RATs.mp4 12.14MB
023 Malware viruses rootkits and RATs-en.srt 8.52KB
023 Malware viruses rootkits and RATs-es.srt 9.08KB
023 Malware viruses rootkits and RATs-it.srt 8.98KB
023 Malware viruses rootkits and RATs-ja.srt 1.75KB
023 Malware viruses rootkits and RATs-pt.srt 8.89KB
023 Malware viruses rootkits and RATs-tr.srt 7.96KB
023 Report-Spotlight-perils-of-malvertisements.txt 83B
023 SophosLabs-E8-Malware-Forecast.txt 103B
024 https-securelist.com-analysis-quarterly-malware-reports-72493-it-threat-evolution-in-q3-E5-.txt 97B
024 http-www.mcafee.com-us-resources-reports-rp-quarterly-threat-q4-E4.pdf.txt 76B
024 http-www.slate.com-articles-technology-bitwise-E5-02-lenovo-superfish-scandal-why-it-s-one-of-the-worst-consumer-computing-screw.html.txt 139B
024 http-www.telegraph.co.uk-news-worldnews-northamerica-usa-11416985-Millions-of-computers-may-be-compromised-by-US-spyware-report.html.txt 136B
024 Spyware Adware Scareware PUPs Browser hijacking.mp4 10.77MB
024 Spyware Adware Scareware PUPs Browser hijacking-en.srt 6.26KB
024 Spyware Adware Scareware PUPs Browser hijacking-es.srt 6.38KB
024 Spyware Adware Scareware PUPs Browser hijacking-it.srt 6.47KB
024 Spyware Adware Scareware PUPs Browser hijacking-ja.srt 1.26KB
024 Spyware Adware Scareware PUPs Browser hijacking-pt.srt 6.26KB
024 Spyware Adware Scareware PUPs Browser hijacking-tr.srt 5.78KB
025 Homograph-attack-using-internationalized-domain-name.txt 75B
025 Live-phishing-links.txt 28B
025 What is Phishing Vishing and SMShing.mp4 25.98MB
025 What is Phishing Vishing and SMShing-en.srt 18.12KB
025 XSS-example-vulnerability.txt 77B
026 Spam-example.txt 83B
026 Spamming Doxing.mp4 4.78MB
026 Spamming Doxing-en.srt 4.06KB
026 Spamming Doxing-es.srt 4.42KB
026 Spamming Doxing-it.srt 4.27KB
026 Spamming Doxing-ja.srt 800B
026 Spamming Doxing-pt.srt 4.25KB
026 Spamming Doxing-tr.srt 3.87KB
026 Spam-stats.txt 45B
027 http-www.actionfraud.police.uk-types-of-fraud.txt 49B
027 http-www.consumerfraudreporting.org.txt 39B
027 Social engineering - Scams cons tricks and fraud.mp4 11.91MB
027 Social engineering - Scams cons tricks and fraud-en.srt 6.95KB
027 Social engineering - Scams cons tricks and fraud-es.srt 7.47KB
027 Social engineering - Scams cons tricks and fraud-it.srt 7.42KB
027 Social engineering - Scams cons tricks and fraud-ja.srt 1.48KB
027 Social engineering - Scams cons tricks and fraud-pt.srt 7.24KB
027 Social engineering - Scams cons tricks and fraud-tr.srt 6.58KB
027 Top-10-scams.txt 68B
028 CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 16.19MB
028 CPU Hijackers - Crypto Mining Malware and Cryptojackers-en.srt 11.20KB
028 CPU Hijackers - Crypto Mining Malware and Cryptojackers-es.srt 12.37KB
028 CPU Hijackers - Crypto Mining Malware and Cryptojackers-it.srt 12.02KB
028 CPU Hijackers - Crypto Mining Malware and Cryptojackers-ja.srt 3.60KB
028 CPU Hijackers - Crypto Mining Malware and Cryptojackers-pt.srt 11.86KB
028 CPU Hijackers - Crypto Mining Malware and Cryptojackers-tr.srt 10.98KB
028 Cryptocurrency-Mining-Malware-Infected-Over-Half-Million-PCs-Using-an-NSA-Exploit.txt 70B
028 http-bgr.com-E8-02-13-android-malware-mining-cryptocurrency-monero-xmr-.txt 77B
028 https-addons.mozilla.org-en-GB-firefox-addon-no-coin-.txt 57B
028 https-addons.mozilla.org-en-US-firefox-addon-ublock-origin-.txt 63B
028 https-arstechnica.com-information-technology-E8-01-now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners-.txt 125B
028 https-coinhive.com-.txt 23B
028 https-github.com-hoshsadiq-adblock-nocoin-list-.txt 51B
028 https-thehackernews.com-E8-02-cryptojacking-malware.html.txt 62B
028 https-torrentfreak.com-pirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011-.txt 87B
028 https-www.engadget.com-E8-02-13-attackers-telegram-deliver-cryptocurrency-mining-malware-.txt 95B
029 Darknets Dark Markets and Exploit kits.mp4 32.43MB
029 Darknets Dark Markets and Exploit kits-en.srt 9.71KB
029 Darknets Dark Markets and Exploit kits-es.srt 10.38KB
029 Darknets Dark Markets and Exploit kits-it.srt 10.32KB
029 Darknets Dark Markets and Exploit kits-ja.srt 2.75KB
029 Darknets Dark Markets and Exploit kits-pt.srt 10.13KB
029 Darknets Dark Markets and Exploit kits-tr.srt 9.05KB
029 https-www.deepdotweb.com-dark-net-market-comparison-chart-.txt 62B
030 Governments spies and secret stuff part I.mp4 27.02MB
030 Governments spies and secret stuff part I-en.srt 6.87KB
031 Governments spies and secret stuff part II.mp4 30.23MB
031 Governments spies and secret stuff part II-en.srt 12.59KB
031 Governments spies and secret stuff part II-es.srt 13.45KB
031 Governments spies and secret stuff part II-it.srt 13.43KB
031 Governments spies and secret stuff part II-ja.srt 3.23KB
031 Governments spies and secret stuff part II-pt.srt 13.06KB
031 Governments spies and secret stuff part II-tr.srt 11.61KB
031 https-cryptome.org-E4-01-nsa-codenames.htm.txt 48B
031 https-nsa.gov1.info-dni-nsa-ant-catalog-.txt 44B
031 https-theintercept.com-.txt 27B
031 https-wikileaks.org-Leaks.html.txt 36B
031 http-www.nsaplayset.org-.txt 28B
031 Through-a-PRISM-Darkly-Everything-we-know-about-NSA-spying-30c3-.txt 45B
032 A-Worldwide-Survey-of-Encryption-Products-pdf.txt 94B
032 A-Worldwide-Survey-of-E-ncryption-Products-xls.txt 95B
032 Clipper-chip.txt 133B
032 http-cis-india.org-internet-governance-blog-how-india-regulates-encryption.txt 78B
032 https-www.csoonline.com-article-3213033-security-nsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-shaE7.html.txt 134B
032 http-www.crypto.com-papers-governmentreform-blazeE5.pdf.txt 61B
032 http-www.washingtonsblog.com-E5-05-nsa-admits-it-collects-too-much-info-to-stop-terror-attacks.html.txt 105B
032 Kazakhstans-new-encryption-law.txt 126B
032 Matt-Blaze-Speaking-to-a-US-congressional-committee.txt 48B
032 Regulating encryption mandating insecurity legalizing spying.mp4 42.73MB
032 Regulating encryption mandating insecurity legalizing spying-en.srt 18.55KB
032 Report-Keys-Under-Doormats-Mandating-insecurity-by-requiring-government-access-to-all-data-and-communication.txt 91B
032 The-Case-against-Regulating-Encryption-Technology.txt 53B
032 UK-data-communications-bill.txt 62B
032 WhatsApp-was-Banned-for-48-Hours-in-Brazil.txt 53B
033 Apple-backdoor-order.txt 53B
033 Apple-removes-malware-infected-apps-from-the-app-store.txt 106B
033 Examples-of-backdoors.txt 64B
033 Formal-methods.txt 46B
033 http-blog.cryptographyengineering.com-E5-12-on-juniper-backdoor.html.txt 74B
033 https-blog.torproject.org-blog-deterministic-builds-part-one-cyberwar-and-global-compromise.txt 95B
033 https-reproducible-builds.org-.txt 34B
033 Trust Backdoors.mp4 24.48MB
033 Trust Backdoors-en.srt 12.97KB
033 Trust Backdoors-es.srt 14.11KB
033 Trust Backdoors-it.srt 13.82KB
033 Trust Backdoors-ja.srt 2.83KB
033 Trust Backdoors-pt.srt 13.46KB
033 Trust Backdoors-tr.srt 12.30KB
033 Video-on-how-to-build-your-own-software-reproducibly.txt 83B
034 Censorship.mp4 6.48MB
034 Censorship-en.srt 3.18KB
034 Censorship-es.srt 3.44KB
034 Censorship-it.srt 3.38KB
034 Censorship-ja.srt 781B
034 Censorship-pt.srt 3.28KB
034 Censorship-tr.srt 2.96KB
034 http-searchenginewatch.com-sew-news-2s154-google-censorship-ruling-in-canada-has-worldwide-implications.txt 109B
034 https-www.google.com-transparencyreport-removals-europeprivacy-hl-en.txt 73B
034 https-www.google.com-transparencyreport-removals-government-hl-en.txt 70B
035 Cyber Threat Intelligence Stay Informed.mp4 2.61MB
035 Cyber Threat Intelligence Stay Informed-en.srt 1.24KB
035 Cyber Threat Intelligence Stay Informed-es.srt 1.29KB
035 Cyber Threat Intelligence Stay Informed-it.srt 1.27KB
035 Cyber Threat Intelligence Stay Informed-ja.srt 278B
035 Cyber Threat Intelligence Stay Informed-pt.srt 1.28KB
035 Cyber Threat Intelligence Stay Informed-tr.srt 1.09KB
035 http-www.stationx.net-alerts.txt 32B
036 Goals and Learning Objectives.mp4 1.63MB
036 Goals and Learning Objectives-en.srt 884B
036 Goals and Learning Objectives-es.srt 641B
036 Goals and Learning Objectives-it.srt 641B
036 Goals and Learning Objectives-ja.srt 93B
036 Goals and Learning Objectives-pt.srt 628B
036 Goals and Learning Objectives-tr.srt 548B
037 Symmetric Encryption.mp4 32.30MB
037 Symmetric Encryption-en.srt 11.71KB
037 Symmetric Encryption-es.srt 11.99KB
037 Symmetric Encryption-it.srt 12.08KB
037 Symmetric Encryption-ja.srt 3.33KB
037 Symmetric Encryption-pt.srt 11.88KB
037 Symmetric Encryption-tr.srt 10.92KB
038 Asymmetric Encryption.mp4 72.31MB
038 Asymmetric Encryption-en.srt 13.46KB
038 Asymmetric Encryption-es.srt 14.01KB
038 Asymmetric Encryption-it.srt 14.17KB
038 Asymmetric Encryption-ja.srt 3.42KB
038 Asymmetric Encryption-pt.srt 13.85KB
038 Asymmetric Encryption-tr.srt 12.58KB
039 Example-hashes.txt 45B
039 Hash Functions.mp4 89.23MB
039 Hash Functions-en.srt 7.47KB
039 Hash Functions-es.srt 7.71KB
039 Hash Functions-it.srt 7.74KB
039 Hash Functions-ja.srt 1.85KB
039 Hash Functions-pt.srt 7.49KB
039 Hash Functions-tr.srt 7.11KB
040 Digital Signatures.mp4 42.73MB
040 Digital Signatures-en.srt 5.94KB
040 Digital Signatures-es.srt 5.97KB
040 Digital Signatures-it.srt 6.08KB
040 Digital Signatures-ja.srt 1.05KB
040 Digital Signatures-pt.srt 5.93KB
040 Digital Signatures-tr.srt 5.43KB
040 https-www.symantec.com-en-uk-code-signing-.txt 48B
040 Windows-10-Device-Guard-using-Digital-Signatures.txt 115B
041 Mozilla-Cipher-Suite-Recommendations.txt 51B
041 Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 160.84MB
041 Secure Sockets Layer (SSL) and Transport layer security (TLS)-en.srt 15.91KB
041 Secure Sockets Layer (SSL) and Transport layer security (TLS)-es.srt 16.25KB
041 Secure Sockets Layer (SSL) and Transport layer security (TLS)-it.srt 16.27KB
041 Secure Sockets Layer (SSL) and Transport layer security (TLS)-ja.srt 4.60KB
041 Secure Sockets Layer (SSL) and Transport layer security (TLS)-pt.srt 15.95KB
041 Secure Sockets Layer (SSL) and Transport layer security (TLS)-tr.srt 14.70KB
041 Steve-Gibsons-Cipher-Suite-Recommendations.txt 58B
041 Weakdh-Cipher-Suite-Recommendations.txt 34B
041 Wikipedia-Transport-Layer-Security-TLS-page.txt 56B
042 Arpwatch-Tool-to-Monitor-Ethernet-Activity-in-Linux.txt 60B
042 Cain-Abel.txt 30B
042 Intro-to-Sniffers.txt 68B
042 sniffdet-Remote-Sniffer-Detection-Tool-Library.txt 34B
042 SSL Stripping.mp4 114.51MB
042 SSL Stripping-en.srt 15.67KB
042 SSL-Strip-tool-By-Moxie-Marlinspike.txt 48B
042 WIFI-Pineapple.txt 32B
043 HTTPS (HTTP Secure).mp4 81.89MB
043 HTTPS (HTTP Secure)-en.srt 8.19KB
043 HTTPS (HTTP Secure)-es.srt 8.39KB
043 HTTPS (HTTP Secure)-it.srt 8.42KB
043 HTTPS (HTTP Secure)-ja.srt 2.60KB
043 HTTPS (HTTP Secure)-pt.srt 8.32KB
043 HTTPS (HTTP Secure)-tr.srt 7.84KB
043 Server-Name-Indication-SNI-Wiki.txt 54B
044 Digital Certificates.mp4 81.96MB
044 Digital Certificates-en.srt 7.27KB
044 Digital Certificates-es.srt 7.42KB
044 Digital Certificates-it.srt 7.57KB
044 Digital Certificates-ja.srt 2.17KB
044 Digital Certificates-pt.srt 7.28KB
044 Digital Certificates-tr.srt 6.77KB
045 CA-Ecosystem.txt 46B
045 CA-example-mistake.txt 121B
045 Cert-Fingerprints.txt 38B
045 Certificate Authorities and HTTPS.mp4 199.30MB
045 Certificate Authorities and HTTPS-en.srt 19.38KB
045 Certificate Authorities and HTTPS-es.srt 19.63KB
045 Certificate Authorities and HTTPS-it.srt 19.92KB
045 Certificate Authorities and HTTPS-ja.srt 5.65KB
045 Certificate Authorities and HTTPS-pt.srt 19.20KB
045 Certificate Authorities and HTTPS-tr.srt 17.87KB
045 Certificate-patrol.txt 68B
045 SSL-Sniff.txt 48B
046 End-to-End Encryption (E2EE).mp4 8.18MB
046 End-to-End Encryption (E2EE)-en.srt 2.30KB
046 End-to-End Encryption (E2EE)-es.srt 2.43KB
046 End-to-End Encryption (E2EE)-it.srt 2.46KB
046 End-to-End Encryption (E2EE)-ja.srt 497B
046 End-to-End Encryption (E2EE)-pt.srt 2.42KB
046 End-to-End Encryption (E2EE)-tr.srt 2.11KB
047 http-www.spammimic.com.txt 26B
047 List-of-Steg-Tools.txt 46B
047 OpenPuff.txt 57B
047 OpenPuff-Manual.txt 48B
047 Steganography.mp4 104.30MB
047 Steganography-en.srt 10.12KB
047 Steganography-es.srt 10.29KB
047 Steganography-it.srt 10.31KB
047 Steganography-ja.srt 2.36KB
047 Steganography-pt.srt 10.10KB
047 Steganography-tr.srt 9.23KB
048 How Security and Encryption is Really Attacked.mp4 17.36MB
048 How Security and Encryption is Really Attacked-en.srt 3.64KB
048 How Security and Encryption is Really Attacked-es.srt 3.82KB
048 How Security and Encryption is Really Attacked-it.srt 3.89KB
048 How Security and Encryption is Really Attacked-ja.srt 432B
048 How Security and Encryption is Really Attacked-pt.srt 3.63KB
048 How Security and Encryption is Really Attacked-tr.srt 3.39KB
048 Security-Pitfalls.txt 76B
049 Goals and Learning Objectives.mp4 1.84MB
049 Goals and Learning Objectives-en.srt 1012B
049 Goals and Learning Objectives-es.srt 780B
049 Goals and Learning Objectives-it.srt 804B
049 Goals and Learning Objectives-ja.srt 155B
049 Goals and Learning Objectives-pt.srt 773B
049 Goals and Learning Objectives-tr.srt 706B
050 https-en.wikipedia.org-wiki-Comparison-of-platform-virtualization-software.txt 78B
050 https-en.wikipedia.org-wiki-Hypervisor.txt 42B
050 https-marketplace.vmware.com-.txt 33B
050 http-virtualboxes.org-images-.txt 33B
050 http-virtual-machine.org-.txt 29B
050 http-www.osboxes.org-guide-.txt 33B
050 http-www.osboxes.org-virtualbox-images-.txt 43B
050 http-www.osboxes.org-vmware-images-.txt 39B
050 Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 113.35MB
050 Introduction to Setting up a Testing Environment Using Virtual Machines-en.srt 12.66KB
050 Introduction to Setting up a Testing Environment Using Virtual Machines-es.srt 12.67KB
050 Introduction to Setting up a Testing Environment Using Virtual Machines-it.srt 12.64KB
050 Introduction to Setting up a Testing Environment Using Virtual Machines-ja.srt 3.91KB
050 Introduction to Setting up a Testing Environment Using Virtual Machines-pt.srt 12.56KB
050 Introduction to Setting up a Testing Environment Using Virtual Machines-tr.srt 11.32KB
050 Virtualbox-Network-Adapter-Settings.txt 45B
050 Vmware-Network-Adapter-Settings.txt 132B
050 Windows-VMs-here.txt 65B
051 http-www.vmware.com-products-player-faqs-faqs.html.txt 54B
051 http-www.vmware.com-products-workstation-compare.html.txt 57B
051 Vmware.mp4 110.47MB
051 Vmware-en.srt 12.59KB
051 Vmware-es.srt 12.95KB
051 Vmware-it.srt 12.81KB
051 Vmware-ja.srt 3.55KB
051 Vmware-pt.srt 12.72KB
051 Vmware-tr.srt 11.62KB
052 https-www.virtualbox.org-.txt 29B
052 Virtual box.mp4 144.15MB
052 Virtual box-en.srt 12.92KB
052 Virtual box-es.srt 13.27KB
052 Virtual box-it.srt 13.43KB
052 Virtual box-ja.srt 4.06KB
052 Virtual box-pt.srt 13.01KB
052 Virtual box-tr.srt 11.97KB
053 Kali-Arm-hardware.txt 59B
053 Kali-AWS-appliance.txt 50B
053 Kali-images-for-Virtualbox-or-VMware.txt 91B
053 Kali-iso-here-if-you-want-to-install-on-a-computers-hard-disk-or-live-boot-it..txt 33B
053 Kali Linux E8.mp4 59.62MB
053 Kali Linux E8-en.srt 5.52KB
053 Kali Linux E8-es.srt 5.88KB
053 Kali Linux E8-it.srt 5.69KB
053 Kali Linux E8-ja.srt 2.02KB
053 Kali Linux E8-pt.srt 5.61KB
053 Kali Linux E8-tr.srt 5.16KB
053 Kali-on-Microsoft-App-Store-as-an-official-WSL.txt 64B
054 Goals and Learning Objectives.mp4 2.43MB
054 Goals and Learning Objectives-en.srt 884B
054 Goals and Learning Objectives-es.srt 990B
054 Goals and Learning Objectives-it.srt 1015B
054 Goals and Learning Objectives-ja.srt 43B
054 Goals and Learning Objectives-pt.srt 1001B
054 Goals and Learning Objectives-tr.srt 914B
055 Security Features and Functionality.mp4 10.63MB
055 Security Features and Functionality-en.srt 5.86KB
055 Security Features and Functionality-es.srt 4.58KB
055 Security Features and Functionality-it.srt 4.54KB
055 Security Features and Functionality-ja.srt 1.57KB
055 Security Features and Functionality-pt.srt 4.50KB
055 Security Features and Functionality-tr.srt 4.12KB
056 Report-Buying-Into-the-Bias-Why-Vulnerability-Statistics-Suck.txt 109B
056 Security Bugs and Vulnerabilities.mp4 22.06MB
056 Security Bugs and Vulnerabilities-en.srt 7.09KB
056 Security Bugs and Vulnerabilities-es.srt 5.38KB
056 Security Bugs and Vulnerabilities-it.srt 5.33KB
056 Security Bugs and Vulnerabilities-ja.srt 1.76KB
056 Security Bugs and Vulnerabilities-pt.srt 5.28KB
056 Security Bugs and Vulnerabilities-tr.srt 4.90KB
056 Top-50-products-vs-security-bugs.txt 55B
057 OS-usage-share.txt 66B
057 Usage Share.mp4 15.36MB
057 Usage Share-en.srt 7.88KB
057 Usage Share-es.srt 6.61KB
057 Usage Share-it.srt 6.67KB
057 Usage Share-ja.srt 1.52KB
057 Usage Share-pt.srt 6.56KB
057 Usage Share-tr.srt 6.00KB
058 Cortana-privacy-faq.txt 67B
058 Microsoft-Privacy-Statement.txt 63B
058 Microsoft-Service-Agreement.txt 64B
058 Windows 10 - Privacy Tracking.mp4 45.18MB
058 Windows 10 - Privacy Tracking-en.srt 13.86KB
058 Windows 10 - Privacy Tracking-es.srt 10.99KB
058 Windows 10 - Privacy Tracking-it.srt 10.85KB
058 Windows 10 - Privacy Tracking-ja.srt 2.48KB
058 Windows 10 - Privacy Tracking-pt.srt 10.79KB
058 Windows 10 - Privacy Tracking-tr.srt 10.03KB
058 With-Windows-10-Microsoft-Blatantly-Disregards-User-Choice-and-Privacy-A-Deep-Dive.txt 115B
059 https-github.com-10se1ucgo-DisableWinTracking-releases.txt 58B
059 Windows 10 - Disable tracking automatically.mp4 22.46MB
059 Windows 10 - Disable tracking automatically-en.srt 11.80KB
059 Windows 10 - Disable tracking automatically-es.srt 9.64KB
059 Windows 10 - Disable tracking automatically-it.srt 9.40KB
059 Windows 10 - Disable tracking automatically-ja.srt 2.44KB
059 Windows 10 - Disable tracking automatically-pt.srt 9.44KB
059 Windows 10 - Disable tracking automatically-tr.srt 8.72KB
060 https-github.com-10se1ucgo-DisableWinTracking-releases.txt 58B
060 Windows 10 - Tool Disable Windows 10 Tracking.mp4 53.60MB
060 Windows 10 - Tool Disable Windows 10 Tracking-en.srt 15.32KB
060 Windows 10 - Tool Disable Windows 10 Tracking-es.srt 12.80KB
060 Windows 10 - Tool Disable Windows 10 Tracking-it.srt 12.80KB
060 Windows 10 - Tool Disable Windows 10 Tracking-ja.srt 2.55KB
060 Windows 10 - Tool Disable Windows 10 Tracking-pt.srt 12.65KB
060 Windows 10 - Tool Disable Windows 10 Tracking-tr.srt 11.90KB
061 Cortana-privacy-faq.txt 67B
061 How-to-Disable-Cortana-in-Windows-10-s-Anniversary-Update.txt 71B
061 Windows 10 Cortana.mp4 5.26MB
061 Windows 10 Cortana-en.srt 4.86KB
061 Windows 10 Cortana-es.srt 3.96KB
061 Windows 10 Cortana-it.srt 3.96KB
061 Windows 10 Cortana-ja.srt 1.01KB
061 Windows 10 Cortana-pt.srt 3.85KB
061 Windows 10 Cortana-tr.srt 3.63KB
062 SmartScreen-Filter-FAQ.txt 86B
062 Windows 10 Privacy Settings.mp4 22.57MB
062 Windows 10 Privacy Settings-en.srt 10.89KB
062 Windows 10 Privacy Settings-es.srt 11.94KB
062 Windows 10 Privacy Settings-it.srt 11.74KB
062 Windows 10 Privacy Settings-ja.srt 2.76KB
062 Windows 10 Privacy Settings-pt.srt 11.49KB
062 Windows 10 Privacy Settings-tr.srt 10.67KB
063 Windows 10 - WiFi Sense.mp4 17.46MB
063 Windows 10 - WiFi Sense-en.srt 8.29KB
063 Windows 10 - WiFi Sense-es.srt 6.26KB
063 Windows 10 - WiFi Sense-it.srt 6.30KB
063 Windows 10 - WiFi Sense-ja.srt 2.04KB
063 Windows 10 - WiFi Sense-pt.srt 6.25KB
063 Windows 10 - WiFi Sense-tr.srt 5.64KB
064 GWX-Control-Panel.txt 41B
064 http-www.zdnet.com-article-how-to-block-windows-10-upgrades-on-your-business-network-and-at-home-too-.txt 105B
064 Microsoft-How-to-manage-Windows-10-notification-and-upgrade-options.txt 48B
064 Never-10-by-Steve-Gibson-Use-this-.txt 33B
064 Windows 7 8 and 8.1 - Privacy Tracking.mp4 43.69MB
064 Windows 7 8 and 8.1 - Privacy Tracking-en.srt 15.06KB
064 Windows 7 8 and 8.1 - Privacy Tracking-es.srt 12.20KB
064 Windows 7 8 and 8.1 - Privacy Tracking-it.srt 12.13KB
064 Windows 7 8 and 8.1 - Privacy Tracking-ja.srt 3.36KB
064 Windows 7 8 and 8.1 - Privacy Tracking-pt.srt 12.07KB
064 Windows 7 8 and 8.1 - Privacy Tracking-tr.srt 11.38KB
065 Fix-Mac-OS-X.txt 25B
065 Mac - Privacy Tracking.mp4 42.28MB
065 Mac - Privacy Tracking-en.srt 9.23KB
065 Mac - Privacy Tracking-es.srt 7.78KB
065 Mac - Privacy Tracking-it.srt 7.72KB
065 Mac - Privacy Tracking-ja.srt 2.22KB
065 Mac - Privacy Tracking-pt.srt 7.69KB
065 Mac - Privacy Tracking-tr.srt 7.05KB
065 Washingtonpost-How-apples-os-x-yosemite-tracks-you.txt 154B
066 http-distrowatch.com-.txt 25B
066 Linux and Unix like Operating systems.mp4 19.86MB
066 Linux and Unix like Operating systems-en.srt 6.90KB
066 Linux and Unix like Operating systems-es.srt 5.65KB
066 Linux and Unix like Operating systems-it.srt 5.57KB
066 Linux and Unix like Operating systems-ja.srt 2.10KB
066 Linux and Unix like Operating systems-pt.srt 5.62KB
066 Linux and Unix like Operating systems-tr.srt 5.21KB
067 Debian-ISO-downloads.txt 33B
067 Debian-Live-CD.txt 33B
067 Debian-Vmware-and-Virtualbox-images-for-download.txt 32B
067 https-www.debian.org-.txt 25B
067 Linux - Debian.mp4 2.37MB
067 Linux - Debian-en.srt 1.42KB
067 Linux - Debian-es.srt 1.75KB
067 Linux - Debian-it.srt 1.70KB
067 Linux - Debian-ja.srt 444B
067 Linux - Debian-pt.srt 1.68KB
067 Linux - Debian-tr.srt 1.52KB
068 Debian-Live-CD-DVD.txt 33B
068 Download-Debian.txt 33B
068 Free-Debian-Books-and-Guides.txt 34B
068 Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 36.59MB
068 Linux - Debian 8 Jessie - Virtual box guest additions Issue-en.srt 10.27KB
068 Linux - Debian 8 Jessie - Virtual box guest additions Issue-es.srt 8.66KB
068 Linux - Debian 8 Jessie - Virtual box guest additions Issue-it.srt 8.78KB
068 Linux - Debian 8 Jessie - Virtual box guest additions Issue-ja.srt 2.64KB
068 Linux - Debian 8 Jessie - Virtual box guest additions Issue-pt.srt 8.66KB
068 Linux - Debian 8 Jessie - Virtual box guest additions Issue-tr.srt 8.10KB
069 https-www.archlinux.org-.txt 28B
069 http-www.openbsd.org-.txt 25B
069 Linux - OpenBSD and Archlinux.mp4 12.57MB
069 Linux - OpenBSD and Archlinux-en.srt 3.52KB
069 Linux - OpenBSD and Archlinux-es.srt 2.78KB
069 Linux - OpenBSD and Archlinux-it.srt 2.73KB
069 Linux - OpenBSD and Archlinux-ja.srt 910B
069 Linux - OpenBSD and Archlinux-pt.srt 2.69KB
069 Linux - OpenBSD and Archlinux-tr.srt 2.47KB
070 https-fixubuntu.com-.txt 24B
070 http-www.ubuntu.com-.txt 24B
070 Linux - Ubuntu.mp4 2.70MB
070 Linux - Ubuntu-en.srt 1.32KB
070 Linux - Ubuntu-es.srt 1.47KB
070 Linux - Ubuntu-it.srt 1.46KB
070 Linux - Ubuntu-ja.srt 300B
070 Linux - Ubuntu-pt.srt 1.49KB
070 Linux - Ubuntu-tr.srt 1.38KB
071 Goals and Learning Objectives.mp4 1.66MB
071 Goals and Learning Objectives-en.srt 602B
071 Goals and Learning Objectives-es.srt 710B
071 Goals and Learning Objectives-it.srt 677B
071 Goals and Learning Objectives-ja.srt 91B
071 Goals and Learning Objectives-pt.srt 681B
071 Goals and Learning Objectives-tr.srt 622B
072 The Importance of Patching.mp4 11.66MB
072 The Importance of Patching-en.srt 8.92KB
072 The Importance of Patching-es.srt 6.95KB
072 The Importance of Patching-it.srt 6.97KB
072 The Importance of Patching-ja.srt 1.42KB
072 The Importance of Patching-pt.srt 6.82KB
072 The Importance of Patching-tr.srt 6.36KB
073 Windows 7 - Auto Update.mp4 4.94MB
073 Windows 7 - Auto Update-en.srt 2.45KB
073 Windows 7 - Auto Update-es.srt 1.95KB
073 Windows 7 - Auto Update-it.srt 1.98KB
073 Windows 7 - Auto Update-ja.srt 587B
073 Windows 7 - Auto Update-pt.srt 1.92KB
073 Windows 7 - Auto Update-tr.srt 1.93KB
074 Windows 8 8.1 - Auto Update.mp4 6.54MB
074 Windows 8 8.1 - Auto Update-en.srt 2.77KB
074 Windows 8 8.1 - Auto Update-es.srt 2.08KB
074 Windows 8 8.1 - Auto Update-it.srt 2.06KB
074 Windows 8 8.1 - Auto Update-ja.srt 628B
074 Windows 8 8.1 - Auto Update-pt.srt 2.05KB
074 Windows 8 8.1 - Auto Update-tr.srt 1.99KB
075 Windows 10 - Auto Update.mp4 4.93MB
075 Windows 10 - Auto Update-en.srt 2.54KB
075 Windows 10 - Auto Update-es.srt 2.04KB
075 Windows 10 - Auto Update-it.srt 1.97KB
075 Windows 10 - Auto Update-ja.srt 557B
075 Windows 10 - Auto Update-pt.srt 1.97KB
075 Windows 10 - Auto Update-tr.srt 1.97KB
076 Common-Vulnerabilities-and-Exposures.txt 26B
076 Microsoft-Security-Bulletins.txt 56B
076 National-vulnerability-database.txt 26B
076 Patch-Tuesday-may-be-dead-but-Microsofts-not-confessing-to-the-crime.txt 138B
076 Windows-10-Ditches-Patch-Tuesday-for-Securitys-Sake.txt 119B
076 Windows - Criticality and Patch Tuesday.mp4 41.81MB
076 Windows - Criticality and Patch Tuesday-en.srt 5.97KB
076 Windows - Criticality and Patch Tuesday-es.srt 4.88KB
076 Windows - Criticality and Patch Tuesday-it.srt 4.88KB
076 Windows - Criticality and Patch Tuesday-ja.srt 1.17KB
076 Windows - Criticality and Patch Tuesday-pt.srt 4.86KB
076 Windows - Criticality and Patch Tuesday-tr.srt 4.51KB
077 Flexera-Personal-Software-Inspector-Previously-Secunia-PSI.txt 115B
077 Windows 7 8 8.1 10 - Automate the pain away from patching.mp4 19.35MB
077 Windows 7 8 8.1 10 - Automate the pain away from patching-en.srt 16.20KB
077 Windows 7 8 8.1 10 - Automate the pain away from patching-es.srt 12.46KB
077 Windows 7 8 8.1 10 - Automate the pain away from patching-it.srt 12.57KB
077 Windows 7 8 8.1 10 - Automate the pain away from patching-ja.srt 2.39KB
077 Windows 7 8 8.1 10 - Automate the pain away from patching-pt.srt 12.52KB
077 Windows 7 8 8.1 10 - Automate the pain away from patching-tr.srt 11.62KB
078 Automatic-Security-Updates.txt 60B
078 Debian-Security-Page.txt 34B
078 Linux - Debian - Patching.mp4 38.49MB
078 Linux - Debian - Patching-en.srt 22.57KB
078 Linux - Debian - Patching-es.srt 18.41KB
078 Linux - Debian - Patching-it.srt 18.37KB
078 Linux - Debian - Patching-ja.srt 5.02KB
078 Linux - Debian - Patching-pt.srt 18.05KB
078 Linux - Debian - Patching-tr.srt 16.83KB
078 Software-distributions-based-on-Debian.txt 46B
079 Apple-security-updates.txt 42B
079 http-brew.sh-.txt 17B
079 igeekblogs-How-to-enable-updates.txt 75B
079 Mac - Patching.mp4 55.58MB
079 Mac - Patching-en.srt 13.74KB
079 Mac - Patching-es.srt 11.44KB
079 Mac - Patching-it.srt 11.25KB
079 Mac - Patching-ja.srt 3.37KB
079 Mac - Patching-pt.srt 11.24KB
079 Mac - Patching-tr.srt 10.55KB
079 Mac-Update.txt 27B
080 Firefox - Browser and extension updates.mp4 34.01MB
080 Firefox - Browser and extension updates-en.srt 8.87KB
080 Firefox - Browser and extension updates-es.srt 7.19KB
080 Firefox - Browser and extension updates-it.srt 7.24KB
080 Firefox - Browser and extension updates-ja.srt 1.44KB
080 Firefox - Browser and extension updates-pt.srt 7.17KB
080 Firefox - Browser and extension updates-tr.srt 6.74KB
081 Chrome - Browser and extension updates.mp4 3.57MB
081 Chrome - Browser and extension updates-en.srt 2.41KB
081 Chrome - Browser and extension updates-es.srt 2.08KB
081 Chrome - Browser and extension updates-it.srt 2.10KB
081 Chrome - Browser and extension updates-ja.srt 674B
081 Chrome - Browser and extension updates-pt.srt 2.09KB
081 Chrome - Browser and extension updates-tr.srt 2.00KB
082 IE and Edge - Browser and extention updates.mp4 5.63MB
082 IE and Edge - Browser and extention updates-en.srt 1.47KB
082 IE and Edge - Browser and extention updates-es.srt 1.15KB
082 IE and Edge - Browser and extention updates-it.srt 1.13KB
082 IE and Edge - Browser and extention updates-ja.srt 608B
082 IE and Edge - Browser and extention updates-pt.srt 1.13KB
082 IE and Edge - Browser and extention updates-tr.srt 1.07KB
083 Auto updates - The Impact to privacy and anonymity.mp4 4.30MB
083 Auto updates - The Impact to privacy and anonymity-en.srt 3.98KB
083 Auto updates - The Impact to privacy and anonymity-es.srt 3.14KB
083 Auto updates - The Impact to privacy and anonymity-it.srt 3.15KB
083 Auto updates - The Impact to privacy and anonymity-ja.srt 671B
083 Auto updates - The Impact to privacy and anonymity-pt.srt 3.09KB
083 Auto updates - The Impact to privacy and anonymity-tr.srt 2.84KB
084 Goals and Learning Objectives Removing Privilege.mp4 13.59MB
084 Goals and Learning Objectives Removing Privilege-en.srt 3.92KB
084 Goals and Learning Objectives Removing Privilege-es.srt 4.40KB
084 Goals and Learning Objectives Removing Privilege-it.srt 4.42KB
084 Goals and Learning Objectives Removing Privilege-ja.srt 778B
084 Goals and Learning Objectives Removing Privilege-pt.srt 4.30KB
084 Goals and Learning Objectives Removing Privilege-tr.srt 3.91KB
085 Windows 7 - Not using admin.mp4 10.99MB
085 Windows 7 - Not using admin-en.srt 7.23KB
085 Windows 7 - Not using admin-es.srt 5.88KB
085 Windows 7 - Not using admin-it.srt 5.90KB
085 Windows 7 - Not using admin-ja.srt 899B
085 Windows 7 - Not using admin-pt.srt 5.83KB
085 Windows 7 - Not using admin-tr.srt 5.37KB
086 Windows 8 and 8.1 - Not using admin.mp4 18.24MB
086 Windows 8 and 8.1 - Not using admin-en.srt 7.99KB
086 Windows 8 and 8.1 - Not using admin-es.srt 6.84KB
086 Windows 8 and 8.1 - Not using admin-it.srt 6.86KB
086 Windows 8 and 8.1 - Not using admin-ja.srt 1.40KB
086 Windows 8 and 8.1 - Not using admin-pt.srt 6.76KB
086 Windows 8 and 8.1 - Not using admin-tr.srt 6.24KB
087 Windows 10 - Not using admin.mp4 14.14MB
087 Windows 10 - Not using admin-en.srt 6.51KB
087 Windows 10 - Not using admin-es.srt 5.60KB
087 Windows 10 - Not using admin-it.srt 5.55KB
087 Windows 10 - Not using admin-ja.srt 1.49KB
087 Windows 10 - Not using admin-pt.srt 5.50KB
087 Windows 10 - Not using admin-tr.srt 5.09KB
088 Goals and Learning Objectives.mp4 1.73MB
088 Goals and Learning Objectives-en.srt 939B
088 Goals and Learning Objectives-es.srt 716B
088 Goals and Learning Objectives-it.srt 713B
088 Goals and Learning Objectives-ja.vtt 664B
088 Goals and Learning Objectives-pt.srt 672B
088 Goals and Learning Objectives-tr.srt 653B
089 http-friendica.com-.txt 23B
089 https-diasporafoundation.org-.txt 33B
089 https-gnu.io-social-try-.txt 28B
089 https-tosdr.org-.txt 20B
089 https-www.eff.org-who-has-your-back-government-data-requests-E5.txt 69B
089 http-www.telegraph.co.uk-technology-social-media-9780565-Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html.txt 129B
089 Information Disclosure and Identity Strategies for Social Media.mp4 83.81MB
089 Information Disclosure and Identity Strategies for Social Media-en.srt 32.95KB
089 Information Disclosure and Identity Strategies for Social Media-es.srt 25.81KB
089 Information Disclosure and Identity Strategies for Social Media-it.srt 25.93KB
089 Information Disclosure and Identity Strategies for Social Media-ja.srt 5.28KB
089 Information Disclosure and Identity Strategies for Social Media-pt.srt 25.41KB
089 Information Disclosure and Identity Strategies for Social Media-tr.srt 23.86KB
089 List-of-Personally-Identifiable-Information-PII-.txt 75B
089 The-complete-guide-to-facebook-privacy-settings.txt 77B
089 Twitter-Privacy-Settings.txt 61B
090 Example-SMS-recieve-online-site.txt 37B
090 http-10minutemail.com-10MinuteMail-index.html.txt 49B
090 http-bugmenot.com-.txt 22B
090 http-crapmail.dk-en-.txt 24B
090 http-dontmail.net-.txt 22B
090 http-freemail.ms-.txt 21B
090 http-getairmail.com-.txt 24B
090 https-anonbox.net-.txt 22B
090 https-mailinator.com-.txt 25B
090 https-www.guerrillamail.com-.txt 33B
090 https-www.trash-mail.com-en-.txt 32B
090 http-www.dispostable.com-.txt 29B
090 http-www.mailexpire.com-.txt 28B
090 http-www.migmail.net-.txt 25B
090 http-www.mytrashmail.com-.txt 29B
090 http-www.tempinbox.com.txt 26B
090 Identify Verification and Registration.mp4 23.39MB
090 Identify Verification and Registration-en.srt 12.50KB
090 Identify Verification and Registration-es.srt 9.80KB
090 Identify Verification and Registration-it.srt 9.74KB
090 Identify Verification and Registration-ja.srt 2.13KB
090 Identify Verification and Registration-pt.srt 9.56KB
090 Identify Verification and Registration-tr.srt 8.98KB
090 Top-10-sites-receive-sms-online-without-phone.txt 76B
091 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 1.mp4 23.29MB
091 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 1-en.srt 18.94KB
091 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 1-es.srt 15.43KB
091 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 1-it.srt 15.43KB
091 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 1-ja.srt 3.77KB
091 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 1-pt.srt 14.93KB
091 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 1-tr.srt 14.09KB
091 http-www.google.com.stationx.net.txt 36B
091 http-www.urlvoid.com-.txt 25B
092 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 2.mp4 49.30MB
092 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 2-en.srt 25.83KB
092 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 2-es.srt 20.81KB
092 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 2-it.srt 20.57KB
092 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 2-ja.srt 5.02KB
092 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 2-pt.srt 20.19KB
092 Behavioural Security Controls Against Social Threats (Phishing Spam) Part 2-tr.srt 19.31KB
092 How-to-Get-Email-Headers.txt 52B
092 https-whois.domaintools.com-bbc.co.uk.txt 41B
092 https-whois.domaintools.com-blob.com.txt 40B
092 https-www.parsemail.org-.txt 28B
092 https-www.virustotal.com-en-documentation-email-submissions-.txt 64B
093 http-www.actionfraud.police.uk-types-of-fraud.txt 49B
093 http-www.consumerfraudreporting.org-credit-freeze-summary.php.txt 65B
093 http-www.scambusters.org-.txt 29B
093 Technical Security Controls Against Social Threats (Phishing Spam Scam Cons).mp4 14.51MB
093 Technical Security Controls Against Social Threats (Phishing Spam Scam Cons)-en.srt 12.18KB
093 Technical Security Controls Against Social Threats (Phishing Spam Scam Cons)-es.srt 9.67KB
093 Technical Security Controls Against Social Threats (Phishing Spam Scam Cons)-it.srt 9.60KB
093 Technical Security Controls Against Social Threats (Phishing Spam Scam Cons)-ja.srt 2.08KB
093 Technical Security Controls Against Social Threats (Phishing Spam Scam Cons)-pt.srt 9.40KB
093 Technical Security Controls Against Social Threats (Phishing Spam Scam Cons)-tr.srt 8.89KB
094 Goals and Learning Objectives.mp4 1.43MB
094 Goals and Learning Objectives-en.srt 471B
094 Goals and Learning Objectives-es.srt 531B
094 Goals and Learning Objectives-it.srt 543B
094 Goals and Learning Objectives-ja.srt 43B
094 Goals and Learning Objectives-pt.srt 521B
094 Goals and Learning Objectives-tr.srt 472B
095 Security Domains.mp4 21.84MB
095 Security Domains-en.srt 22.72KB
095 Security Domains-es.srt 17.46KB
095 Security Domains-it.srt 17.46KB
095 Security Domains-ja.srt 3.00KB
095 Security Domains-pt.srt 17.12KB
095 Security Domains-tr.srt 16.20KB
096 Goals and Learning Objectives.mp4 2.29MB
096 Goals and Learning Objectives-en.srt 782B
096 Goals and Learning Objectives-es.srt 794B
096 Goals and Learning Objectives-it.srt 845B
096 Goals and Learning Objectives-ja.srt 43B
096 Goals and Learning Objectives-pt.srt 793B
096 Goals and Learning Objectives-tr.srt 728B
097 Introduction to Isolation and Compartmentalization.mp4 5.66MB
097 Introduction to Isolation and Compartmentalization-en.srt 4.50KB
097 Introduction to Isolation and Compartmentalization-es.srt 3.54KB
097 Introduction to Isolation and Compartmentalization-it.srt 3.56KB
097 Introduction to Isolation and Compartmentalization-ja.srt 306B
097 Introduction to Isolation and Compartmentalization-pt.srt 3.47KB
097 Introduction to Isolation and Compartmentalization-tr.srt 3.21KB
098 Diagram-of-Mac.txt 72B
098 Linux-How-to-use-macchanger.txt 73B
098 Mac-OS-X-How-to-change-the-mac-address.txt 82B
098 Mac-OS-X-Macdaddyx.txt 50B
098 Mac-OS-X-Wifispoof.txt 24B
098 Physical and Hardware Isolation - How to change the Mac Address.mp4 25.57MB
098 Physical and Hardware Isolation - How to change the Mac Address-en.srt 14.56KB
098 Physical and Hardware Isolation - How to change the Mac Address-es.srt 11.94KB
098 Physical and Hardware Isolation - How to change the Mac Address-it.srt 11.84KB
098 Physical and Hardware Isolation - How to change the Mac Address-ja.srt 4.02KB
098 Physical and Hardware Isolation - How to change the Mac Address-pt.srt 11.66KB
098 Physical and Hardware Isolation - How to change the Mac Address-tr.srt 11.01KB
098 Windows-Tmac.txt 30B
099 https-www.nitrokey.com-.txt 28B
099 https-www.yubico.com-.txt 25B
099 Linux-and-Mac-OS-X-dmidecode.txt 34B
099 Linux-i-nex.txt 29B
099 Mac-OS-X-Installing-dmidecode-with-brew.txt 60B
099 Mac-OS-X-Mac-Cupid.txt 61B
099 Physical and Hardware Isolation - Hardware Serials.mp4 50.24MB
099 Physical and Hardware Isolation - Hardware Serials-en.srt 24.33KB
099 Physical and Hardware Isolation - Hardware Serials-es.srt 19.18KB
099 Physical and Hardware Isolation - Hardware Serials-it.srt 19.30KB
099 Physical and Hardware Isolation - Hardware Serials-ja.srt 5.16KB
099 Physical and Hardware Isolation - Hardware Serials-pt.srt 18.98KB
099 Physical and Hardware Isolation - Hardware Serials-tr.srt 17.58KB
099 Windows-CPU-Z.txt 44B
099 Windows-dmidecode.txt 56B
100 Aegis-Secure-Key-USB-2.0-Flash-Drive.txt 49B
100 Authentic8.txt 38B
100 Maxthon.txt 25B
100 Pen-Drive-Apps.txt 30B
100 Portable-Apps.txt 26B
100 Spikes.txt 32B
100 Spoons.net.txt 29B
100 Virtual Isolation.mp4 57.31MB
100 Virtual Isolation-en.srt 19.91KB
100 Virtual Isolation-es.srt 15.61KB
100 Virtual Isolation-it.srt 15.54KB
100 Virtual Isolation-ja.srt 2.81KB
100 Virtual Isolation-pt.srt 15.42KB
100 Virtual Isolation-tr.srt 14.21KB
101 Dual Boot.mp4 7.92MB
101 Dual Boot-en.srt 6.54KB
101 Dual Boot-es.srt 4.93KB
101 Dual-Booting-explained.txt 118B
101 Dual Boot-it.srt 4.94KB
101 Dual Boot-ja.srt 895B
101 Dual Boot-pt.srt 4.93KB
101 Dual Boot-tr.srt 4.52KB
102 Built-in Sandboxes and Application Isolation.mp4 10.40MB
102 Built-in Sandboxes and Application Isolation-en.srt 6.69KB
102 Built-in Sandboxes and Application Isolation-es.srt 5.24KB
102 Built-in Sandboxes and Application Isolation-it.srt 5.18KB
102 Built-in Sandboxes and Application Isolation-ja.srt 979B
102 Built-in Sandboxes and Application Isolation-pt.srt 5.12KB
102 Built-in Sandboxes and Application Isolation-tr.srt 4.73KB
102 Chromium-sandbox-design.txt 62B
102 Mozilla-Sandbox-design.txt 43B
103 BufferZone.txt 53B
103 Comodo.txt 51B
103 Deepfreeze-Cloud-Browser-and-Desktop.txt 70B
103 Deepfreeze-Standard.txt 62B
103 f-sandbox.txt 33B
103 Returnil.txt 59B
103 Shadowdefender.txt 32B
103 Windows - Sandboxes and Application Isolation.mp4 26.36MB
103 Windows - Sandboxes and Application Isolation-en.srt 13.23KB
103 Windows - Sandboxes and Application Isolation-es.srt 10.33KB
103 Windows - Sandboxes and Application Isolation-it.srt 10.16KB
103 Windows - Sandboxes and Application Isolation-ja.srt 2.77KB
103 Windows - Sandboxes and Application Isolation-pt.srt 10.03KB
103 Windows - Sandboxes and Application Isolation-tr.srt 9.27KB
104 Introduction-and-quick-guide-sandboxie.txt 84B
104 Sandboxie-forum.txt 37B
104 Sandboxie-guide.txt 59B
104 Sandboxie-How-it-Works.txt 47B
104 Windows - Sandboxes and Application Isolation - Sandboxie.mp4 70.11MB
104 Windows - Sandboxes and Application Isolation - Sandboxie-en.srt 23.41KB
104 Windows - Sandboxes and Application Isolation - Sandboxie-es.srt 18.70KB
104 Windows - Sandboxes and Application Isolation - Sandboxie-it.srt 18.49KB
104 Windows - Sandboxes and Application Isolation - Sandboxie-ja.srt 3.84KB
104 Windows - Sandboxes and Application Isolation - Sandboxie-pt.srt 18.34KB
104 Windows - Sandboxes and Application Isolation - Sandboxie-tr.srt 17.25KB
105 Apparmor.txt 46B
105 Firejail.txt 33B
105 Linux-Sandbox.txt 37B
105 Linux - Sandboxes and Application Isolation.mp4 13.85MB
105 Linux - Sandboxes and Application Isolation-en.srt 5.49KB
105 Linux - Sandboxes and Application Isolation-es.srt 4.31KB
105 Linux - Sandboxes and Application Isolation-it.srt 4.31KB
105 Linux - Sandboxes and Application Isolation-ja.srt 1.66KB
105 Linux - Sandboxes and Application Isolation-pt.srt 4.21KB
105 Linux - Sandboxes and Application Isolation-tr.srt 3.99KB
105 Script-Sandfox.txt 59B
105 Trusted-BSD.txt 28B
106 Apple-Sandbox-Guide.txt 80B
106 Buckle-Up.txt 38B
106 Firefox-profile.txt 73B
106 How-to-run-your-Applications-in-a-Mac-OS-X-sandbox-to-enhance-security.txt 117B
106 Mac-OS-X-App-Sandbox.txt 134B
106 Mac - Sandboxes and Application Isolation.mp4 23.79MB
106 Mac - Sandboxes and Application Isolation-en.srt 11.59KB
106 Mac - Sandboxes and Application Isolation-es.srt 9.05KB
106 Mac - Sandboxes and Application Isolation-it.srt 9.00KB
106 Mac - Sandboxes and Application Isolation-ja.srt 2.16KB
106 Mac - Sandboxes and Application Isolation-pt.srt 8.94KB
106 Mac - Sandboxes and Application Isolation-tr.srt 8.48KB
106 OSX-Sandbox-Seatbelt-Profiles.txt 60B
106 Sandbox-Man-page.txt 106B
106 SuperDuper.txt 68B
107 KVM-Debian-Jessie.txt 39B
107 OpenVZ.txt 31B
107 Turnkey-Linux-Openvpn.txt 38B
107 Virt-Manager.txt 27B
107 Virtual Machines.mp4 44.43MB
107 Virtual Machines-en.srt 25.15KB
107 Virtual Machines-es.srt 20.34KB
107 Virtual Machines-it.srt 20.32KB
107 Virtual Machines-ja.srt 6.68KB
107 Virtual Machines-pt.srt 20.05KB
107 Virtual Machines-tr.srt 18.83KB
107 Wikipedia-Comparison-of-platform-virtualization-software.txt 78B
107 Wikipedia-Hypervisor.txt 42B
107 Wikipedia-Kernel-based-Virtual-Machine.txt 60B
108 A-look-at-malware-with-VM-detection.txt 102B
108 Example-VMware-security-bug.txt 64B
108 Exploiting-dram-rowhammer-Could-be-used-on-VMs-in-the-future-.txt 93B
108 https-en.wikipedia.org-wiki-Covert-channel.txt 46B
108 https-en.wikipedia.org-wiki-Timing-channel.txt 46B
108 https-en.wikipedia.org-wiki-X86-virtualization.txt 50B
108 Report-Cross-VM-Side-Channels-and-Their-Use-to-Extract-Pr-ivate-Keys.txt 51B
108 Venom.txt 31B
108 Virtual Machine Weaknesses.mp4 22.73MB
108 Virtual Machine Weaknesses-en.srt 22.49KB
108 Virtual Machine Weaknesses-es.srt 17.56KB
108 Virtual Machine Weaknesses-it.srt 17.70KB
108 Virtual Machine Weaknesses-ja.srt 3.10KB
108 Virtual Machine Weaknesses-pt.srt 17.09KB
108 Virtual Machine Weaknesses-tr.srt 15.73KB
109 Convert-VM-to-ISO.txt 50B
109 Virtual Machine Hardening.mp4 36.96MB
109 Virtual Machine Hardening-en.srt 19.78KB
109 Virtual Machine Hardening-es.srt 15.23KB
109 Virtual Machine Hardening-it.srt 15.37KB
109 Virtual Machine Hardening-ja.srt 3.05KB
109 Virtual Machine Hardening-pt.srt 14.95KB
109 Virtual Machine Hardening-tr.srt 14.03KB
110 ARM-Anonymizing-relay-monitor.txt 49B
110 How-to-implement-physical-isolation.txt 72B
110 https-www.whonix.org-.txt 25B
110 If-setting-up-your-own-workstations-MUST-READ.txt 53B
110 Whonix-and-virtualbox.txt 40B
110 Whonix-Check.txt 41B
110 Whonix-Features.txt 38B
110 Whonix OS - Anonymous Operating system.mp4 88.64MB
110 Whonix OS - Anonymous Operating system-en.srt 41.95KB
110 Whonix OS - Anonymous Operating system-es.srt 32.85KB
110 Whonix OS - Anonymous Operating system-it.srt 32.41KB
110 Whonix OS - Anonymous Operating system-ja.srt 9.76KB
110 Whonix OS - Anonymous Operating system-pt.srt 31.85KB
110 Whonix OS - Anonymous Operating system-tr.srt 29.90KB
110 Whonix-Stream-Isolation.txt 46B
110 Whonix-VM-snapshots.txt 57B
111 Whonix OS - Weaknesses.mp4 15.78MB
111 Whonix OS - Weaknesses-en.srt 9.29KB
111 Whonix OS - Weaknesses-es.srt 7.46KB
111 Whonix OS - Weaknesses-it.srt 7.47KB
111 Whonix OS - Weaknesses-ja.srt 1.83KB
111 Whonix OS - Weaknesses-pt.srt 7.29KB
111 Whonix OS - Weaknesses-tr.srt 6.85KB
111 Whonixs-lack-of-an-Amnesic-feature.txt 131B
111 Whonix-Warnings.txt 37B
112 Debian-template-s-.txt 48B
112 Disposable-VMs-DispVMs-.txt 38B
112 Hardware-Compatibility-List-HCL-.txt 31B
112 Librem-13-laptop.txt 46B
112 Qubes-docs.txt 31B
112 Qubes-Download.txt 37B
112 Qubes OS.mp4 78.72MB
112 Qubes OS-en.srt 40.32KB
112 Qubes OS-es.srt 31.42KB
112 Qubes OS-it.srt 31.13KB
112 Qubes OS-ja.srt 8.90KB
112 Qubes OS-pt.srt 30.40KB
112 Qubes OS-tr.srt 28.33KB
112 Split-GPG.txt 41B
112 Video-Tour-of-Qubes.txt 32B
112 Whonix-templates.txt 46B
112 Windows-templates.txt 49B
113 Partitioning-my-digital-life-into-security-domains.txt 86B
113 Security Domains Isolation and Compartmentalization.mp4 14.97MB
113 Security Domains Isolation and Compartmentalization-en.srt 9.92KB
113 Security Domains Isolation and Compartmentalization-es.srt 7.83KB
113 Security Domains Isolation and Compartmentalization-it.srt 7.76KB
113 Security Domains Isolation and Compartmentalization-ja.srt 1.60KB
113 Security Domains Isolation and Compartmentalization-pt.srt 7.68KB
113 Security Domains Isolation and Compartmentalization-tr.srt 7.17KB
114 Congratulations.mp4 5.28MB
114 Congratulations-en.srt 2.07KB
114 Congratulations-es.srt 1.60KB
114 Congratulations-it.srt 1.63KB
114 Congratulations-ja.srt 414B
114 Congratulations-pt.srt 1.60KB
114 Congratulations-tr.srt 1.53KB
114 Link-to-The-Complete-Cyber-Security-Course-Volume-II-Network-security-discount-coupon-studentdiscount25.txt 77B
115 Certificate Of Completion for CPEs.mp4 2.20MB
115 Certificate Of Completion for CPEs-en.srt 1.30KB
115 Certificate Of Completion for CPEs-es.srt 1.38KB
115 Certificate Of Completion for CPEs-it.srt 1.35KB
115 Certificate Of Completion for CPEs-ja.srt 495B
115 Certificate Of Completion for CPEs-pt.srt 1.35KB
115 Certificate Of Completion for CPEs-tr.srt 1.21KB
115 https-www.stationx.net-certificate-request-.txt 47B
116 Sample from Vol 2 - Router Vulnerability Scanning (Shodan Qualys).mp4 48.07MB
116 Sample from Vol 2 - Router Vulnerability Scanning (Shodan Qualys)-en.srt 31.78KB
116 Sample from Vol 2 - Router Vulnerability Scanning (Shodan Qualys)-es.srt 25.11KB
116 Sample from Vol 2 - Router Vulnerability Scanning (Shodan Qualys)-it.srt 24.80KB
116 Sample from Vol 2 - Router Vulnerability Scanning (Shodan Qualys)-ja.srt 6.33KB
116 Sample from Vol 2 - Router Vulnerability Scanning (Shodan Qualys)-pt.srt 24.69KB
116 Sample from Vol 2 - Router Vulnerability Scanning (Shodan Qualys)-tr.srt 22.99KB
117 Sample from Vol 2 - Password cracking part 2.mp4 24.15MB
117 Sample from Vol 2 - Password cracking part 2-en.srt 17.04KB
117 Sample from Vol 2 - Password cracking part 2-es.srt 13.60KB
117 Sample from Vol 2 - Password cracking part 2-it.srt 13.52KB
117 Sample from Vol 2 - Password cracking part 2-ja.srt 3.92KB
117 Sample from Vol 2 - Password cracking part 2-pt.srt 13.46KB
117 Sample from Vol 2 - Password cracking part 2-tr.srt 12.62KB
118 Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4 31.75MB
118 Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3-en.srt 31.56KB
118 Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3-es.srt 24.32KB
118 Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3-it.srt 24.17KB
118 Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3-ja.srt 7.55KB
118 Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3-pt.srt 24.05KB
118 Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3-tr.srt 22.74KB
119 Sample from Vol 4 - Email clients protocols and authentication.mp4 38.18MB
119 Sample from Vol 4 - Email clients protocols and authentication-en.srt 28.72KB
119 Sample from Vol 4 - Email clients protocols and authentication-es.srt 23.28KB
119 Sample from Vol 4 - Email clients protocols and authentication-it.srt 22.60KB
119 Sample from Vol 4 - Email clients protocols and authentication-ja.srt 7.04KB
119 Sample from Vol 4 - Email clients protocols and authentication-pt.srt 22.42KB
119 Sample from Vol 4 - Email clients protocols and authentication-tr.srt 21.18KB
120 BONUS DISCOUNT COUPONS.html 5.80KB
Distribution statistics by country
Thailand (TH) 1
Republic of Korea (KR) 1
Russia (RU) 1
Total 3
IP List List of IP addresses which were distributed this torrent