Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
001 Welcome and Introduction to the Instructor.mp4 |
60.80Мб |
002 Goals and Learning Objectives - Volume 1.mp4 |
70.37Мб |
003 Target Audience.mp4 |
49.67Мб |
004 Study Recommendations.mp4 |
95.83Мб |
005 Course updates.mp4 |
18.85Мб |
006 Goals and Learning Objectives.mp4 |
19.42Мб |
007 Protect What You Value.mp4 |
21.49Мб |
008 What is Privacy Anonymity and Pseudonymity.mp4 |
107.68Мб |
009 Security Vulnerabilities Threats and Adversaries.mp4 |
87.98Мб |
010 Threat Modeling and Risk Assessments.mp4 |
147.69Мб |
011 Security vs Privacy vs Anonymity - Can we have it all.mp4 |
41.19Мб |
012 Defense In Depth.mp4 |
6.90Мб |
013 The Zero Trust Model.mp4 |
76.71Мб |
014 Goals and Learning Objectives.mp4 |
20.74Мб |
015 Why You Need Security The Value Of A Hack.mp4 |
114.64Мб |
016 The Top 3 Things You Need To Stay Safe Online.mp4 |
10.71Мб |
017 Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 |
124.63Мб |
018 Hackers crackers and cyber criminals.mp4 |
61.18Мб |
019 Malware viruses rootkits and RATs.mp4 |
81.27Мб |
020 Spyware Adware Scareware PUPs Browser hijacking.mp4 |
71.88Мб |
021 What is Phishing Vishing and SMShing.mp4 |
54.46Мб |
022 Spamming Doxing.mp4 |
34.26Мб |
023 Social engineering - Scams cons tricks and fraud.mp4 |
93.39Мб |
024 Darknets Dark Markets and Exploit kits.mp4 |
204.21Мб |
025 Governments spies and secret stuff part I.mp4 |
136.32Мб |
026 Governments spies and secret stuff part II.mp4 |
164.01Мб |
027 Regulating encryption mandating insecurity legalizing spying.mp4 |
330.20Мб |
028 Trust Backdoors.mp4 |
166.81Мб |
029 Censorship.mp4 |
41.61Мб |
030 Security News and Alerts Stay Informed.mp4 |
10.00Мб |
031 Goals and Learning Objectives.mp4 |
11.47Мб |
032 Symmetric Encryption.mp4 |
158.67Мб |
033 Asymmetric Encryption.mp4 |
79.30Мб |
034 Hash Functions.mp4 |
123.86Мб |
035 Digital Signatures.mp4 |
49.71Мб |
036 Secure Sockets Layer SSL and Transport layer security TLS.mp4 |
194.74Мб |
037 SSL Stripping.mp4 |
150.07Мб |
038 HTTPS HTTP Secure.mp4 |
132.79Мб |
039 Digital Certificates.mp4 |
118.54Мб |
040 Certificate Authorities and HTTPS.mp4 |
255.14Мб |
041 End-to-End Encryption E2EE.mp4 |
8.49Мб |
042 Steganography.mp4 |
172.74Мб |
043 How Security and Encryption is Really Attacked.mp4 |
24.49Мб |
044 Goals and Learning Objectives.mp4 |
13.13Мб |
045 Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 |
193.28Мб |
046 Vmware.mp4 |
163.53Мб |
047 Virtual box.mp4 |
197.67Мб |
048 Kali Linux 2016.mp4 |
64.75Мб |
049 Goals and Learning Objectives.mp4 |
17.48Мб |
050 Security Features and Functionality.mp4 |
41.08Мб |
051 Security Bugs and Vulnerabilities.mp4 |
63.24Мб |
052 Usage Share.mp4 |
45.39Мб |
053 Windows 10 - Privacy Tracking.mp4 |
108.03Мб |
054 Windows 10 - Disable tracking automatically.mp4 |
98.98Мб |
055 Windows 10 - Tool Disable Windows 10 Tracking.mp4 |
164.70Мб |
056 Windows 10 Cortana.mp4 |
49.00Мб |
057 Windows 10 Privacy Settings.mp4 |
86.86Мб |
058 Windows 10 - WiFi Sense.mp4 |
74.97Мб |
059 Windows 7 8 and 8.1 - Privacy Tracking.mp4 |
134.33Мб |
060 Mac OS X - Privacy Tracking.mp4 |
84.14Мб |
061 Linux and Unix like Operating systems.mp4 |
80.91Мб |
062 Linux - Debian.mp4 |
7.79Мб |
063 Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 |
83.53Мб |
064 Linux - OpenBSD and Archlinux.mp4 |
40.82Мб |
065 Linux - Ubuntu.mp4 |
10.05Мб |
066 Goals and Learning Objectives.mp4 |
11.75Мб |
067 The Importance of Patching.mp4 |
41.73Мб |
068 Windows 7 - Auto Update.mp4 |
26.82Мб |
069 Windows 8 8.1 - Auto Update.mp4 |
12.90Мб |
070 Windows 10 - Auto Update.mp4 |
22.52Мб |
071 Windows - Criticality and Patch Tuesday.mp4 |
78.15Мб |
072 Windows 7 8 8.1 10 - Automate the pain away from patching.mp4 |
130.11Мб |
073 Linux - Debian - Patching.mp4 |
133.82Мб |
074 Mac OS X - Patching.mp4 |
107.99Мб |
075 Firefox - Browser and extension updates.mp4 |
71.41Мб |
076 Chrome - Browser and extension updates.mp4 |
13.79Мб |
077 IE and Edge - Browser and extention updates.mp4 |
14.85Мб |
078 Auto updates - The Impact to privacy and anonymity.mp4 |
15.55Мб |
079 Goals and Learning Objectives Removing Privilege.mp4 |
81.02Мб |
080 Windows 7 - Not using admin.mp4 |
55.46Мб |
081 Windows 8 and 8.1 - Not using admin.mp4 |
53.15Мб |
082 Windows 10 - Not using admin.mp4 |
37.78Мб |
083 Goals and Learning Objectives.mp4 |
12.60Мб |
084 Information Disclosure and Identity Strategies for Social Media.mp4 |
201.38Мб |
085 Identify Verification and Registration.mp4 |
56.12Мб |
086 Behavioural Security Controls Against Social Threats Phishing Spam Part 1.mp4 |
54.58Мб |
087 Behavioural Security Controls Against Social Threats Phishing Spam Part 2.mp4 |
136.30Мб |
088 Technical Security Controls Against Social Threats Phishing Spam Scam Cons.mp4 |
52.38Мб |
089 Goals and Learning Objectives.mp4 |
9.81Мб |
090 Security Domains.mp4 |
95.29Мб |
091 Goals and Learning Objectives.mp4 |
17.87Мб |
092 Introduction to Isolation and Compartmentalization.mp4 |
23.65Мб |
093 Physical and Hardware Isolation - How to change the Mac Address.mp4 |
64.92Мб |
094 Physical and Hardware Isolation - Hardware Serials.mp4 |
138.01Мб |
095 Virtual Isolation.mp4 |
115.02Мб |
096 Dual Boot.mp4 |
27.48Мб |
097 Built-in Sandboxes and Application Isolation.mp4 |
38.24Мб |
098 Windows - Sandboxes and Application Isolation.mp4 |
92.15Мб |
099 Windows - Sandboxes and Application Isolation - Sandboxie.mp4 |
173.85Мб |
100 Linux - Sandboxes and Application Isolation.mp4 |
37.80Мб |
101 Mac OS X - Sandboxes and Application Isolation.mp4 |
58.60Мб |
102 Virtual Machines.mp4 |
157.22Мб |
103 Virtual Machine Weaknesses.mp4 |
106.61Мб |
104 Virtual Machine Hardening.mp4 |
107.36Мб |
105 Whonix OS - Anonymous Operating system.mp4 |
285.20Мб |
106 Whonix OS - Weaknesses.mp4 |
78.03Мб |
107 Qubes OS.mp4 |
263.29Мб |
108 Security Domains Isolation and Compartmentalization.mp4 |
55.60Мб |
109 BONUS - Important Information.mp4 |
20.16Мб |
110 Congratulations.mp4 |
26.81Мб |
111 BONUS Lecture from Volume 2 - Router Vulnerability Scanning Shodan Qualys.mp4 |
204.00Мб |
112 BONUS Lecture from Volume 2 - Password cracking part 2.mp4 |
143.04Мб |
113 BONUS Lecture from Volume 3 - Bypassing firewalls and HTTP proxies part 3.mp4 |
122.21Мб |
114 BONUS Lecture from Volume 4 - Email clients protocols and authentication.mp4 |
181.09Мб |
115 BONUS DISCOUNT COUPONS.html |
5.38Кб |
The-Cyber-Security-Landscape-Diagram.jpg |
777.15Кб |