Общая информация
Название [Udemy] The Complete Cyber Security Course : End Point Protection! [2017, ENG] (4 - Endpoint Protection)
Тип Other
Размер 2.83Гб
Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
001 Welcome to Volume 4.mp4 7.19Мб
002 Introduction to the Instructor.mp4 17.13Мб
003 Security Quick Win.mp4 44.61Мб
004 Target Audience.mp4 7.32Мб
005 Study Recommendations.mp4 20.81Мб
006 Course updates.mp4 2.56Мб
007 What is End Point Protection and why is it important.mp4 34.31Мб
008 Goals and Learning Objectives - Volume 4.mp4 25.39Мб
009 Goals and Learning Objectives.mp4 7.19Мб
010 Disk Encryption What is it good for.mp4 21.72Мб
011 Disk Encryption Attacks - Cryptoalgorithms Brute Force Attacks Implementation.mp4 16.78Мб
012 Disk Encryption Attacks - Physical.mp4 38.31Мб
013 Disk Encryption Attacks - Containers Volumes and Partitions.mp4 7.18Мб
014 Windows - Disk Encryption - An Introduction.mp4 7.51Мб
015 Windows - Disk Encryption - Bitlocker.mp4 30.20Мб
016 Windows - Setting Up BitLocker.mp4 23.63Мб
017 Windows - Disk Encryption - VeraCrypt.mp4 25.05Мб
018 Windows - Disk Encryption - CipherShed Diskcryptor Symantec and Bestcrypt.mp4 6.75Мб
019 Windows Mac Linux - Setting up VeraCrypt.mp4 29.80Мб
020 Mac - Filevault2.mp4 13.16Мб
021 Mac - Setting up Filevault2.mp4 19.72Мб
022 Linux Whole Disk Encryption - Dm-crypt and LUKS.mp4 13.75Мб
023 Linux - Setting up DMCryptLUKS.mp4 13.19Мб
024 Linux - Encrypting the boot partition with Grub2.mp4 11.71Мб
025 Self Encrypting Drives SEDs.mp4 3.16Мб
026 Defense Against Disk Decryption Attacks.mp4 20.86Мб
027 File Encryption.mp4 11.11Мб
028 Mandatory Key Disclosure Plausible Deniability.mp4 20.53Мб
029 Nesting Crypto Systems Obfuscation.mp4 8.88Мб
030 Case Studies in Disk Decryption.mp4 5.87Мб
031 Goals and Learning Objectives.mp4 5.61Мб
032 Is Anti-Virus dead - The Threat Landscape.mp4 11.33Мб
033 Is Anti-Virus dead - Protection Methods.mp4 36.60Мб
034 Ransomware.mp4 8.49Мб
035 Anti-Virus and End-Point-Protection Testing.mp4 12.89Мб
036 The Problem With AV and EPP Testing.mp4 6.65Мб
037 The Best of Business End-Point-Protection EPP.mp4 9.40Мб
038 Windows - The Best of Anti-Virus and End-Point-Protection.mp4 10.28Мб
039 Business End Point Protection EPP.mp4 5.14Мб
040 Mac - XProtect.mp4 13.50Мб
041 Mac - The Best of Anti-Virus and End-Point-Protection.mp4 6.52Мб
042 Linux - The Best of Anti-Virus and End-Point-Protection.mp4 6.17Мб
043 Online and Second Opinion - Anti-Virus and End-Point-Protection.mp4 9.96Мб
044 Is Anti-Virus and End-Point-Protection Dangerous.mp4 13.32Мб
045 Goals and Learning Objectives.mp4 5.08Мб
046 Next Generation - Anti-Virus NG-AV End-Point-Protection NG-EPP.mp4 10.64Мб
047 End Point Detection and Response EDR.mp4 13.80Мб
048 End-Point-Protection How it works together in layers.mp4 12.86Мб
049 Goals and Learning Objectives.mp4 5.78Мб
050 What is application and execution control.mp4 20.95Мб
051 Windows - Application control - ACLs Windows Permission Identifier Accessenum.mp4 16.27Мб
052 Windows - Application control - User Account Control UAC.mp4 15.36Мб
053 Windows - Application control - Software Restriction Policies.mp4 11.29Мб
054 Windows - Application control - AppLocker.mp4 32.15Мб
055 Windows - Application Control - Parental controls.mp4 4.87Мб
056 Windows - Third Party App Control AV Appguard VoodooShield NoVirusThanks.mp4 12.91Мб
057 Windows - Exploitation Prevention - EMET.mp4 37.37Мб
058 Windows - Exploitation Prevention - Traps MBEA and HMPA.mp4 11.24Мб
059 Windows 10 - Device Guard.mp4 27.84Мб
060 Windows - Defender Application Guard for Microsoft Edge.mp4 9.07Мб
061 Linux - Access Control Models.mp4 13.35Мб
062 Linux - Security frameworks - AppArmor.mp4 4.39Мб
063 Linux - Security frameworks - SElinux.mp4 6.67Мб
064 Linux - Security frameworks - Grsecurity.mp4 12.78Мб
065 Linux - Security frameworks - PaX and more.mp4 3.85Мб
066 Linux Mac - File permissions POSIX and ACLs.mp4 19.03Мб
067 Mac - Application control - Parental controls.mp4 8.00Мб
068 Mac - Application control - Gatekeeper.mp4 10.20Мб
069 Mac - Application control - System Integrity Protection.mp4 12.02Мб
070 Mac - Application control - Santa.mp4 7.04Мб
071 Mac - Application control - Little Flocker.mp4 18.82Мб
072 Mac - Other Stuff.mp4 3.69Мб
073 The New Normal For End-Point-Protection Technology.mp4 22.41Мб
074 Cylance.mp4 9.54Мб
075 Goals and Learning Objectives.mp4 7.15Мб
076 A Complete Failure to Detect Threats.mp4 11.44Мб
077 Rethinking Honeypots.mp4 8.89Мб
078 CanaryTokens.mp4 70.27Мб
079 OpenCanary.mp4 38.79Мб
080 CanaryPi.html 568б
081 Artillery - Binary Defense.mp4 11.10Мб
082 Honey Drive.mp4 2.52Мб
083 Intrusion Detection Systems IDS Part 1 - Methods.mp4 13.24Мб
084 Intrusion Detection Systems IDS Part 2 - Snort Suricata Bro IDS OpenWIPS-n.mp4 9.23Мб
085 Host-Based Intrusion Detection - OSSEC.mp4 17.68Мб
086 Network Analysis - Sguil Xplico NetworkMiner.mp4 8.85Мб
087 File Integrity Monitoring FIM and Checking Part 1.mp4 7.74Мб
088 File Integrity Monitoring FIM and Checking Part 2 - Tripwire and El Jefe.mp4 6.25Мб
089 Network Security Toolkit NST.mp4 4.80Мб
090 Security Onion.mp4 5.78Мб
091 Security Information and Event Management Software SIEM.mp4 6.15Мб
092 Goals and Learning Objectives.mp4 7.20Мб
093 Introduction to Malware and Hacker Hunting.mp4 16.34Мб
094 Windows - Farbar Recovery Scanner.mp4 38.05Мб
095 Automated Malware Removal Tools.mp4 39.97Мб
096 Live Rescue Operating Systems CDs and USBs.mp4 18.32Мб
097 Windows - Malware Seek Destroy - Process Explorer - Part 1.mp4 57.77Мб
098 Windows - Malware Seek Destroy - Process Explorer - Part 2.mp4 46.71Мб
099 Windows - Malware Seek Destroy - Process Tools.mp4 8.78Мб
100 Windows - Malware Seek Destroy - Sigcheck.mp4 4.55Мб
101 Windows - Malware Seek Destroy - Autoruns.mp4 48.30Мб
102 Windows - Malware Seek Destroy - Process Monitor.mp4 76.21Мб
103 Windows - Malware Seek Destroy - Network Connections.mp4 23.96Мб
104 Malware Seek Destroy - Networkx.mp4 5.41Мб
105 Linux - Malware Seek Destroy - Sysdig.mp4 29.64Мб
106 Linux - Seek Destroy Malware and Hackers - Csysdig.mp4 43.65Мб
107 Linux - Seek Destroy Malware and Hackers - debsums unhide.mp4 4.70Мб
108 Linux Mac OS X - Malware Seek Destroy - netstat.mp4 15.28Мб
109 Linux Mac OS X - Malware Seek Destroy - lsof.mp4 22.22Мб
110 Linux - Malware Seek Destroy - rkhunter.mp4 17.22Мб
111 Linux - Malware Seek Destroy - Linux - Chkrootkit Tiger Clamav LMD.mp4 6.18Мб
112 Linux - Malware Seek Destroy - Linux - Persistence Part 1.mp4 9.21Мб
113 Linux - Malware Seek Destroy - Linux - Persistence Part 2.mp4 27.60Мб
114 Linux - Malware Seek Destroy - Linux - Persistence Part 3.mp4 5.22Мб
115 Mac - Malware Seek Destroy - Task Explorer.mp4 15.02Мб
116 Mac - Malware Seek Destroy KnockKnock BlockBlock KextViewer.mp4 20.46Мб
117 Mac Linux Windows - OSquery.mp4 42.29Мб
118 Firmware Rootkits Seek and Destroy Part 1.mp4 15.86Мб
119 Firmware Rootkits Seek and Destroy Part 2.mp4 8.88Мб
120 End-Point-Protection Recovery and Remediation Technology.mp4 10.49Мб
121 Encrypted Backup and Cloud Storage.mp4 14.13Мб
122 Goals and Learning Objectives.mp4 7.18Мб
123 An Introduction to Hardening.mp4 8.90Мб
124 Hardening Standards.mp4 41.52Мб
125 OpenSCAP.mp4 31.25Мб
126 Baseline Auditing.mp4 12.42Мб
127 Windows - Hardening.mp4 9.30Мб
128 Windows - Security Compliance Manager SCM.mp4 44.87Мб
129 Mac Hardening.mp4 3.51Мб
130 Linux Hardening.mp4 9.03Мб
131 Security Focused Operating Systems.mp4 9.84Мб
132 Monitoring for Security Drift.mp4 2.54Мб
133 Goals and Learning Objectives.mp4 6.49Мб
134 Secure File Deletion - Mechanical drives.mp4 19.68Мб
135 Secure File Deletion - Solid Sate Drives.mp4 12.09Мб
136 Evidence Elimination Anti-Forensics - An Introduction.mp4 8.27Мб
137 Evidence Elimination - CCleaner and Bleachit.mp4 18.26Мб
138 Evidence Elimination - Virtual Memory Swap RAM Memory Cache and Buffer.mp4 14.18Мб
139 Disk Wiping - Mechanical Drives.mp4 11.43Мб
140 Disk Wiping - Solid State Drives SSD.mp4 23.12Мб
141 Scrubbing EXIF Metadata Part 1 - Introduction.mp4 16.23Мб
142 Scrubbing EXIF Metadata Part 2 - Tools.mp4 20.44Мб
143 Scrubbing EXIF Metadata Part 3 - Guidance.mp4 8.41Мб
144 Sensor Noise Camera Identification.mp4 9.01Мб
145 Goals and Learning Objectives.mp4 9.50Мб
146 Clients Protocols and Authentication.mp4 38.18Мб
147 Email Weaknesses.mp4 30.77Мб
148 PGP GPG Privacy.mp4 12.98Мб
149 PGP GPG Clients.mp4 15.03Мб
150 Windows - PGP GPG.mp4 58.30Мб
151 Tail - PGP GPG.mp4 9.66Мб
152 PGP GPG Weaknesses.mp4 14.71Мб
153 Improving OpenPGP Security - Best Practices - Part 1.mp4 5.57Мб
154 Improving OpenPGP Security - Primary and Subkeys - Part 2.mp4 28.70Мб
155 Improving OpenPGP Security - SmartcardsYubikey - Part 3.mp4 22.14Мб
156 Email Tracking Exploits.mp4 26.77Мб
157 Email Anonymity Pseudonymity.mp4 15.89Мб
158 TorBirdy.mp4 21.52Мб
159 Remailers.mp4 19.53Мб
160 Choosing an Email Provider.mp4 37.37Мб
161 Email Alternatives.mp4 7.41Мб
162 Goals and Learning Objectives.mp4 2.81Мб
163 An Introduction to Instant Messengers.mp4 25.19Мб
164 Instant Messenger - Signal.mp4 5.88Мб
165 Instant Messengers - Chatsecure.mp4 4.00Мб
166 Instant Messengers - Cryptocat.mp4 1.46Мб
167 Instant Messengers - Ricochet.mp4 1.47Мб
168 Instant Messengers - Other.mp4 1.54Мб
169 Video and Voice Messengers - Linphone.mp4 11.50Мб
170 Video and Voice Messengers - Jitsi.mp4 3.73Мб
171 Video and Voice Messengers - Other.mp4 2.63Мб
172 Congratulations.mp4 4.30Мб
173 BONUS - Important Information.mp4 6.53Мб
174 Certificate Of Completion for CPEs.html 1.61Кб
175 BONUS Sample Lecture from Volume 1 - Qubes OS.mp4 56.31Мб
176 BONUS Sample Lecture from Volume 2 - Effective Network Isolation.mp4 28.04Мб
177 BONUS Sample Lecture from Volume 3 - Socks5 proxy tunneling.mp4 22.99Мб
178 BONUS DISCOUNT COUPONS.html 6.61Кб
links.txt 127б
links.txt 8.86Кб
links.txt 4.44Кб
links.txt 116б
links.txt 9.68Кб
links.txt 2.24Кб
links.txt 7.93Кб
links.txt 5.50Кб
links.txt 7.45Кб
links.txt 7.85Кб
links.txt 1.29Кб
links.txt 267б
readme.txt 914б
Информация о видеофайле
Видеоформат AVC
Разрешение 1280x 720
Кадров в секунду 30
Язык аудиодорожек
Язык субтитров
Статистика распространения по странам
Россия (RU) 3
Южная Корея (KR) 1
Алжир (DZ) 1
Всего 5
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент