Общая информация
Название The Complete Cyber Security Course Hackers Exposed!
Тип
Размер 4.30Гб
Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[TGx]Downloaded from torrentgalaxy.to .txt 585б
0 951.65Кб
1 152.06Кб
1.1 Link to The Complete Cyber Security Course - Volume II - Network security + discount coupon studentdiscount25.html 136б
1.1 Nathan's Twitter #GotoNathan.html 91б
1.2 LinkedIn - Join my network..html 101б
1.3 Nathan's Cyber Security Blog.html 99б
1. BONUS - How to Start a Career in Cyber Security.html 1.21Кб
1. Congratulations.mp4 5.29Мб
1. Congratulations.srt 1.56Кб
1. Goals and Learning Objectives.mp4 2.89Мб
1. Goals and Learning Objectives.mp4 2.43Мб
1. Goals and Learning Objectives.mp4 2.29Мб
1. Goals and Learning Objectives.mp4 1.84Мб
1. Goals and Learning Objectives.mp4 1.73Мб
1. Goals and Learning Objectives.mp4 1.66Мб
1. Goals and Learning Objectives.mp4 1.63Мб
1. Goals and Learning Objectives.mp4 1.43Мб
1. Goals and Learning Objectives.srt 1.20Кб
1. Goals and Learning Objectives.srt 637б
1. Goals and Learning Objectives.srt 764б
1. Goals and Learning Objectives.srt 937б
1. Goals and Learning Objectives.srt 823б
1. Goals and Learning Objectives.srt 691б
1. Goals and Learning Objectives.srt 640б
1. Goals and Learning Objectives.srt 501б
1. Goals and Learning Objectives - Removing Privilege.mp4 13.59Мб
1. Goals and Learning Objectives - Removing Privilege.srt 4.15Кб
1. Theory and Practical.mp4 2.24Мб
1. Theory and Practical.srt 1.51Кб
1. Welcome and Introduction to the Instructor!.mp4 19.90Мб
1. Welcome and Introduction to the Instructor!.srt 2.11Кб
10 369.40Кб
10.1 Apparmor.html 105б
10.1 httpsblogs.windows.comwindowsexperience20160510announcing-windows-10-insider-preview-build-14342#31Zq2yELkheC9HyV.99.html 186б
10.1 SSL Sniff.html 107б
10.1 Top 10 scams.html 127б
10.2 Cert Fingerprints.html 97б
10.2 httpwww.actionfraud.police.uktypes_of_fraud.html 108б
10.2 Trusted BSD.html 87б
10.3 Certificate patrol.html 127б
10.3 httpwww.consumerfraudreporting.org.html 98б
10.3 Linux Sandbox.html 96б
10.4 CA Ecosystem.html 105б
10.4 Firejail.html 92б
10.5 CA example mistake.html 180б
10.5 Script Sandfox.html 118б
10. Certificate Authorities and HTTPS.mp4 199.30Мб
10. Certificate Authorities and HTTPS.srt 18.71Кб
10. Defense In Depth.mp4 2.99Мб
10. Defense In Depth.srt 1.79Кб
10. Firefox - Browser and extension updates.mp4 34.01Мб
10. Firefox - Browser and extension updates.srt 6.56Кб
10. Linux - Sandboxes and Application Isolation.mp4 13.85Мб
10. Linux - Sandboxes and Application Isolation.srt 3.89Кб
10. Social engineering - Scams, cons, tricks and fraud.mp4 11.92Мб
10. Social engineering - Scams, cons, tricks and fraud.srt 6.71Кб
10. Windows 10 - WiFi Sense.mp4 59.76Мб
10. Windows 10 - WiFi Sense.srt 5.48Кб
100 348.06Кб
101 379.54Кб
102 575.62Кб
103 727.29Кб
104 47.34Кб
105 74.94Кб
106 212.78Кб
107 721.03Кб
108 442.36Кб
109 12.34Кб
11 557.22Кб
11.10 httpstorrentfreak.compirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011.html 146б
11.1 httpsthehackernews.com201802cryptojacking-malware.html.html 121б
11.1 httpwww.zdnet.comarticlehow-to-block-windows-10-upgrades-on-your-business-network-and-at-home-too.html 164б
11.1 OSX-Sandbox--Seatbelt--Profiles.html 119б
11.2 Firefox profile.html 132б
11.2 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html 136б
11.2 Never 10 by Steve Gibson (Use this!).html 92б
11.3 Apple Sandbox Guide.html 139б
11.3 GWX Control Panel.html 100б
11.3 httpswww.engadget.com20180213attackers-telegram-deliver-cryptocurrency-mining-malware.html 154б
11.4 Buckle Up.html 97б
11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html 116б
11.4 Microsoft - How to manage Windows 10 notification and upgrade options.html 107б
11.5 httpscoinhive.com.html 82б
11.5 SuperDuper.html 127б
11.6 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html 122б
11.6 Mac OS X - App Sandbox.html 193б
11.7 How to run your Applications in a Mac OS X sandbox to enhance security.html 176б
11.7 httpsgithub.comhoshsadiqadblock-nocoin-list.html 110б
11.8 httpsarstechnica.cominformation-technology201801now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners.html 184б
11.8 Sandbox Man page.html 165б
11.9 Cryptocurrency Mining Malware Infected Over Half-Million PCs Using an NSA Exploit.html 129б
11. Chrome - Browser and extension updates.mp4 3.57Мб
11. Chrome - Browser and extension updates.srt 1.93Кб
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 16.19Мб
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.srt 10.83Кб
11. End-to-End Encryption (E2EE).mp4 8.19Мб
11. End-to-End Encryption (E2EE).srt 2.22Кб
11. Mac - Sandboxes and Application Isolation.mp4 23.79Мб
11. Mac - Sandboxes and Application Isolation.srt 8.25Кб
11. The Zero Trust Model.mp4 10.28Мб
11. The Zero Trust Model.srt 4.86Кб
11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4 105.52Мб
11. Windows 7, 8 and 8.1 - Privacy & Tracking.srt 8.74Кб
110 111.47Кб
111 305.22Кб
112 396.95Кб
113 514.75Кб
114 586.66Кб
115 725.55Кб
116 780.21Кб
117 820.19Кб
118 162.29Кб
119 278.90Кб
12 109.04Кб
12.1 Fix Mac OS X.html 84б
12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html 121б
12.1 httpwww.spammimic.com.html 85б
12.1 Wikipedia - Hypervisor.html 101б
12.2 httpsgithub.comfix-macosxnet-monitor.html 102б
12.2 OpenPuff Manual.html 107б
12.2 OpenVZ.html 90б
12.3 OpenPuff.html 116б
12.3 Turnkey Linux - Openvpn.html 97б
12.3 Washingtonpost - How apples os x yosemite tracks-you.html 213б
12.4 httpsgithub.comfix-macosxyosemite-phone-home.html 110б
12.4 List of Steg Tools.html 105б
12.4 Virt Manager.html 86б
12.5 httpsgithub.comkarek314macOS-home-call-drop.html 109б
12.5 KVM Debian Jessie.html 98б
12.6 Wikipedia - Kernel-based Virtual Machine.html 119б
12.7 Wikipedia - Comparison of platform virtualization software.html 137б
12. Darknets, Dark Markets and Exploit kits.mp4 32.43Мб
12. Darknets, Dark Markets and Exploit kits.srt 9.36Кб
12. IE and Edge - Browser and extention updates.mp4 5.63Мб
12. IE and Edge - Browser and extention updates.srt 1.11Кб
12. Mac - Privacy & Tracking.mp4 57.97Мб
12. Mac - Privacy & Tracking.srt 5.80Кб
12. Steganography.mp4 104.30Мб
12. Steganography.srt 9.75Кб
12. Virtual Machines.mp4 44.43Мб
12. Virtual Machines.srt 19.02Кб
120 346.09Кб
121 374.19Кб
13 195.61Кб
13.1 httpsen.wikipedia.orgwikiTiming_channel.html 105б
13.1 httpswww.openbsd.org.html 85б
13.1 Security Pitfalls.html 135б
13.2 httpswww.debian.org.html 84б
13.2 Venom.html 90б
13.3 Example VMware security bug.html 123б
13.3 httpdistrowatch.com.html 84б
13.4 httpsen.wikipedia.orgwikiX86_virtualization.html 109б
13.4 httpswww.archlinux.org.html 87б
13.5 A look at malware with VM detection.html 161б
13.6 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html 110б
13.7 Exploiting dram rowhammer (Could be used on VMs in the future).html 152б
13.8 httpsen.wikipedia.orgwikiCovert_channel.html 105б
13. Auto updates - The Impact to privacy and anonymity.mp4 4.30Мб
13. Auto updates - The Impact to privacy and anonymity.srt 2.94Кб
13. Governments, spies and secret stuff part I.mp4 27.02Мб
13. Governments, spies and secret stuff part I.srt 6.64Кб
13. How Security and Encryption is Really Attacked.mp4 17.36Мб
13. How Security and Encryption is Really Attacked.srt 3.50Кб
13. Linux and Unix “like” Operating systems.mp4 46.23Мб
13. Linux and Unix “like” Operating systems.srt 4.27Кб
13. Virtual Machine Weaknesses.mp4 22.73Мб
13. Virtual Machine Weaknesses.srt 16.37Кб
14 35.34Кб
14.1 Convert VM to ISO.html 109б
14.1 httpstheintercept.com.html 86б
14.1 Manjaro - httpsmanjaro.org.html 81б
14.2 httpwww.nsaplayset.org.html 87б
14.2 Linux Mint - httpslinuxmint.com.html 83б
14.3 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html 104б
14.3 Ubuntu - httpswww.ubuntu.com.html 84б
14.4 httpswikileaks.org-Leaks-.html.html 95б
14.5 httpsnsa.gov1.infodninsa-ant-catalog.html 103б
14.6 httpscryptome.org201401nsa-codenames.htm.html 107б
14. General Use Operating Systems (Windows, MacOS and Linux).mp4 46.90Мб
14. General Use Operating Systems (Windows, MacOS and Linux).srt 5.67Кб
14. Governments, spies and secret stuff part II.mp4 30.24Мб
14. Governments, spies and secret stuff part II.srt 12.15Кб
14. Virtual Machine Hardening.mp4 36.96Мб
14. Virtual Machine Hardening.srt 14.41Кб
15 102.19Кб
15.10 httpswww.csoonline.comarticle3213033securitynsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.html 193б
15.11 Matt Blaze Speaking to a US congressional committee.html 107б
15.12 A Worldwide Survey of E ncryption Products - xls.html 154б
15.13 Kazakhstans new encryption law.html 185б
15.1 A Worldwide Survey of Encryption Products - pdf.html 153б
15.1 httpswww.whonix.org.html 84б
15.1 OpenBSD - httpswww.openbsd.org.html 85б
15.2 Debian - httpswww.debian.org.html 84б
15.2 NSA Admits It Collects Too MUCH Info to Stop Terror Attacks.html 204б
15.2 Whonix Stream Isolation.html 105б
15.3 Archlinux - httpswww.archlinux.org.html 87б
15.3 How to implement physical isolation.html 131б
15.3 The Case against Regulating Encryption Technology.html 112б
15.4 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html 137б
15.4 Whonix and virtualbox.html 99б
15.5 Clipper chip.html 192б
15.5 Whonix Features.html 97б
15.6 MATT BLAZE - DECIPHERING THE DEBATE OVER ENCRYPTION.html 160б
15.6 Whonix VM snapshots.html 116б
15.7 ARM - Anonymizing relay monitor.html 108б
15.7 WhatsApp was Banned for 48 Hours in Brazil.html 112б
15.8 If setting up your own workstations - MUST READ.html 112б
15.8 UK data communications bill.html 121б
15.9 Report - Keys Under Doormats Mandating insecurity by requiring government access to all data and communication.html 150б
15.9 Whonix Check.html 100б
15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).mp4 39.40Мб
15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).srt 6.87Кб
15. Regulating encryption, mandating insecurity & legalizing spying.mp4 42.73Мб
15. Regulating encryption, mandating insecurity & legalizing spying.srt 17.91Кб
15. Whonix OS - Anonymous Operating system.mp4 88.64Мб
15. Whonix OS - Anonymous Operating system.srt 30.56Кб
16 58.35Кб
16.1 Qubes OS - httpswww.qubes-os.org.html 86б
16.1 Video on how to build your own software reproducibly.html 142б
16.1 Whonix's lack of an Amnesic feature.html 190б
16.2 Apple removes malware infected apps from the app store.html 165б
16.2 Astra Linux - httpastralinux.ru.html 82б
16.2 Whonix - Warnings.html 96б
16.3 httpsreproducible-builds.org.html 93б
16.3 Trisquel OS - httpstrisquel.info.html 83б
16.4 Apple backdoor order.html 112б
16.4 PureOS - httpswww.pureos.net.html 84б
16.5 httpsblog.torproject.orgblogdeterministic-builds-part-one-cyberwar-and-global-compromise.html 154б
16.5 Subgraph OS - httpssubgraph.comsgos.html 87б
16.6 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html 133б
16.6 Security-Enhanced Linux (SELinux) - httpsgithub.comSELinuxProject.html 94б
16.7 Examples of backdoors.html 123б
16.7 Hardened Gentoo Linux - httpswiki.gentoo.orgwikiProjectHardened.html 106б
16.8 Formal methods.html 105б
16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).mp4 32.31Мб
16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).srt 3.93Кб
16. Trust & Backdoors.mp4 24.48Мб
16. Trust & Backdoors.srt 12.51Кб
16. Whonix OS - Weaknesses.mp4 15.78Мб
16. Whonix OS - Weaknesses.srt 6.79Кб
17 286.67Кб
17.10 Debian template(s).html 107б
17.1 httpsearchenginewatch.comsewnews2351154google-censorship-ruling-in-canada-has-worldwide-implications.html 168б
17.1 Qubes Download.html 96б
17.1 Qubes OS - httpswww.qubes-os.org.html 86б
17.2 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html 129б
17.2 Qubes docs.html 90б
17.2 Whonix - httpswww.whonix.org.html 84б
17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html 132б
17.3 Librem 13 laptop.html 105б
17.3 Tails OS - httpstails.boum.org.html 84б
17.4 Split GPG.html 100б
17.5 Video Tour of Qubes.html 91б
17.6 Disposable VMs (DispVMs).html 97б
17.7 Windows templates.html 108б
17.8 Hardware Compatibility List (HCL).html 90б
17.9 Whonix templates.html 105б
17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4 21.54Мб
17. Anonymity Focused Operating Systems (Tails and Whonix OS).srt 3.95Кб
17. Censorship.mp4 6.48Мб
17. Censorship.srt 3.07Кб
17. Qubes OS.mp4 78.72Мб
17. Qubes OS.srt 29.09Кб
18 702.22Кб
18.1 BackBox Linux - httpsbackbox.org.html 81б
18.1 httpwww.stationx.netalerts.html 91б
18.1 Partitioning my digital life into security domains.html 145б
18.2 Parrot GNULinux - httpswww.parrotsec.org.html 87б
18.3 Kali Linux - httpswww.kali.org.html 82б
18.4 Pentoo - httpswww.pentoo.ch.html 83б
18.5 BlackArch Linux - httpsblackarch.org.html 83б
18. Cyber Threat Intelligence – Stay Informed.mp4 2.61Мб
18. Cyber Threat Intelligence – Stay Informed.srt 1.19Кб
18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4 13.37Мб
18. Penetration Testing and Ethical Hacking Focused Operating Systems.srt 1.31Кб
18. Security Domains, Isolation and Compartmentalization.mp4 14.97Мб
18. Security Domains, Isolation and Compartmentalization.srt 7.14Кб
19 915.11Кб
19.1 LineageOS - httpslineageos.org.html 83б
19.2 MicroG - httpsmicrog.org.html 80б
19.3 PureOS Librem 5 - httpspuri.smshoplibrem-5.html 91б
19.4 iOS - httpsdeveloper.apple.comios.html 93б
19.5 Replicant - Httpswww.replicant.us.html 86б
19.6 Android - httpswww.android.com.html 85б
19.7 OmniROM - httpswww.omnirom.org.html 85б
19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).mp4 46.71Мб
19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).srt 3.39Кб
2 866.52Кб
2.10 httpsen.wikipedia.orgwikiHypervisor.html 101б
2.11 httpsen.wikipedia.orgwikiComparison_of_platform_virtualization_software.html 137б
2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html 137б
2.1 httpsdiasporafoundation.org.html 92б
2.1 httpswww.stationx.netcanarytokens.html 99б
2.1 httpswww.stationx.netcertificate-request.html 106б
2.1 Windows VMs here.html 124б
2.2 httpfriendica.com.html 82б
2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html 132б
2.2 Vmware Network Adapter Settings.html 191б
2.3 httpstosdr.org.html 79б
2.3 Virtualbox Network Adapter Settings.html 104б
2.4 httpvirtualboxes.orgimages.html 92б
2.4 The complete guide to facebook privacy settings.html 136б
2.5 httpwww.osboxes.orgguide#!.html 92б
2.5 List of Personally Identifiable Information (PII).html 134б
2.6 httpvirtual-machine.org.html 88б
2.6 Twitter Privacy Settings.html 120б
2.7 httpswww.eff.orgwho-has-your-back-government-data-requests-2015.html 128б
2.7 httpwww.osboxes.orgvirtualbox-images.html 102б
2.8 httpwww.osboxes.orgvmware-images.html 98б
2.8 httpwww.telegraph.co.uktechnologysocial-media9780565Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html.html 188б
2.9 httpsgnu.iosocialtry.html 87б
2.9 httpsmarketplace.vmware.com.html 92б
2. Certificate Of Completion for CPEs.mp4 2.20Мб
2. Certificate Of Completion for CPEs.srt 1.25Кб
2. Goals and Learning Objectives.mp4 2.70Мб
2. Goals and Learning Objectives.srt 973б
2. Information Disclosure and Identity Strategies for Social Media.mp4 83.81Мб
2. Information Disclosure and Identity Strategies for Social Media.srt 25.19Кб
2. Introduction to Isolation and Compartmentalization.mp4 5.66Мб
2. Introduction to Isolation and Compartmentalization.srt 3.30Кб
2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 113.35Мб
2. Introduction to Setting up a Testing Environment Using Virtual Machines.srt 12.21Кб
2. Security Domains.mp4 21.84Мб
2. Security Domains.srt 16.63Кб
2. Security Features and Functionality.mp4 57.89Мб
2. Security Features and Functionality.srt 7.80Кб
2. Security Quick Win!.mp4 43.19Мб
2. Security Quick Win!.srt 17.56Кб
2. Symmetric Encryption.mp4 32.30Мб
2. Symmetric Encryption.srt 11.30Кб
2. The Importance of Patching.mp4 11.66Мб
2. The Importance of Patching.srt 6.41Кб
2. Why You Need Security – The Value Of A Hack.mp4 28.93Мб
2. Why You Need Security – The Value Of A Hack.srt 6.68Кб
2. Windows 7 - Not using admin.mp4 10.99Мб
2. Windows 7 - Not using admin.srt 5.46Кб
20 117.76Кб
20.1 Download Debian.html 92б
20.2 Debian Live CDDVD.html 92б
20.3 Free Debian Books and Guides.html 93б
20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 57.78Мб
20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.srt 6.67Кб
21 248.58Кб
22 374.14Кб
23 33.39Кб
24 113.29Кб
25 221.84Кб
26 707.81Кб
27 432.43Кб
28 775.16Кб
29 712.08Кб
3 489.77Кб
3.10 httpgetairmail.com.html 83б
3.11 Example SMS recieve online site.html 96б
3.12 httpwww.migmail.net.html 84б
3.13 httpcrapmail.dken.html 83б
3.14 Top 10 sites receive sms online without phone.html 135б
3.15 httpdontmail.net.html 81б
3.16 httpswww.trash-mail.comen.html 91б
3.17 http10minutemail.com10MinuteMailindex.html.html 108б
3.1 Diagram of Mac.html 131б
3.1 httpsmailinator.com.html 84б
3.1 httpsresearch.google.compubspub43963.html.html 107б
3.1 httpwww.vmware.comproductsworkstationcompare.html.html 116б
3.1 Top 50 products vs security bugs.html 114б
3.2 httpwww.mytrashmail.com.html 88б
3.2 httpwww.vmware.comproductsplayerfaqsfaqs.html.html 113б
3.2 Linux - How to use macchanger.html 132б
3.2 Report - Buying Into the Bias Why Vulnerability Statistics Suck.html 168б
3.3 httpwww.dispostable.com.html 88б
3.3 Windows - Tmac.html 89б
3.4 httpbugmenot.com.html 81б
3.4 Mac OS X - How to change the mac address.html 141б
3.5 httpfreemail.ms.html 80б
3.5 Mac OS X - Wifispoof.html 83б
3.6 httpswww.guerrillamail.com.html 92б
3.6 Mac OS X - Macdaddyx.html 109б
3.7 httpwww.tempinbox.com.html 85б
3.8 httpwww.mailexpire.com.html 87б
3.9 httpsanonbox.net.html 81б
3. Asymmetric Encryption.mp4 72.31Мб
3. Asymmetric Encryption.srt 12.99Кб
3. Goals and Learning Objectives - Volume 1.mp4 16.10Мб
3. Goals and Learning Objectives - Volume 1.srt 2.88Кб
3. Identify Verification and Registration.mp4 23.39Мб
3. Identify Verification and Registration.srt 9.36Кб
3. Physical and Hardware Isolation - How to change the Mac Address.mp4 25.57Мб
3. Physical and Hardware Isolation - How to change the Mac Address.srt 10.90Кб
3. Protect What You Value.mp4 8.94Мб
3. Protect What You Value.srt 5.35Кб
3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4 48.07Мб
3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).srt 24.00Кб
3. Security Bugs and Vulnerabilities.mp4 83.89Мб
3. Security Bugs and Vulnerabilities.srt 6.99Кб
3. The Top 3 Things You Need To Stay Safe Online.mp4 2.50Мб
3. The Top 3 Things You Need To Stay Safe Online.srt 1.62Кб
3. Vmware.mp4 110.48Мб
3. Vmware.srt 12.13Кб
3. Windows 7 - Auto Update.mp4 4.95Мб
3. Windows 7 - Auto Update.srt 1.78Кб
3. Windows 8 and 8.1 - Not using admin.mp4 18.24Мб
3. Windows 8 and 8.1 - Not using admin.srt 6.13Кб
30 953.88Кб
31 104.36Кб
32 298.92Кб
33 786.26Кб
34 586.62Кб
35 827.87Кб
36 273.54Кб
37 275.84Кб
38 192.71Кб
39 1005.92Кб
4 666.39Кб
4.1 CVE details.html 88б
4.1 Example hashes.html 104б
4.1 httpswww.nitrokey.com.html 87б
4.1 httpswww.virtualbox.org.html 88б
4.1 httpwww.urlvoid.com.html 84б
4.1 OS usage share.html 125б
4.2 httpswww.exploit-db.comsearch.html 95б
4.2 httpwww.google.com.stationx.net.html 95б
4.2 Linux and Mac OS X - dmidecode.html 93б
4.3 Exploit Kit Landscape Map.html 99б
4.3 Windows - dmidecode.html 115б
4.4 Linux - i-nex.html 88б
4.5 Windows - CPU Z.html 103б
4.6 Mac OS X - Mac Cupid.html 120б
4.7 Mac OS X - Installing dmidecode with brew.html 119б
4.8 httpswww.yubico.com.html 84б
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4 23.29Мб
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.srt 14.44Кб
4. Hash Functions.mp4 89.23Мб
4. Hash Functions.srt 7.19Кб
4. Physical and Hardware Isolation - Hardware Serials.mp4 50.24Мб
4. Physical and Hardware Isolation - Hardware Serials.srt 17.61Кб
4. Sample from Vol 2 - Password cracking part 2.mp4 24.15Мб
4. Sample from Vol 2 - Password cracking part 2.srt 13.08Кб
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 38.11Мб
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.srt 12.04Кб
4. Target Audience.mp4 7.33Мб
4. Target Audience.srt 3.52Кб
4. Usage Share.mp4 34.28Мб
4. Usage Share.srt 6.32Кб
4. Virtual box.mp4 144.15Мб
4. Virtual box.srt 12.43Кб
4. What is Privacy, Anonymity and Pseudonymity.mp4 11.87Мб
4. What is Privacy, Anonymity and Pseudonymity.srt 5.76Кб
4. Windows 10 - Not using admin.mp4 14.14Мб
4. Windows 10 - Not using admin.srt 5.04Кб
4. Windows 8 & 8.1 - Auto Update.mp4 6.54Мб
4. Windows 8 & 8.1 - Auto Update.srt 2.01Кб
40 610.79Кб
41 522.38Кб
42 837.93Кб
43 907.81Кб
44 44.82Кб
45 736.10Кб
46 1017.21Кб
47 582.71Кб
48 701.89Кб
49 718.55Кб
5 527.92Кб
5.1 Authentic8.html 97б
5.1 httpswww.parsemail.org.html 87б
5.1 httpswww.symantec.comenukcode-signing.html 107б
5.1 Kali AWS appliance.html 109б
5.1 The Cyber Security Landscape Diagram.jpg 777.15Кб
5.1 With Windows 10, Microsoft Blatantly Disregards User Choice and Privacy A Deep Dive.html 174б
5.2 httpswww.virustotal.comendocumentationemail-submissions.html 123б
5.2 Kali iso here if you want to install on a computer's hard disk or live boot it..html 92б
5.2 Microsoft Service Agreement.html 123б
5.2 Spoons.net.html 88б
5.2 Windows 10 Device Guard using Digital Signatures.html 174б
5.3 httpswhois.domaintools.comblob.com.html 99б
5.3 Kali images for Virtualbox or VMware.html 150б
5.3 Microsoft Privacy Statement.html 114б
5.3 Portable Apps.html 85б
5.4 Cortana privacy faq.html 126б
5.4 httpswhois.domaintools.combbc.co.uk.html 100б
5.4 Kali on Microsoft App Store as an official WSL.html 123б
5.4 Spikes.html 91б
5.5 Aegis Secure Key - USB 2.0 Flash Drive.html 108б
5.5 How to Get Email Headers.html 111б
5.5 Kali Arm hardware.html 118б
5.6 Pen Drive Apps.html 89б
5.7 Maxthon.html 84б
5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4 49.30Мб
5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.srt 19.84Кб
5. Digital Signatures.mp4 42.73Мб
5. Digital Signatures.srt 5.74Кб
5. Hackers, crackers and cyber criminals.mp4 7.70Мб
5. Hackers, crackers and cyber criminals.srt 3.36Кб
5. Kali Linux 2018.mp4 59.63Мб
5. Kali Linux 2018.srt 5.34Кб
5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4 31.75Мб
5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.srt 23.73Кб
5. Security, Vulnerabilities, Threats and Adversaries.mp4 11.23Мб
5. Security, Vulnerabilities, Threats and Adversaries.srt 5.23Кб
5. Study Recommendations.mp4 17.94Мб
5. Study Recommendations.srt 7.33Кб
5. Virtual Isolation.mp4 57.31Мб
5. Virtual Isolation.srt 14.07Кб
5. Windows 10 - Auto Update.mp4 4.93Мб
5. Windows 10 - Auto Update.srt 1.90Кб
5. Windows 10 - Privacy & Tracking.mp4 79.94Мб
5. Windows 10 - Privacy & Tracking.srt 7.88Кб
50 254.97Кб
51 794.23Кб
52 775.84Кб
53 71.48Кб
54 1000.65Кб
55 654.87Кб
56 21.20Кб
57 438.45Кб
58 528.31Кб
59 865.65Кб
6 495.08Кб
6.1 7 most common RATs.html 149б
6.1 Dual Booting explained.html 177б
6.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html 117б
6.1 httpswww.stationx.netsabsa.html 92б
6.1 httpwww.scambusters.org.html 88б
6.1 Microsoft Security Bulletins.html 115б
6.1 Steve Gibson's Cipher Suite Recommendations.html 117б
6.2 httpswww.securityforum.org.html 91б
6.2 httpwww.actionfraud.police.uktypes_of_fraud.html 108б
6.2 Malware stats.html 107б
6.2 National vulnerability database.html 85б
6.2 Weakdh Cipher Suite Recommendations.html 93б
6.3 Chef Jamie Oliver’s website hacked for the third time.html 106б
6.3 httpswww.iso.orgstandard56742.html.html 100б
6.3 httpwww.consumerfraudreporting.orgcredit_freeze_summary.php.html 124б
6.3 Wikipedia Transport Layer Security (TLS) page.html 115б
6.3 Windows 10 Ditches Patch Tuesday for Security's Sake.html 178б
6.4 Common Vulnerabilities and Exposures.html 85б
6.4 Mozilla Cipher Suite Recommendations.html 110б
6.4 SophosLabs 2018 Malware Forecast.html 162б
6.5 Patch Tuesday may be dead, but Microsoft's not confessing to the crime.html 197б
6.5 Report - Spotlight perils of malvertisements.html 142б
6. Asset Selection.mp4 7.68Мб
6. Asset Selection.srt 3.95Кб
6. Course updates.mp4 13.93Мб
6. Course updates.srt 892б
6. Dual Boot.mp4 7.92Мб
6. Dual Boot.srt 4.82Кб
6. Malware, viruses, rootkits and RATs.mp4 12.14Мб
6. Malware, viruses, rootkits and RATs.srt 8.22Кб
6. Sample from Vol 4 - Email clients, protocols and authentication.mp4 38.18Мб
6. Sample from Vol 4 - Email clients, protocols and authentication.srt 21.72Кб
6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 160.85Мб
6. Secure Sockets Layer (SSL) and Transport layer security (TLS).srt 15.38Кб
6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp4 14.51Мб
6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).srt 9.19Кб
6. Windows 10 - Disable tracking automatically.mp4 67.88Мб
6. Windows 10 - Disable tracking automatically.srt 6.39Кб
6. Windows - Criticality and Patch Tuesday.mp4 41.81Мб
6. Windows - Criticality and Patch Tuesday.srt 4.50Кб
60 214.29Кб
61 626.93Кб
62 725.46Кб
63 271.42Кб
64 167.40Кб
65 473.49Кб
66 101.97Кб
67 661.26Кб
68 686.32Кб
69 777.12Кб
7 714.57Кб
7.1 Chromium sandbox design.html 121б
7.1 Flexera Personal Software Inspector - Previously Secunia PSI.html 174б
7.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html 117б
7.1 httpwww.slate.comarticlestechnologybitwise201502lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html.html 198б
7.1 Intro to Sniffers.html 127б
7.2 Arpwatch Tool to Monitor Ethernet Activity in Linux.html 119б
7.2 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html 135б
7.2 Mozilla Sandbox design.html 102б
7.3 httpssecurelist.comanalysisquarterly-malware-reports72493it-threat-evolution-in-q3-2015.html 156б
7.3 SSL Strip tool By Moxie Marlinspike.html 107б
7.4 httpwww.telegraph.co.uknewsworldnewsnorthamericausa11416985Millions-of-computers-may-be-compromised-by-US-spyware-report.html.html 195б
7.4 WIFI Pineapple.html 91б
7.5 Cain & Abel.html 89б
7.6 sniffdet - Remote Sniffer Detection ToolLibrary.html 93б
7. Built-in Sandboxes and Application Isolation.mp4 10.40Мб
7. Built-in Sandboxes and Application Isolation.srt 4.85Кб
7. Cyber Security and Ethical Hacking Careers.mp4 31.22Мб
7. Cyber Security and Ethical Hacking Careers.srt 5.06Кб
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 10.77Мб
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.srt 6.03Кб
7. SSL Stripping.mp4 114.52Мб
7. SSL Stripping.srt 15.13Кб
7. Threat Modeling and Risk Assessments.mp4 18.03Мб
7. Threat Modeling and Risk Assessments.srt 10.34Кб
7. Windows 10 - Tool Disable Windows 10 Tracking.mp4 98.43Мб
7. Windows 10 - Tool Disable Windows 10 Tracking.srt 8.79Кб
7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4 19.35Мб
7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.srt 12.15Кб
70 993.22Кб
71 62.72Кб
72 658.02Кб
73 825.82Кб
74 923.40Кб
75 228.17Кб
76 32.41Кб
77 506.24Кб
78 878.77Кб
79 69.44Кб
8 588.63Кб
8.1 Debian Security Page.html 93б
8.1 How to disable cortana-on Windows 10.html 147б
8.1 Live phishing links.html 87б
8.1 Server Name Indication (SNI) Wiki.html 113б
8.1 Shadowdefender.html 91б
8.2 Automatic Security Updates.html 119б
8.2 Cortana privacy faq.html 126б
8.2 Deepfreeze Cloud Browser and Desktop.html 129б
8.2 Homograph attack using internationalized domain name.html 134б
8.3 BufferZone.html 112б
8.3 How to Disable Cortana in Windows 10’s Anniversary Update.html 130б
8.3 Software distributions based on Debian.html 105б
8.3 XSS example vulnerability.html 136б
8.4 Comodo.html 110б
8.5 Deepfreeze Standard.html 121б
8.6 f-sandbox.html 92б
8.7 Returnil.html 118б
8. HTTPS (HTTP Secure).mp4 81.90Мб
8. HTTPS (HTTP Secure).srt 7.90Кб
8. Linux - Debian - Patching.mp4 38.49Мб
8. Linux - Debian - Patching.srt 17.00Кб
8. Security vs Privacy vs Anonymity - Can we have it all.mp4 5.44Мб
8. Security vs Privacy vs Anonymity - Can we have it all.srt 2.87Кб
8. What is Phishing, Vishing and SMShing.mp4 25.98Мб
8. What is Phishing, Vishing and SMShing.srt 17.48Кб
8. Windows 10 – Cortana.mp4 41.02Мб
8. Windows 10 – Cortana.srt 4.33Кб
8. Windows - Sandboxes and Application Isolation.mp4 26.36Мб
8. Windows - Sandboxes and Application Isolation.srt 9.63Кб
80 152.89Кб
81 424.79Кб
82 643.07Кб
83 883.71Кб
84 79.75Кб
85 135.84Кб
86 343.08Кб
87 791.95Кб
88 9.24Кб
89 238.45Кб
9 787.94Кб
9.1 Apple security updates.html 101б
9.1 Complete guide windows 10 privacy settings.html 134б
9.1 httpsen.wikipedia.orgwikiAuthentication.html 105б
9.1 Introduction and quick guide sandboxie.html 143б
9.1 Spam example.html 142б
9.2 httpwhatis.techtarget.comdefinitionConfidentiality-integrity-and-availability-CIA.html 147б
9.2 Mac Update.html 86б
9.2 Sandboxie How it Works.html 106б
9.2 SmartScreen Filter FAQ.html 145б
9.2 Spam stats.html 104б
9.3 httpsen.wikipedia.orgwikiAuthorization.html 104б
9.3 igeekblogs - How to enable updates.html 134б
9.3 Sandboxie forum.html 96б
9.4 httpbrew.sh.html 76б
9.4 httpswww.stationx.netsabsa.html 92б
9.4 Sandboxie guide.html 118б
9.5 httpsen.wikipedia.orgwikiNon-repudiation.html 106б
9.6 httpsen.wikipedia.orgwikiParkerian_Hexad.html 106б
9. Confidentiality, Integrity and Availability - (Security Attributes).mp4 19.33Мб
9. Confidentiality, Integrity and Availability - (Security Attributes).srt 11.81Кб
9. Digital Certificates.mp4 81.97Мб
9. Digital Certificates.srt 7.00Кб
9. Mac - Patching.mp4 55.58Мб
9. Mac - Patching.srt 10.17Кб
9. Spamming & Doxing.mp4 4.79Мб
9. Spamming & Doxing.srt 3.93Кб
9. Windows 10 – Privacy Settings.mp4 86.46Мб
9. Windows 10 – Privacy Settings.srt 11.11Кб
9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4 70.11Мб
9. Windows - Sandboxes and Application Isolation - Sandboxie.srt 16.80Кб
90 615.30Кб
91 740.45Кб
92 59.25Кб
93 832.11Кб
94 84.16Кб
95 309.93Кб
96 330.31Кб
97 687.68Кб
98 473.86Кб
99 533.46Кб
TutsNode.com.txt 63б
Статистика распространения по странам
США (US) 5
Бангладеш (BD) 3
Индия (IN) 3
Великобритания (GB) 2
Вьетнам (VN) 2
Россия (RU) 2
Китай (CN) 1
Израиль (IL) 1
Болгария (BG) 1
Эфиопия (ET) 1
Пакистан (PK) 1
Нигерия (NG) 1
Всего 23
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент