[FreeTutorials.Eu] [UDEMY] The Complete Cyber Security Course Hackers Exposed! [FTU] - TorrentBank

File Name:[FreeTutorials.Eu] [UDEMY] The Complete Cyber Security Course Hackers Exposed! [FTU]

Create Tool:ruTorrent (PHP Class - Adrien Gibrat)

Create Time:2019-02-26 23:52:03

File Size:4.23 GB

File Count:545

File Hash:244c45c5163fad90d78b705e219a6260b1dca028

Magnet Link:

Magnet Link:

Torrent File:

10. Security Domains/1. Goals and Learning Objectives.mp4 1.43 MB
10. Security Domains/1. Goals and Learning Objectives.vtt 463 B
10. Security Domains/2. Security Domains.mp4 21.84 MB
10. Security Domains/2. Security Domains.vtt 15.14 KB
11. Security Through Isolation and Compartmentalization/10.1 Script Sandfox.html 118 B
11. Security Through Isolation and Compartmentalization/10.2 Linux Sandbox.html 96 B
11. Security Through Isolation and Compartmentalization/10.3 Trusted BSD.html 87 B
11. Security Through Isolation and Compartmentalization/10.4 Firejail.html 92 B
11. Security Through Isolation and Compartmentalization/10.5 Apparmor.html 105 B
11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.mp4 13.85 MB
11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.vtt 3.58 KB
11. Security Through Isolation and Compartmentalization/11.1 Mac OS X - App Sandbox.html 193 B
11. Security Through Isolation and Compartmentalization/11.2 Buckle Up.html 97 B
11. Security Through Isolation and Compartmentalization/11.3 OSX-Sandbox--Seatbelt--Profiles.html 119 B
11. Security Through Isolation and Compartmentalization/11.4 Sandbox Man page.html 165 B
11. Security Through Isolation and Compartmentalization/11.5 Firefox profile.html 132 B
11. Security Through Isolation and Compartmentalization/11.6 Apple Sandbox Guide.html 139 B
11. Security Through Isolation and Compartmentalization/11.7 SuperDuper.html 127 B
11. Security Through Isolation and Compartmentalization/11.8 How to run your Applications in a Mac OS X sandbox to enhance security.html 176 B
11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.mp4 23.80 MB
11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.vtt 7.54 KB
11. Security Through Isolation and Compartmentalization/12.1 Wikipedia - Hypervisor.html 101 B
11. Security Through Isolation and Compartmentalization/12.2 Wikipedia - Kernel-based Virtual Machine.html 119 B
11. Security Through Isolation and Compartmentalization/12.3 Virt Manager.html 86 B
11. Security Through Isolation and Compartmentalization/12.4 OpenVZ.html 90 B
11. Security Through Isolation and Compartmentalization/12.5 KVM Debian Jessie.html 98 B
11. Security Through Isolation and Compartmentalization/12.6 Turnkey Linux - Openvpn.html 97 B
11. Security Through Isolation and Compartmentalization/12.7 Wikipedia - Comparison of platform virtualization software.html 137 B
11. Security Through Isolation and Compartmentalization/12. Virtual Machines.mp4 44.44 MB
11. Security Through Isolation and Compartmentalization/12. Virtual Machines.vtt 17.10 KB
11. Security Through Isolation and Compartmentalization/13.1 Exploiting dram rowhammer (Could be used on VMs in the future).html 152 B
11. Security Through Isolation and Compartmentalization/13.2 Example VMware security bug.html 123 B
11. Security Through Isolation and Compartmentalization/13.3 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html 110 B
11. Security Through Isolation and Compartmentalization/13.4 httpsen.wikipedia.orgwikiTiming_channel.html 105 B
11. Security Through Isolation and Compartmentalization/13.5 httpsen.wikipedia.orgwikiCovert_channel.html 105 B
11. Security Through Isolation and Compartmentalization/13.6 httpsen.wikipedia.orgwikiX86_virtualization.html 109 B
11. Security Through Isolation and Compartmentalization/13.7 Venom.html 90 B
11. Security Through Isolation and Compartmentalization/13.8 A look at malware with VM detection.html 161 B
11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.mp4 22.74 MB
11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.vtt 14.92 KB
11. Security Through Isolation and Compartmentalization/14.1 Convert VM to ISO.html 109 B
11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.mp4 36.96 MB
11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.vtt 13.06 KB
11. Security Through Isolation and Compartmentalization/15.1 Whonix Features.html 97 B
11. Security Through Isolation and Compartmentalization/15.2 Whonix and virtualbox.html 99 B
11. Security Through Isolation and Compartmentalization/15.3 httpswww.whonix.org.html 84 B
11. Security Through Isolation and Compartmentalization/15.4 Whonix Stream Isolation.html 105 B
11. Security Through Isolation and Compartmentalization/15.5 ARM - Anonymizing relay monitor.html 108 B
11. Security Through Isolation and Compartmentalization/15.6 If setting up your own workstations - MUST READ.html 112 B
11. Security Through Isolation and Compartmentalization/15.7 How to implement physical isolation.html 131 B
11. Security Through Isolation and Compartmentalization/15.8 Whonix Check.html 100 B
11. Security Through Isolation and Compartmentalization/15.9 Whonix VM snapshots.html 116 B
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4 88.65 MB
11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.vtt 27.52 KB
11. Security Through Isolation and Compartmentalization/16.1 Whonix - Warnings.html 96 B
11. Security Through Isolation and Compartmentalization/16.2 Whonix's lack of an Amnesic feature.html 190 B
11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.mp4 15.78 MB
11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.vtt 6.24 KB
11. Security Through Isolation and Compartmentalization/17.10 Video Tour of Qubes.html 91 B
11. Security Through Isolation and Compartmentalization/17.1 Debian template(s).html 107 B
11. Security Through Isolation and Compartmentalization/17.2 Hardware Compatibility List (HCL).html 90 B
11. Security Through Isolation and Compartmentalization/17.3 Qubes docs.html 90 B
11. Security Through Isolation and Compartmentalization/17.4 Librem 13 laptop.html 105 B
11. Security Through Isolation and Compartmentalization/17.5 Qubes Download.html 96 B
11. Security Through Isolation and Compartmentalization/17.6 Whonix templates.html 105 B
11. Security Through Isolation and Compartmentalization/17.7 Windows templates.html 108 B
11. Security Through Isolation and Compartmentalization/17.8 Disposable VMs (DispVMs).html 97 B
11. Security Through Isolation and Compartmentalization/17.9 Split GPG.html 100 B
11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4 78.73 MB
11. Security Through Isolation and Compartmentalization/17. Qubes OS.vtt 26.33 KB
11. Security Through Isolation and Compartmentalization/18.1 Partitioning my digital life into security domains.html 145 B
11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.mp4 14.97 MB
11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.vtt 6.55 KB
11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.mp4 2.30 MB
11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.vtt 758 B
11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.mp4 5.66 MB
11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.vtt 3.04 KB
11. Security Through Isolation and Compartmentalization/3.1 Mac OS X - Macdaddyx.html 109 B
11. Security Through Isolation and Compartmentalization/3.2 Windows - Tmac.html 89 B
11. Security Through Isolation and Compartmentalization/3.3 Mac OS X - Wifispoof.html 83 B
11. Security Through Isolation and Compartmentalization/3.4 Diagram of Mac.html 131 B
11. Security Through Isolation and Compartmentalization/3.5 Mac OS X - How to change the mac address.html 141 B
11. Security Through Isolation and Compartmentalization/3.6 Linux - How to use macchanger.html 132 B
11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.mp4 25.57 MB
11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.vtt 9.91 KB
11. Security Through Isolation and Compartmentalization/4.1 Mac OS X - Installing dmidecode with brew.html 119 B
11. Security Through Isolation and Compartmentalization/4.2 Windows - CPU Z.html 103 B
11. Security Through Isolation and Compartmentalization/4.3 Linux and Mac OS X - dmidecode.html 93 B
11. Security Through Isolation and Compartmentalization/4.4 Windows - dmidecode.html 115 B
11. Security Through Isolation and Compartmentalization/4.5 httpswww.nitrokey.com.html 87 B
11. Security Through Isolation and Compartmentalization/4.6 Mac OS X - Mac Cupid.html 120 B
11. Security Through Isolation and Compartmentalization/4.7 httpswww.yubico.com.html 84 B
11. Security Through Isolation and Compartmentalization/4.8 Linux - i-nex.html 88 B
11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.mp4 50.25 MB
11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.vtt 15.96 KB
11. Security Through Isolation and Compartmentalization/5.1 Portable Apps.html 85 B
11. Security Through Isolation and Compartmentalization/5.2 Authentic8.html 97 B
11. Security Through Isolation and Compartmentalization/5.3 Maxthon.html 84 B
11. Security Through Isolation and Compartmentalization/5.4 Aegis Secure Key - USB 2.0 Flash Drive.html 108 B
11. Security Through Isolation and Compartmentalization/5.5 Spikes.html 91 B
11. Security Through Isolation and Compartmentalization/5.6 Pen Drive Apps.html 89 B
11. Security Through Isolation and Compartmentalization/5.7 Spoons.net.html 88 B
11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.mp4 57.31 MB
11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.vtt 12.84 KB
11. Security Through Isolation and Compartmentalization/6.1 Dual Booting explained.html 177 B
11. Security Through Isolation and Compartmentalization/6. Dual Boot.mp4 7.92 MB
11. Security Through Isolation and Compartmentalization/6. Dual Boot.vtt 4.42 KB
11. Security Through Isolation and Compartmentalization/7.1 Chromium sandbox design.html 121 B
11. Security Through Isolation and Compartmentalization/7.2 Mozilla Sandbox design.html 102 B
11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.mp4 10.41 MB
11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.vtt 4.43 KB
11. Security Through Isolation and Compartmentalization/8.1 Deepfreeze Cloud Browser and Desktop.html 129 B
11. Security Through Isolation and Compartmentalization/8.2 BufferZone.html 112 B
11. Security Through Isolation and Compartmentalization/8.3 Comodo.html 110 B
11. Security Through Isolation and Compartmentalization/8.4 Shadowdefender.html 91 B
11. Security Through Isolation and Compartmentalization/8.5 f-sandbox.html 92 B
11. Security Through Isolation and Compartmentalization/8.6 Returnil.html 118 B
11. Security Through Isolation and Compartmentalization/8.7 Deepfreeze Standard.html 121 B
11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.mp4 26.36 MB
11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.vtt 8.78 KB
11. Security Through Isolation and Compartmentalization/9.1 Sandboxie How it Works.html 106 B
11. Security Through Isolation and Compartmentalization/9.2 Introduction and quick guide sandboxie.html 143 B
11. Security Through Isolation and Compartmentalization/9.3 Sandboxie forum.html 96 B
11. Security Through Isolation and Compartmentalization/9.4 Sandboxie guide.html 118 B
11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4 70.11 MB
11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.vtt 15.22 KB
12. Wrap Up/1.1 Link to The Complete Cyber Security Course - Volume II - Network security + discount coupon studentdiscount25.html 136 B
12. Wrap Up/1. Congratulations.mp4 14.30 MB
12. Wrap Up/1. Congratulations.vtt 1.43 KB
12. Wrap Up/2.1 httpswww.stationx.netcertificate-request.html 106 B
12. Wrap Up/2. Certificate Of Completion for CPEs.mp4 12.88 MB
12. Wrap Up/2. Certificate Of Completion for CPEs.vtt 1.12 KB
12. Wrap Up/3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4 48.08 MB
12. Wrap Up/3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).vtt 21.59 KB
12. Wrap Up/4. Sample from Vol 2 - Password cracking part 2.mp4 24.15 MB
12. Wrap Up/4. Sample from Vol 2 - Password cracking part 2.vtt 11.74 KB
12. Wrap Up/5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4 31.75 MB
12. Wrap Up/5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.vtt 21.23 KB
12. Wrap Up/6. Sample from Vol 4 - Email clients, protocols and authentication.mp4 38.19 MB
12. Wrap Up/6. Sample from Vol 4 - Email clients, protocols and authentication.vtt 19.41 KB
13. BONUS Section/1. BONUS DISCOUNT COUPONS.html 4.95 KB
1. Introduction/1.1 Nathan's Cyber Security Blog.html 99 B
1. Introduction/1.2 Nathan's Twitter #GotoNathan.html 91 B
1. Introduction/1. Welcome and Introduction to the Instructor!.mp4 22.95 MB
1. Introduction/1. Welcome and Introduction to the Instructor!.vtt 1.88 KB
1. Introduction/2.1 httpswww.stationx.netcanarytokens.html 99 B
1. Introduction/2. Security Quick Win!.mp4 43.20 MB
1. Introduction/2. Security Quick Win!.vtt 15.27 KB
1. Introduction/3. Goals and Learning Objectives - Volume 1.mp4 16.11 MB
1. Introduction/3. Goals and Learning Objectives - Volume 1.vtt 2.55 KB
1. Introduction/4. Target Audience.mp4 7.33 MB
1. Introduction/4. Target Audience.vtt 3.23 KB
1. Introduction/5. Study Recommendations.mp4 70.67 MB
1. Introduction/5. Study Recommendations.vtt 6.48 KB
1. Introduction/6. Course updates.mp4 4.39 MB
1. Introduction/6. Course updates.vtt 787 B
2. know Yourself - The Threat and Vulnerability Landscape/10. Defense In Depth.mp4 2.99 MB
2. know Yourself - The Threat and Vulnerability Landscape/10. Defense In Depth.vtt 1.59 KB
2. know Yourself - The Threat and Vulnerability Landscape/11. The Zero Trust Model.mp4 10.27 MB
2. know Yourself - The Threat and Vulnerability Landscape/11. The Zero Trust Model.vtt 4.27 KB
2. know Yourself - The Threat and Vulnerability Landscape/1. Theory and Practical.mp4 15.07 MB
2. know Yourself - The Threat and Vulnerability Landscape/1. Theory and Practical.vtt 1.35 KB
2. know Yourself - The Threat and Vulnerability Landscape/2. Goals and Learning Objectives.mp4 6.99 MB
2. know Yourself - The Threat and Vulnerability Landscape/2. Goals and Learning Objectives.vtt 905 B
2. know Yourself - The Threat and Vulnerability Landscape/3. Protect What You Value.mp4 23.67 MB
2. know Yourself - The Threat and Vulnerability Landscape/3. Protect What You Value.vtt 4.76 KB
2. know Yourself - The Threat and Vulnerability Landscape/4. What is Privacy, Anonymity and Pseudonymity.mp4 11.87 MB
2. know Yourself - The Threat and Vulnerability Landscape/4. What is Privacy, Anonymity and Pseudonymity.vtt 5.07 KB
2. know Yourself - The Threat and Vulnerability Landscape/5.1 The Cyber Security Landscape Diagram.jpg.jpg 777.15 KB
2. know Yourself - The Threat and Vulnerability Landscape/5. Security, Vulnerabilities, Threats and Adversaries.mp4 11.24 MB
2. know Yourself - The Threat and Vulnerability Landscape/5. Security, Vulnerabilities, Threats and Adversaries.vtt 4.65 KB
2. know Yourself - The Threat and Vulnerability Landscape/6.1 httpswww.stationx.netsabsa.html 92 B
2. know Yourself - The Threat and Vulnerability Landscape/6.2 httpswww.iso.orgstandard56742.html.html 100 B
2. know Yourself - The Threat and Vulnerability Landscape/6.3 httpswww.securityforum.org.html 91 B
2. know Yourself - The Threat and Vulnerability Landscape/6. Asset Selection.mp4 7.68 MB
2. know Yourself - The Threat and Vulnerability Landscape/6. Asset Selection.vtt 3.55 KB
2. know Yourself - The Threat and Vulnerability Landscape/7. Threat Modeling and Risk Assessments.mp4 18.03 MB
2. know Yourself - The Threat and Vulnerability Landscape/7. Threat Modeling and Risk Assessments.vtt 9.18 KB
2. know Yourself - The Threat and Vulnerability Landscape/8. Security vs Privacy vs Anonymity - Can we have it all.mp4 5.43 MB
2. know Yourself - The Threat and Vulnerability Landscape/8. Security vs Privacy vs Anonymity - Can we have it all.vtt 2.52 KB
2. know Yourself - The Threat and Vulnerability Landscape/9.1 httpswww.stationx.netsabsa.html 92 B
2. know Yourself - The Threat and Vulnerability Landscape/9.2 httpsen.wikipedia.orgwikiAuthentication.html 105 B
2. know Yourself - The Threat and Vulnerability Landscape/9.3 httpsen.wikipedia.orgwikiParkerian_Hexad.html 106 B
2. know Yourself - The Threat and Vulnerability Landscape/9.4 httpwhatis.techtarget.comdefinitionConfidentiality-integrity-and-availability-CIA.html 147 B
2. know Yourself - The Threat and Vulnerability Landscape/9.5 httpsen.wikipedia.orgwikiNon-repudiation.html 106 B
2. know Yourself - The Threat and Vulnerability Landscape/9.6 httpsen.wikipedia.orgwikiAuthorization.html 104 B
2. know Yourself - The Threat and Vulnerability Landscape/9. Confidentiality, Integrity and Availability - (Security Attributes).mp4 19.34 MB
2. know Yourself - The Threat and Vulnerability Landscape/9. Confidentiality, Integrity and Availability - (Security Attributes).vtt 10.37 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.1 httpwww.actionfraud.police.uktypes_of_fraud.html 108 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.2 Top 10 scams.html 127 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.3 httpwww.consumerfraudreporting.org.html 98 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10. Social engineering - Scams, cons, tricks and fraud.mp4 11.91 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10. Social engineering - Scams, cons, tricks and fraud.vtt 5.94 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.1 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html 136 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html 116 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.5 httpsthehackernews.com201802cryptojacking-malware.html.html 121 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.6 httpscoinhive.com.html 82 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.7 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html 122 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.8 httpsgithub.comhoshsadiqadblock-nocoin-list.html 110 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 16.19 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.vtt 9.64 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html 121 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. Darknets, Dark Markets and Exploit kits.mp4 32.43 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. Darknets, Dark Markets and Exploit kits.vtt 8.24 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/13. Governments, spies and secret stuff part I.mp4 27.02 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/13. Governments, spies and secret stuff part I.vtt 5.91 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.1 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html 104 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.2 httpsnsa.gov1.infodninsa-ant-catalog.html 103 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.3 httpstheintercept.com.html 86 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.4 httpscryptome.org201401nsa-codenames.htm.html 107 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.5 httpswikileaks.org-Leaks-.html.html 95 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.6 httpwww.nsaplayset.org.html 87 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Governments, spies and secret stuff part II.mp4 30.23 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Governments, spies and secret stuff part II.vtt 10.72 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.10 Matt Blaze Speaking to a US congressional committee.html 107 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.11 httpwww.crypto.compapersgovernmentreform-blaze2015.pdf.html 120 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.12 A Worldwide Survey of E ncryption Products - xls.html 154 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.13 UK data communications bill.html 121 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.1 Clipper chip.html 192 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.2 WhatsApp was Banned for 48 Hours in Brazil.html 112 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.4 The Case against Regulating Encryption Technology.html 112 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.5 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html 137 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.6 A Worldwide Survey of Encryption Products - pdf.html 153 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.7 Kazakhstans new encryption law.html 185 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. Regulating encryption, mandating insecurity & legalizing spying.mp4 42.74 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15. Regulating encryption, mandating insecurity & legalizing spying.vtt 15.78 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.1 Examples of backdoors.html 123 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.3 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html 133 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.4 httpsreproducible-builds.org.html 93 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.5 Apple removes malware infected apps from the app store.html 165 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.6 Apple backdoor order.html 112 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.7 Formal methods.html 105 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.8 Video on how to build your own software reproducibly.html 142 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.mp4 24.48 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.vtt 11.01 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17.1 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html 129 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html 132 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. Censorship.mp4 6.49 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. Censorship.vtt 2.73 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18.1 httpwww.stationx.netalerts.html 91 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. Cyber Threat Intelligence – Stay Informed.mp4 2.62 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. Cyber Threat Intelligence – Stay Informed.vtt 1.07 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/1. Goals and Learning Objectives.mp4 2.90 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/1. Goals and Learning Objectives.vtt 1.09 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2.1 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html 137 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2.2 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html 132 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. Why You Need Security – The Value Of A Hack.mp4 28.93 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. Why You Need Security – The Value Of A Hack.vtt 5.90 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3.1 httpsresearch.google.compubspub43963.html.html 107 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. The Top 3 Things You Need To Stay Safe Online.mp4 2.51 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. The Top 3 Things You Need To Stay Safe Online.vtt 1.45 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.1 Exploit Kit Landscape Map.html 99 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.2 CVE details.html 88 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.3 httpswww.exploit-db.comsearch.html 95 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 38.11 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.vtt 10.62 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/5. Hackers, crackers and cyber criminals.mp4 7.70 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/5. Hackers, crackers and cyber criminals.vtt 2.99 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.1 SophosLabs 2018 Malware Forecast.html 162 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.2 Chef Jamie Oliver’s website hacked for the third time.html 106 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.3 Malware stats.html 107 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.4 Report - Spotlight perils of malvertisements.html 142 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.5 7 most common RATs.html 149 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware, viruses, rootkits and RATs.mp4 12.15 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware, viruses, rootkits and RATs.vtt 7.27 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/7.4 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html 135 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 10.78 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/7. Spyware, Adware, Scareware, PUPs & Browser hijacking.vtt 5.33 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8.1 Homograph attack using internationalized domain name.html 134 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8.2 XSS example vulnerability.html 136 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8.3 Live phishing links.html 87 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. What is Phishing, Vishing and SMShing.mp4 25.98 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. What is Phishing, Vishing and SMShing.vtt 15.35 KB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9.1 Spam stats.html 104 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9.2 Spam example.html 142 B
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spamming & Doxing.mp4 4.79 MB
3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spamming & Doxing.vtt 3.51 KB
4. Encryption Crash Course/10.1 CA example mistake.html 180 B
4. Encryption Crash Course/10.2 SSL Sniff.html 107 B
4. Encryption Crash Course/10.3 Cert Fingerprints.html 97 B
4. Encryption Crash Course/10.4 Certificate patrol.html 127 B
4. Encryption Crash Course/10.5 CA Ecosystem.html 105 B
4. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4 199.30 MB
4. Encryption Crash Course/10. Certificate Authorities and HTTPS.vtt 16.46 KB
4. Encryption Crash Course/11. End-to-End Encryption (E2EE).mp4 8.18 MB
4. Encryption Crash Course/11. End-to-End Encryption (E2EE).vtt 2.00 KB
4. Encryption Crash Course/12.1 OpenPuff Manual.html 107 B
4. Encryption Crash Course/12.2 List of Steg Tools.html 105 B
4. Encryption Crash Course/12.3 httpwww.spammimic.com.html 85 B
4. Encryption Crash Course/12.4 OpenPuff.html 116 B
4. Encryption Crash Course/12. Steganography.mp4 104.31 MB
4. Encryption Crash Course/12. Steganography.vtt 8.60 KB
4. Encryption Crash Course/13.1 Security Pitfalls.html 135 B
4. Encryption Crash Course/13. How Security and Encryption is Really Attacked.mp4 17.37 MB
4. Encryption Crash Course/13. How Security and Encryption is Really Attacked.vtt 3.09 KB
4. Encryption Crash Course/1. Goals and Learning Objectives.mp4 1.63 MB
4. Encryption Crash Course/1. Goals and Learning Objectives.vtt 592 B
4. Encryption Crash Course/2. Symmetric Encryption.mp4 32.30 MB
4. Encryption Crash Course/2. Symmetric Encryption.vtt 9.99 KB
4. Encryption Crash Course/3. Asymmetric Encryption.mp4 72.31 MB
4. Encryption Crash Course/3. Asymmetric Encryption.vtt 11.46 KB
4. Encryption Crash Course/4.1 Example hashes.html 104 B
4. Encryption Crash Course/4. Hash Functions.mp4 89.23 MB
4. Encryption Crash Course/4. Hash Functions.vtt 6.30 KB
4. Encryption Crash Course/5.1 httpswww.symantec.comenukcode-signing.html 107 B
4. Encryption Crash Course/5.2 Windows 10 Device Guard using Digital Signatures.html 174 B
4. Encryption Crash Course/5. Digital Signatures.mp4 42.74 MB
4. Encryption Crash Course/5. Digital Signatures.vtt 5.08 KB
4. Encryption Crash Course/6.1 Weakdh Cipher Suite Recommendations.html 93 B
4. Encryption Crash Course/6.2 Mozilla Cipher Suite Recommendations.html 110 B
4. Encryption Crash Course/6.3 Wikipedia Transport Layer Security (TLS) page.html 115 B
4. Encryption Crash Course/6.4 Steve Gibson's Cipher Suite Recommendations.html 117 B
4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 160.85 MB
4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).vtt 13.65 KB
4. Encryption Crash Course/7.1 SSL Strip tool By Moxie Marlinspike.html 107 B
4. Encryption Crash Course/7.2 sniffdet - Remote Sniffer Detection ToolLibrary.html 93 B
4. Encryption Crash Course/7.3 WIFI Pineapple.html 91 B
4. Encryption Crash Course/7.4 Arpwatch Tool to Monitor Ethernet Activity in Linux.html 119 B
4. Encryption Crash Course/7.5 Intro to Sniffers.html 127 B
4. Encryption Crash Course/7.6 Cain & Abel.html 89 B
4. Encryption Crash Course/7. SSL Stripping.mp4 114.52 MB
4. Encryption Crash Course/7. SSL Stripping.vtt 13.34 KB
4. Encryption Crash Course/8.1 Server Name Indication (SNI) Wiki.html 113 B
4. Encryption Crash Course/8. HTTPS (HTTP Secure).mp4 81.90 MB
4. Encryption Crash Course/8. HTTPS (HTTP Secure).vtt 6.98 KB
4. Encryption Crash Course/9. Digital Certificates.mp4 81.96 MB
4. Encryption Crash Course/9. Digital Certificates.vtt 6.13 KB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/1. Goals and Learning Objectives.mp4 1.84 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/1. Goals and Learning Objectives.vtt 704 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.10 Vmware Network Adapter Settings.html 191 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.11 httpsen.wikipedia.orgwikiHypervisor.html 101 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.1 httpwww.osboxes.orgvmware-images.html 98 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.2 Windows VMs here.html 124 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.3 httpsen.wikipedia.orgwikiComparison_of_platform_virtualization_software.html 137 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.4 httpwww.osboxes.orgguide#!.html 92 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.5 httpwww.osboxes.orgvirtualbox-images.html 102 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.6 httpvirtual-machine.org.html 88 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.7 httpsmarketplace.vmware.com.html 92 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.8 httpvirtualboxes.orgimages.html 92 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2.9 Virtualbox Network Adapter Settings.html 104 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 113.36 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.vtt 10.77 KB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3.1 httpwww.vmware.comproductsworkstationcompare.html.html 116 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3.2 httpwww.vmware.comproductsplayerfaqsfaqs.html.html 113 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4 110.48 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.vtt 10.66 KB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4.1 httpswww.virtualbox.org.html 88 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4 144.15 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.vtt 10.82 KB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.2 Kali on Microsoft App Store as an official WSL.html 123 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.3 Kali Arm hardware.html 118 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.4 Kali AWS appliance.html 109 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5.5 Kali images for Virtualbox or VMware.html 150 B
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali Linux 2018.mp4 59.62 MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali Linux 2018.vtt 4.77 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.mp4 59.76 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.vtt 4.85 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11.1 Microsoft - How to manage Windows 10 notification and upgrade options.html 107 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11.2 Never 10 by Steve Gibson (Use this!).html 92 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11.3 GWX Control Panel.html 100 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4 105.53 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.vtt 7.71 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.1 Fix Mac OS X.html 84 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.2 httpsgithub.comfix-macosxnet-monitor.html 102 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.3 httpsgithub.comkarek314macOS-home-call-drop.html 109 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.4 httpsgithub.comfix-macosxyosemite-phone-home.html 110 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12.5 Washingtonpost - How apples os x yosemite tracks-you.html 213 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Mac - Privacy & Tracking.mp4 57.97 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Mac - Privacy & Tracking.vtt 5.11 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.1 httpdistrowatch.com.html 84 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.2 httpswww.openbsd.org.html 85 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.3 httpswww.debian.org.html 84 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13.4 httpswww.archlinux.org.html 87 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. Linux and Unix “like” Operating systems.mp4 46.23 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. Linux and Unix “like” Operating systems.vtt 3.79 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14.1 Ubuntu - httpswww.ubuntu.com.html 84 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14.2 Manjaro - httpsmanjaro.org.html 81 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14.3 Linux Mint - httpslinuxmint.com.html 83 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14. General Use Operating Systems (Windows, MacOS and Linux).mp4 46.91 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14. General Use Operating Systems (Windows, MacOS and Linux).vtt 5.01 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15.1 OpenBSD - httpswww.openbsd.org.html 85 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15.2 Debian - httpswww.debian.org.html 84 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/15.3 Archlinux - httpswww.archlinux.org.html 87 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.1 Security-Enhanced Linux (SELinux) - httpsgithub.comSELinuxProject.html 94 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.2 Subgraph OS - httpssubgraph.comsgos.html 87 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.3 Hardened Gentoo Linux - httpswiki.gentoo.orgwikiProjectHardened.html 106 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.4 PureOS - httpswww.pureos.net.html 84 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.5 Astra Linux - httpastralinux.ru.html 82 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.6 Trisquel OS - httpstrisquel.info.html 83 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/16.7 Qubes OS - httpswww.qubes-os.org.html 86 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17.1 Qubes OS - httpswww.qubes-os.org.html 86 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17.2 Tails OS - httpstails.boum.org.html 84 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17.3 Whonix - httpswww.whonix.org.html 84 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4 21.55 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17. Anonymity Focused Operating Systems (Tails and Whonix OS).vtt 3.53 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.1 Kali Linux - httpswww.kali.org.html 82 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.2 BackBox Linux - httpsbackbox.org.html 81 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.3 Pentoo - httpswww.pentoo.ch.html 83 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.4 Parrot GNULinux - httpswww.parrotsec.org.html 87 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18.5 BlackArch Linux - httpsblackarch.org.html 83 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4 13.38 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. Penetration Testing and Ethical Hacking Focused Operating Systems.vtt 1.15 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.1 Android - httpswww.android.com.html 85 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.2 MicroG - httpsmicrog.org.html 80 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.3 iOS - httpsdeveloper.apple.comios.html 93 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.4 OmniROM - httpswww.omnirom.org.html 85 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.5 LineageOS - httpslineageos.org.html 83 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.6 PureOS Librem 5 - httpspuri.smshoplibrem-5.html 91 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/19.7 Replicant - Httpswww.replicant.us.html 86 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/1. Goals and Learning Objectives.mp4 2.43 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/1. Goals and Learning Objectives.vtt 852 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20.1 Debian Live CDDVD.html 92 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20.2 Download Debian.html 92 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20.3 Free Debian Books and Guides.html 93 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 57.77 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.vtt 5.78 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/2. Security Features and Functionality.mp4 57.89 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/2. Security Features and Functionality.vtt 6.88 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3.1 Top 50 products vs security bugs.html 114 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3.2 Report - Buying Into the Bias Why Vulnerability Statistics Suck.html 168 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp4 83.89 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.vtt 6.17 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4.1 OS usage share.html 125 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. Usage Share.mp4 34.28 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. Usage Share.vtt 5.53 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5.2 Microsoft Privacy Statement.html 114 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5.3 Microsoft Service Agreement.html 123 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5.4 Cortana privacy faq.html 126 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp4 79.95 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.vtt 6.96 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html 117 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.mp4 67.89 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.vtt 5.67 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html 117 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp4 98.43 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.vtt 7.63 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8.1 How to disable cortana-on Windows 10.html 147 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8.2 Cortana privacy faq.html 126 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8.3 How to Disable Cortana in Windows 10’s Anniversary Update.html 130 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Windows 10 – Cortana.mp4 41.02 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Windows 10 – Cortana.vtt 3.80 KB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9.1 Complete guide windows 10 privacy settings.html 134 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9.2 SmartScreen Filter FAQ.html 145 B
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp4 86.46 MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.vtt 9.65 KB
7. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.mp4 34.01 MB
7. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.vtt 5.96 KB
7. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.mp4 3.57 MB
7. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.vtt 1.75 KB
7. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.mp4 8.66 MB
7. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.vtt 1.02 KB
7. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.mp4 4.30 MB
7. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.vtt 2.67 KB
7. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.mp4 1.66 MB
7. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.vtt 584 B
7. Security Bugs and Vulnerabilities/2. The Importance of Patching.mp4 43.71 MB
7. Security Bugs and Vulnerabilities/2. The Importance of Patching.vtt 5.84 KB
7. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.mp4 4.94 MB
7. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.vtt 1.63 KB
7. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.mp4 6.54 MB
7. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.vtt 1.84 KB
7. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.mp4 4.93 MB
7. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.vtt 1.73 KB
7. Security Bugs and Vulnerabilities/6.1 Windows 10 Ditches Patch Tuesday for Security's Sake.html 178 B
7. Security Bugs and Vulnerabilities/6.2 Microsoft Security Bulletins.html 115 B
7. Security Bugs and Vulnerabilities/6.3 Patch Tuesday may be dead, but Microsoft's not confessing to the crime.html 197 B
7. Security Bugs and Vulnerabilities/6.4 National vulnerability database.html 85 B
7. Security Bugs and Vulnerabilities/6.5 Common Vulnerabilities and Exposures.html 85 B
7. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.mp4 41.81 MB
7. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.vtt 4.09 KB
7. Security Bugs and Vulnerabilities/7.1 Flexera Personal Software Inspector - Previously Secunia PSI.html 174 B
7. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4 19.35 MB
7. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.vtt 10.96 KB
7. Security Bugs and Vulnerabilities/8.1 Software distributions based on Debian.html 105 B
7. Security Bugs and Vulnerabilities/8.2 Debian Security Page.html 93 B
7. Security Bugs and Vulnerabilities/8.3 Automatic Security Updates.html 119 B
7. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.mp4 38.50 MB
7. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.vtt 15.21 KB
7. Security Bugs and Vulnerabilities/9.1 httpbrew.sh.html 76 B
7. Security Bugs and Vulnerabilities/9.2 igeekblogs - How to enable updates.html 134 B
7. Security Bugs and Vulnerabilities/9.3 Apple security updates.html 101 B
7. Security Bugs and Vulnerabilities/9.4 Mac Update.html 86 B
7. Security Bugs and Vulnerabilities/9. Mac - Patching.mp4 55.58 MB
7. Security Bugs and Vulnerabilities/9. Mac - Patching.vtt 9.23 KB
8. Reducing Threat Privilege/1. Goals and Learning Objectives - Removing Privilege.mp4 13.59 MB
8. Reducing Threat Privilege/1. Goals and Learning Objectives - Removing Privilege.vtt 3.72 KB
8. Reducing Threat Privilege/2. Windows 7 - Not using admin.mp4 10.99 MB
8. Reducing Threat Privilege/2. Windows 7 - Not using admin.vtt 4.98 KB
8. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.mp4 18.24 MB
8. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.vtt 5.58 KB
8. Reducing Threat Privilege/4. Windows 10 - Not using admin.mp4 14.15 MB
8. Reducing Threat Privilege/4. Windows 10 - Not using admin.vtt 4.58 KB
9. Social Engineering and Social Media Offence and Defence/1. Goals and Learning Objectives.mp4 1.73 MB
9. Social Engineering and Social Media Offence and Defence/1. Goals and Learning Objectives.vtt 639 B
9. Social Engineering and Social Media Offence and Defence/2.1 httpstosdr.org.html 79 B
9. Social Engineering and Social Media Offence and Defence/2.2 httpswww.eff.orgwho-has-your-back-government-data-requests-2015.html 128 B
9. Social Engineering and Social Media Offence and Defence/2.4 httpsgnu.iosocialtry.html 87 B
9. Social Engineering and Social Media Offence and Defence/2.5 Twitter Privacy Settings.html 120 B
9. Social Engineering and Social Media Offence and Defence/2.6 The complete guide to facebook privacy settings.html 136 B
9. Social Engineering and Social Media Offence and Defence/2.7 httpsdiasporafoundation.org.html 92 B
9. Social Engineering and Social Media Offence and Defence/2.8 httpfriendica.com.html 82 B
9. Social Engineering and Social Media Offence and Defence/2.9 List of Personally Identifiable Information (PII).html 134 B
9. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.mp4 83.81 MB
9. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.vtt 22.48 KB
9. Social Engineering and Social Media Offence and Defence/3.10 httpfreemail.ms.html 80 B
9. Social Engineering and Social Media Offence and Defence/3.11 httpwww.dispostable.com.html 88 B
9. Social Engineering and Social Media Offence and Defence/3.12 httpsmailinator.com.html 84 B
9. Social Engineering and Social Media Offence and Defence/3.13 httpbugmenot.com.html 81 B
9. Social Engineering and Social Media Offence and Defence/3.14 httpsanonbox.net.html 81 B
9. Social Engineering and Social Media Offence and Defence/3.15 Top 10 sites receive sms online without phone.html 135 B
9. Social Engineering and Social Media Offence and Defence/3.16 httpwww.tempinbox.com.html 85 B
9. Social Engineering and Social Media Offence and Defence/3.17 httpwww.mailexpire.com.html 87 B
9. Social Engineering and Social Media Offence and Defence/3.1 httpwww.migmail.net.html 84 B
9. Social Engineering and Social Media Offence and Defence/3.2 httpswww.trash-mail.comen.html 91 B
9. Social Engineering and Social Media Offence and Defence/3.3 Example SMS recieve online site.html 96 B
9. Social Engineering and Social Media Offence and Defence/3.4 httpcrapmail.dken.html 83 B
9. Social Engineering and Social Media Offence and Defence/3.5 httpswww.guerrillamail.com.html 92 B
9. Social Engineering and Social Media Offence and Defence/3.6 http10minutemail.com10MinuteMailindex.html.html 108 B
9. Social Engineering and Social Media Offence and Defence/3.7 httpdontmail.net.html 81 B
9. Social Engineering and Social Media Offence and Defence/3.8 httpgetairmail.com.html 83 B
9. Social Engineering and Social Media Offence and Defence/3.9 httpwww.mytrashmail.com.html 88 B
9. Social Engineering and Social Media Offence and Defence/3. Identify Verification and Registration.mp4 23.40 MB
9. Social Engineering and Social Media Offence and Defence/3. Identify Verification and Registration.vtt 8.44 KB
9. Social Engineering and Social Media Offence and Defence/4.1 httpwww.urlvoid.com.html 84 B
9. Social Engineering and Social Media Offence and Defence/4.2 httpwww.google.com.stationx.net.html 95 B
9. Social Engineering and Social Media Offence and Defence/4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4 23.29 MB
9. Social Engineering and Social Media Offence and Defence/4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.vtt 12.95 KB
9. Social Engineering and Social Media Offence and Defence/5.1 httpswww.virustotal.comendocumentationemail-submissions.html 123 B
9. Social Engineering and Social Media Offence and Defence/5.2 How to Get Email Headers.html 111 B
9. Social Engineering and Social Media Offence and Defence/5.3 httpswww.parsemail.org.html 87 B
9. Social Engineering and Social Media Offence and Defence/5.4 httpswhois.domaintools.combbc.co.uk.html 100 B
9. Social Engineering and Social Media Offence and Defence/5.5 httpswhois.domaintools.comblob.com.html 99 B
9. Social Engineering and Social Media Offence and Defence/5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4 49.31 MB
9. Social Engineering and Social Media Offence and Defence/5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.vtt 17.75 KB
9. Social Engineering and Social Media Offence and Defence/6.1 httpwww.actionfraud.police.uktypes_of_fraud.html 108 B
9. Social Engineering and Social Media Offence and Defence/6.2 httpwww.scambusters.org.html 88 B
9. Social Engineering and Social Media Offence and Defence/6.3 httpwww.consumerfraudreporting.orgcredit_freeze_summary.php.html 124 B
9. Social Engineering and Social Media Offence and Defence/6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp4 14.52 MB
9. Social Engineering and Social Media Offence and Defence/6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).vtt 8.29 KB
Discuss.FreeTutorials.Eu.html 31.34 KB
FreeCoursesOnline.Me.html 108.30 KB
FreeTutorials.Eu.html 102.23 KB
How you can help Team-FTU.txt 259 B
[TGx]Downloaded from torrentgalaxy.org.txt 524 B
Torrent Downloaded From GloDls.to.txt 84 B
https://tracker.fastdownload.xyz:443/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://open.stealth.si:80/announce
udp://hk1.opentracker.ga:6969/announce
udp://tracker.cyberia.is:6969/announce
https://opentracker.xyz:443/announce
https://t.quic.ws:443/announce
udp://9.rarbg.to:2710/announce
udp://tracker.opentrackr.org:1337/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://open.demonii.si:1337/announce

TorrentBank
Copyright © 2024