Torrent Info
Title The Complete Cyber Security Course Hackers Exposed! [FTU]
Category
Size 4.23GB
Files List
Please note that this page does not hosts or makes available any of the listed filenames. You cannot download any of those files from here.
1.1 Link to The Complete Cyber Security Course - Volume II - Network security + discount coupon studentdiscount25.html 136B
1.1 Nathan's Cyber Security Blog.html 99B
1.2 Nathan's Twitter #GotoNathan.html 91B
1. BONUS DISCOUNT COUPONS.html 4.95KB
1. Congratulations.mp4 14.30MB
1. Congratulations.vtt 1.43KB
1. Goals and Learning Objectives.mp4 2.90MB
1. Goals and Learning Objectives.mp4 1.63MB
1. Goals and Learning Objectives.mp4 1.84MB
1. Goals and Learning Objectives.mp4 2.43MB
1. Goals and Learning Objectives.mp4 1.66MB
1. Goals and Learning Objectives.mp4 1.73MB
1. Goals and Learning Objectives.mp4 1.43MB
1. Goals and Learning Objectives.mp4 2.30MB
1. Goals and Learning Objectives.vtt 1.09KB
1. Goals and Learning Objectives.vtt 592B
1. Goals and Learning Objectives.vtt 704B
1. Goals and Learning Objectives.vtt 852B
1. Goals and Learning Objectives.vtt 584B
1. Goals and Learning Objectives.vtt 639B
1. Goals and Learning Objectives.vtt 463B
1. Goals and Learning Objectives.vtt 758B
1. Goals and Learning Objectives - Removing Privilege.mp4 13.59MB
1. Goals and Learning Objectives - Removing Privilege.vtt 3.72KB
1. Theory and Practical.mp4 15.07MB
1. Theory and Practical.vtt 1.35KB
1. Welcome and Introduction to the Instructor!.mp4 22.95MB
1. Welcome and Introduction to the Instructor!.vtt 1.88KB
10.1 CA example mistake.html 180B
10.1 httpwww.actionfraud.police.uktypes_of_fraud.html 108B
10.1 Script Sandfox.html 118B
10.2 Linux Sandbox.html 96B
10.2 SSL Sniff.html 107B
10.2 Top 10 scams.html 127B
10.3 Cert Fingerprints.html 97B
10.3 httpwww.consumerfraudreporting.org.html 98B
10.3 Trusted BSD.html 87B
10.4 Certificate patrol.html 127B
10.4 Firejail.html 92B
10.5 Apparmor.html 105B
10.5 CA Ecosystem.html 105B
10. Certificate Authorities and HTTPS.mp4 199.30MB
10. Certificate Authorities and HTTPS.vtt 16.46KB
10. Defense In Depth.mp4 2.99MB
10. Defense In Depth.vtt 1.59KB
10. Firefox - Browser and extension updates.mp4 34.01MB
10. Firefox - Browser and extension updates.vtt 5.96KB
10. Linux - Sandboxes and Application Isolation.mp4 13.85MB
10. Linux - Sandboxes and Application Isolation.vtt 3.58KB
10. Social engineering - Scams, cons, tricks and fraud.mp4 11.91MB
10. Social engineering - Scams, cons, tricks and fraud.vtt 5.94KB
10. Windows 10 - WiFi Sense.mp4 59.76MB
10. Windows 10 - WiFi Sense.vtt 4.85KB
11.1 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html 136B
11.1 Mac OS X - App Sandbox.html 193B
11.1 Microsoft - How to manage Windows 10 notification and upgrade options.html 107B
11.2 Buckle Up.html 97B
11.2 Never 10 by Steve Gibson (Use this!).html 92B
11.3 GWX Control Panel.html 100B
11.3 OSX-Sandbox--Seatbelt--Profiles.html 119B
11.4 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html 116B
11.4 Sandbox Man page.html 165B
11.5 Firefox profile.html 132B
11.5 httpsthehackernews.com201802cryptojacking-malware.html.html 121B
11.6 Apple Sandbox Guide.html 139B
11.6 httpscoinhive.com.html 82B
11.7 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html 122B
11.7 SuperDuper.html 127B
11.8 How to run your Applications in a Mac OS X sandbox to enhance security.html 176B
11.8 httpsgithub.comhoshsadiqadblock-nocoin-list.html 110B
11. Chrome - Browser and extension updates.mp4 3.57MB
11. Chrome - Browser and extension updates.vtt 1.75KB
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 16.19MB
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.vtt 9.64KB
11. End-to-End Encryption (E2EE).mp4 8.18MB
11. End-to-End Encryption (E2EE).vtt 2.00KB
11. Mac - Sandboxes and Application Isolation.mp4 23.80MB
11. Mac - Sandboxes and Application Isolation.vtt 7.54KB
11. The Zero Trust Model.mp4 10.27MB
11. The Zero Trust Model.vtt 4.27KB
11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4 105.53MB
11. Windows 7, 8 and 8.1 - Privacy & Tracking.vtt 7.71KB
12.1 Fix Mac OS X.html 84B
12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html 121B
12.1 OpenPuff Manual.html 107B
12.1 Wikipedia - Hypervisor.html 101B
12.2 httpsgithub.comfix-macosxnet-monitor.html 102B
12.2 List of Steg Tools.html 105B
12.2 Wikipedia - Kernel-based Virtual Machine.html 119B
12.3 httpsgithub.comkarek314macOS-home-call-drop.html 109B
12.3 httpwww.spammimic.com.html 85B
12.3 Virt Manager.html 86B
12.4 httpsgithub.comfix-macosxyosemite-phone-home.html 110B
12.4 OpenPuff.html 116B
12.4 OpenVZ.html 90B
12.5 KVM Debian Jessie.html 98B
12.5 Washingtonpost - How apples os x yosemite tracks-you.html 213B
12.6 Turnkey Linux - Openvpn.html 97B
12.7 Wikipedia - Comparison of platform virtualization software.html 137B
12. Darknets, Dark Markets and Exploit kits.mp4 32.43MB
12. Darknets, Dark Markets and Exploit kits.vtt 8.24KB
12. IE and Edge - Browser and extention updates.mp4 8.66MB
12. IE and Edge - Browser and extention updates.vtt 1.02KB
12. Mac - Privacy & Tracking.mp4 57.97MB
12. Mac - Privacy & Tracking.vtt 5.11KB
12. Steganography.mp4 104.31MB
12. Steganography.vtt 8.60KB
12. Virtual Machines.mp4 44.44MB
12. Virtual Machines.vtt 17.10KB
13.1 Exploiting dram rowhammer (Could be used on VMs in the future).html 152B
13.1 httpdistrowatch.com.html 84B
13.1 Security Pitfalls.html 135B
13.2 Example VMware security bug.html 123B
13.2 httpswww.openbsd.org.html 85B
13.3 httpswww.debian.org.html 84B
13.3 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html 110B
13.4 httpsen.wikipedia.orgwikiTiming_channel.html 105B
13.4 httpswww.archlinux.org.html 87B
13.5 httpsen.wikipedia.orgwikiCovert_channel.html 105B
13.6 httpsen.wikipedia.orgwikiX86_virtualization.html 109B
13.7 Venom.html 90B
13.8 A look at malware with VM detection.html 161B
13. Auto updates - The Impact to privacy and anonymity.mp4 4.30MB
13. Auto updates - The Impact to privacy and anonymity.vtt 2.67KB
13. Governments, spies and secret stuff part I.mp4 27.02MB
13. Governments, spies and secret stuff part I.vtt 5.91KB
13. How Security and Encryption is Really Attacked.mp4 17.37MB
13. How Security and Encryption is Really Attacked.vtt 3.09KB
13. Linux and Unix “like” Operating systems.mp4 46.23MB
13. Linux and Unix “like” Operating systems.vtt 3.79KB
13. Virtual Machine Weaknesses.mp4 22.74MB
13. Virtual Machine Weaknesses.vtt 14.92KB
14.1 Convert VM to ISO.html 109B
14.1 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html 104B
14.1 Ubuntu - httpswww.ubuntu.com.html 84B
14.2 httpsnsa.gov1.infodninsa-ant-catalog.html 103B
14.2 Manjaro - httpsmanjaro.org.html 81B
14.3 httpstheintercept.com.html 86B
14.3 Linux Mint - httpslinuxmint.com.html 83B
14.4 httpscryptome.org201401nsa-codenames.htm.html 107B
14.5 httpswikileaks.org-Leaks-.html.html 95B
14.6 httpwww.nsaplayset.org.html 87B
14. General Use Operating Systems (Windows, MacOS and Linux).mp4 46.91MB
14. General Use Operating Systems (Windows, MacOS and Linux).vtt 5.01KB
14. Governments, spies and secret stuff part II.mp4 30.23MB
14. Governments, spies and secret stuff part II.vtt 10.72KB
14. Virtual Machine Hardening.mp4 36.96MB
14. Virtual Machine Hardening.vtt 13.06KB
15.10 Matt Blaze Speaking to a US congressional committee.html 107B
15.11 httpwww.crypto.compapersgovernmentreform-blaze2015.pdf.html 120B
15.12 A Worldwide Survey of E ncryption Products - xls.html 154B
15.13 UK data communications bill.html 121B
15.1 Clipper chip.html 192B
15.1 OpenBSD - httpswww.openbsd.org.html 85B
15.1 Whonix Features.html 97B
15.2 Debian - httpswww.debian.org.html 84B
15.2 WhatsApp was Banned for 48 Hours in Brazil.html 112B
15.2 Whonix and virtualbox.html 99B
15.3 Archlinux - httpswww.archlinux.org.html 87B
15.3 httpswww.whonix.org.html 84B
15.4 The Case against Regulating Encryption Technology.html 112B
15.4 Whonix Stream Isolation.html 105B
15.5 ARM - Anonymizing relay monitor.html 108B
15.5 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html 137B
15.6 A Worldwide Survey of Encryption Products - pdf.html 153B
15.6 If setting up your own workstations - MUST READ.html 112B
15.7 How to implement physical isolation.html 131B
15.7 Kazakhstans new encryption law.html 185B
15.8 Whonix Check.html 100B
15.9 Whonix VM snapshots.html 116B
15. Regulating encryption, mandating insecurity & legalizing spying.mp4 42.74MB
15. Regulating encryption, mandating insecurity & legalizing spying.vtt 15.78KB
15. Whonix OS - Anonymous Operating system.mp4 88.65MB
15. Whonix OS - Anonymous Operating system.vtt 27.52KB
16.1 Examples of backdoors.html 123B
16.1 Security-Enhanced Linux (SELinux) - httpsgithub.comSELinuxProject.html 94B
16.1 Whonix - Warnings.html 96B
16.2 Subgraph OS - httpssubgraph.comsgos.html 87B
16.2 Whonix's lack of an Amnesic feature.html 190B
16.3 Hardened Gentoo Linux - httpswiki.gentoo.orgwikiProjectHardened.html 106B
16.3 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html 133B
16.4 httpsreproducible-builds.org.html 93B
16.4 PureOS - httpswww.pureos.net.html 84B
16.5 Apple removes malware infected apps from the app store.html 165B
16.5 Astra Linux - httpastralinux.ru.html 82B
16.6 Apple backdoor order.html 112B
16.6 Trisquel OS - httpstrisquel.info.html 83B
16.7 Formal methods.html 105B
16.7 Qubes OS - httpswww.qubes-os.org.html 86B
16.8 Video on how to build your own software reproducibly.html 142B
16. Trust & Backdoors.mp4 24.48MB
16. Trust & Backdoors.vtt 11.01KB
16. Whonix OS - Weaknesses.mp4 15.78MB
16. Whonix OS - Weaknesses.vtt 6.24KB
17.10 Video Tour of Qubes.html 91B
17.1 Debian template(s).html 107B
17.1 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html 129B
17.1 Qubes OS - httpswww.qubes-os.org.html 86B
17.2 Hardware Compatibility List (HCL).html 90B
17.2 Tails OS - httpstails.boum.org.html 84B
17.3 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html 132B
17.3 Qubes docs.html 90B
17.3 Whonix - httpswww.whonix.org.html 84B
17.4 Librem 13 laptop.html 105B
17.5 Qubes Download.html 96B
17.6 Whonix templates.html 105B
17.7 Windows templates.html 108B
17.8 Disposable VMs (DispVMs).html 97B
17.9 Split GPG.html 100B
17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4 21.55MB
17. Anonymity Focused Operating Systems (Tails and Whonix OS).vtt 3.53KB
17. Censorship.mp4 6.49MB
17. Censorship.vtt 2.73KB
17. Qubes OS.mp4 78.73MB
17. Qubes OS.vtt 26.33KB
18.1 httpwww.stationx.netalerts.html 91B
18.1 Kali Linux - httpswww.kali.org.html 82B
18.1 Partitioning my digital life into security domains.html 145B
18.2 BackBox Linux - httpsbackbox.org.html 81B
18.3 Pentoo - httpswww.pentoo.ch.html 83B
18.4 Parrot GNULinux - httpswww.parrotsec.org.html 87B
18.5 BlackArch Linux - httpsblackarch.org.html 83B
18. Cyber Threat Intelligence – Stay Informed.mp4 2.62MB
18. Cyber Threat Intelligence – Stay Informed.vtt 1.07KB
18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4 13.38MB
18. Penetration Testing and Ethical Hacking Focused Operating Systems.vtt 1.15KB
18. Security Domains, Isolation and Compartmentalization.mp4 14.97MB
18. Security Domains, Isolation and Compartmentalization.vtt 6.55KB
19.1 Android - httpswww.android.com.html 85B
19.2 MicroG - httpsmicrog.org.html 80B
19.3 iOS - httpsdeveloper.apple.comios.html 93B
19.4 OmniROM - httpswww.omnirom.org.html 85B
19.5 LineageOS - httpslineageos.org.html 83B
19.6 PureOS Librem 5 - httpspuri.smshoplibrem-5.html 91B
19.7 Replicant - Httpswww.replicant.us.html 86B
2.10 Vmware Network Adapter Settings.html 191B
2.11 httpsen.wikipedia.orgwikiHypervisor.html 101B
2.1 httpstosdr.org.html 79B
2.1 httpswww.stationx.netcanarytokens.html 99B
2.1 httpswww.stationx.netcertificate-request.html 106B
2.1 httpwww.osboxes.orgvmware-images.html 98B
2.2 httpswww.eff.orgwho-has-your-back-government-data-requests-2015.html 128B
2.2 Windows VMs here.html 124B
2.3 httpsen.wikipedia.orgwikiComparison_of_platform_virtualization_software.html 137B
2.4 httpsgnu.iosocialtry.html 87B
2.4 httpwww.osboxes.orgguide#!.html 92B
2.5 httpwww.osboxes.orgvirtualbox-images.html 102B
2.5 Twitter Privacy Settings.html 120B
2.6 httpvirtual-machine.org.html 88B
2.6 The complete guide to facebook privacy settings.html 136B
2.7 httpsdiasporafoundation.org.html 92B
2.7 httpsmarketplace.vmware.com.html 92B
2.8 httpfriendica.com.html 82B
2.8 httpvirtualboxes.orgimages.html 92B
2.9 List of Personally Identifiable Information (PII).html 134B
2.9 Virtualbox Network Adapter Settings.html 104B
2. Certificate Of Completion for CPEs.mp4 12.88MB
2. Certificate Of Completion for CPEs.vtt 1.12KB
2. Goals and Learning Objectives.mp4 6.99MB
2. Goals and Learning Objectives.vtt 905B
2. Information Disclosure and Identity Strategies for Social Media.mp4 83.81MB
2. Information Disclosure and Identity Strategies for Social Media.vtt 22.48KB
2. Introduction to Isolation and Compartmentalization.mp4 5.66MB
2. Introduction to Isolation and Compartmentalization.vtt 3.04KB
2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 113.36MB
2. Introduction to Setting up a Testing Environment Using Virtual Machines.vtt 10.77KB
2. Security Domains.mp4 21.84MB
2. Security Domains.vtt 15.14KB
2. Security Features and Functionality.mp4 57.89MB
2. Security Features and Functionality.vtt 6.88KB
2. Security Quick Win!.mp4 43.20MB
2. Security Quick Win!.vtt 15.27KB
2. Symmetric Encryption.mp4 32.30MB
2. Symmetric Encryption.vtt 9.99KB
2. The Importance of Patching.mp4 43.71MB
2. The Importance of Patching.vtt 5.84KB
2. Why You Need Security – The Value Of A Hack.mp4 28.93MB
2. Why You Need Security – The Value Of A Hack.vtt 5.90KB
2. Windows 7 - Not using admin.mp4 10.99MB
2. Windows 7 - Not using admin.vtt 4.98KB
20.1 Debian Live CDDVD.html 92B
20.2 Download Debian.html 92B
20.3 Free Debian Books and Guides.html 93B
20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 57.77MB
20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.vtt 5.78KB
3.10 httpfreemail.ms.html 80B
3.11 httpwww.dispostable.com.html 88B
3.12 httpsmailinator.com.html 84B
3.13 httpbugmenot.com.html 81B
3.14 httpsanonbox.net.html 81B
3.15 Top 10 sites receive sms online without phone.html 135B
3.16 httpwww.tempinbox.com.html 85B
3.17 httpwww.mailexpire.com.html 87B
3.1 httpsresearch.google.compubspub43963.html.html 107B
3.1 httpwww.migmail.net.html 84B
3.1 httpwww.vmware.comproductsworkstationcompare.html.html 116B
3.1 Mac OS X - Macdaddyx.html 109B
3.1 Top 50 products vs security bugs.html 114B
3.2 httpswww.trash-mail.comen.html 91B
3.2 httpwww.vmware.comproductsplayerfaqsfaqs.html.html 113B
3.2 Report - Buying Into the Bias Why Vulnerability Statistics Suck.html 168B
3.2 Windows - Tmac.html 89B
3.3 Example SMS recieve online site.html 96B
3.3 Mac OS X - Wifispoof.html 83B
3.4 Diagram of Mac.html 131B
3.4 httpcrapmail.dken.html 83B
3.5 httpswww.guerrillamail.com.html 92B
3.5 Mac OS X - How to change the mac address.html 141B
3.6 http10minutemail.com10MinuteMailindex.html.html 108B
3.6 Linux - How to use macchanger.html 132B
3.7 httpdontmail.net.html 81B
3.8 httpgetairmail.com.html 83B
3.9 httpwww.mytrashmail.com.html 88B
3. Asymmetric Encryption.mp4 72.31MB
3. Asymmetric Encryption.vtt 11.46KB
3. Goals and Learning Objectives - Volume 1.mp4 16.11MB
3. Goals and Learning Objectives - Volume 1.vtt 2.55KB
3. Identify Verification and Registration.mp4 23.40MB
3. Identify Verification and Registration.vtt 8.44KB
3. Physical and Hardware Isolation - How to change the Mac Address.mp4 25.57MB
3. Physical and Hardware Isolation - How to change the Mac Address.vtt 9.91KB
3. Protect What You Value.mp4 23.67MB
3. Protect What You Value.vtt 4.76KB
3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4 48.08MB
3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).vtt 21.59KB
3. Security Bugs and Vulnerabilities.mp4 83.89MB
3. Security Bugs and Vulnerabilities.vtt 6.17KB
3. The Top 3 Things You Need To Stay Safe Online.mp4 2.51MB
3. The Top 3 Things You Need To Stay Safe Online.vtt 1.45KB
3. Vmware.mp4 110.48MB
3. Vmware.vtt 10.66KB
3. Windows 7 - Auto Update.mp4 4.94MB
3. Windows 7 - Auto Update.vtt 1.63KB
3. Windows 8 and 8.1 - Not using admin.mp4 18.24MB
3. Windows 8 and 8.1 - Not using admin.vtt 5.58KB
4.1 Example hashes.html 104B
4.1 Exploit Kit Landscape Map.html 99B
4.1 httpswww.virtualbox.org.html 88B
4.1 httpwww.urlvoid.com.html 84B
4.1 Mac OS X - Installing dmidecode with brew.html 119B
4.1 OS usage share.html 125B
4.2 CVE details.html 88B
4.2 httpwww.google.com.stationx.net.html 95B
4.2 Windows - CPU Z.html 103B
4.3 httpswww.exploit-db.comsearch.html 95B
4.3 Linux and Mac OS X - dmidecode.html 93B
4.4 Windows - dmidecode.html 115B
4.5 httpswww.nitrokey.com.html 87B
4.6 Mac OS X - Mac Cupid.html 120B
4.7 httpswww.yubico.com.html 84B
4.8 Linux - i-nex.html 88B
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4 23.29MB
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.vtt 12.95KB
4. Hash Functions.mp4 89.23MB
4. Hash Functions.vtt 6.30KB
4. Physical and Hardware Isolation - Hardware Serials.mp4 50.25MB
4. Physical and Hardware Isolation - Hardware Serials.vtt 15.96KB
4. Sample from Vol 2 - Password cracking part 2.mp4 24.15MB
4. Sample from Vol 2 - Password cracking part 2.vtt 11.74KB
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 38.11MB
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.vtt 10.62KB
4. Target Audience.mp4 7.33MB
4. Target Audience.vtt 3.23KB
4. Usage Share.mp4 34.28MB
4. Usage Share.vtt 5.53KB
4. Virtual box.mp4 144.15MB
4. Virtual box.vtt 10.82KB
4. What is Privacy, Anonymity and Pseudonymity.mp4 11.87MB
4. What is Privacy, Anonymity and Pseudonymity.vtt 5.07KB
4. Windows 10 - Not using admin.mp4 14.15MB
4. Windows 10 - Not using admin.vtt 4.58KB
4. Windows 8 & 8.1 - Auto Update.mp4 6.54MB
4. Windows 8 & 8.1 - Auto Update.vtt 1.84KB
5.1 httpswww.symantec.comenukcode-signing.html 107B
5.1 httpswww.virustotal.comendocumentationemail-submissions.html 123B
5.1 Portable Apps.html 85B
5.1 The Cyber Security Landscape Diagram.jpg.jpg 777.15KB
5.2 Authentic8.html 97B
5.2 How to Get Email Headers.html 111B
5.2 Kali on Microsoft App Store as an official WSL.html 123B
5.2 Microsoft Privacy Statement.html 114B
5.2 Windows 10 Device Guard using Digital Signatures.html 174B
5.3 httpswww.parsemail.org.html 87B
5.3 Kali Arm hardware.html 118B
5.3 Maxthon.html 84B
5.3 Microsoft Service Agreement.html 123B
5.4 Aegis Secure Key - USB 2.0 Flash Drive.html 108B
5.4 Cortana privacy faq.html 126B
5.4 httpswhois.domaintools.combbc.co.uk.html 100B
5.4 Kali AWS appliance.html 109B
5.5 httpswhois.domaintools.comblob.com.html 99B
5.5 Kali images for Virtualbox or VMware.html 150B
5.5 Spikes.html 91B
5.6 Pen Drive Apps.html 89B
5.7 Spoons.net.html 88B
5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4 49.31MB
5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.vtt 17.75KB
5. Digital Signatures.mp4 42.74MB
5. Digital Signatures.vtt 5.08KB
5. Hackers, crackers and cyber criminals.mp4 7.70MB
5. Hackers, crackers and cyber criminals.vtt 2.99KB
5. Kali Linux 2018.mp4 59.62MB
5. Kali Linux 2018.vtt 4.77KB
5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4 31.75MB
5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.vtt 21.23KB
5. Security, Vulnerabilities, Threats and Adversaries.mp4 11.24MB
5. Security, Vulnerabilities, Threats and Adversaries.vtt 4.65KB
5. Study Recommendations.mp4 70.67MB
5. Study Recommendations.vtt 6.48KB
5. Virtual Isolation.mp4 57.31MB
5. Virtual Isolation.vtt 12.84KB
5. Windows 10 - Auto Update.mp4 4.93MB
5. Windows 10 - Auto Update.vtt 1.73KB
5. Windows 10 - Privacy & Tracking.mp4 79.95MB
5. Windows 10 - Privacy & Tracking.vtt 6.96KB
6.1 Dual Booting explained.html 177B
6.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html 117B
6.1 httpswww.stationx.netsabsa.html 92B
6.1 httpwww.actionfraud.police.uktypes_of_fraud.html 108B
6.1 SophosLabs 2018 Malware Forecast.html 162B
6.1 Weakdh Cipher Suite Recommendations.html 93B
6.1 Windows 10 Ditches Patch Tuesday for Security's Sake.html 178B
6.2 Chef Jamie Oliver’s website hacked for the third time.html 106B
6.2 httpswww.iso.orgstandard56742.html.html 100B
6.2 httpwww.scambusters.org.html 88B
6.2 Microsoft Security Bulletins.html 115B
6.2 Mozilla Cipher Suite Recommendations.html 110B
6.3 httpswww.securityforum.org.html 91B
6.3 httpwww.consumerfraudreporting.orgcredit_freeze_summary.php.html 124B
6.3 Malware stats.html 107B
6.3 Patch Tuesday may be dead, but Microsoft's not confessing to the crime.html 197B
6.3 Wikipedia Transport Layer Security (TLS) page.html 115B
6.4 National vulnerability database.html 85B
6.4 Report - Spotlight perils of malvertisements.html 142B
6.4 Steve Gibson's Cipher Suite Recommendations.html 117B
6.5 7 most common RATs.html 149B
6.5 Common Vulnerabilities and Exposures.html 85B
6. Asset Selection.mp4 7.68MB
6. Asset Selection.vtt 3.55KB
6. Course updates.mp4 4.39MB
6. Course updates.vtt 787B
6. Dual Boot.mp4 7.92MB
6. Dual Boot.vtt 4.42KB
6. Malware, viruses, rootkits and RATs.mp4 12.15MB
6. Malware, viruses, rootkits and RATs.vtt 7.27KB
6. Sample from Vol 4 - Email clients, protocols and authentication.mp4 38.19MB
6. Sample from Vol 4 - Email clients, protocols and authentication.vtt 19.41KB
6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 160.85MB
6. Secure Sockets Layer (SSL) and Transport layer security (TLS).vtt 13.65KB
6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp4 14.52MB
6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).vtt 8.29KB
6. Windows 10 - Disable tracking automatically.mp4 67.89MB
6. Windows 10 - Disable tracking automatically.vtt 5.67KB
6. Windows - Criticality and Patch Tuesday.mp4 41.81MB
6. Windows - Criticality and Patch Tuesday.vtt 4.09KB
6 Simple Memory Techniques.html 98B
7.1 Chromium sandbox design.html 121B
7.1 Flexera Personal Software Inspector - Previously Secunia PSI.html 174B
7.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html 117B
7.1 SSL Strip tool By Moxie Marlinspike.html 107B
7.2 Mozilla Sandbox design.html 102B
7.2 sniffdet - Remote Sniffer Detection ToolLibrary.html 93B
7.3 WIFI Pineapple.html 91B
7.4 Arpwatch Tool to Monitor Ethernet Activity in Linux.html 119B
7.4 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html 135B
7.5 Intro to Sniffers.html 127B
7.6 Cain & Abel.html 89B
7. Built-in Sandboxes and Application Isolation.mp4 10.41MB
7. Built-in Sandboxes and Application Isolation.vtt 4.43KB
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 10.78MB
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.vtt 5.33KB
7. SSL Stripping.mp4 114.52MB
7. SSL Stripping.vtt 13.34KB
7. Threat Modeling and Risk Assessments.mp4 18.03MB
7. Threat Modeling and Risk Assessments.vtt 9.18KB
7. Windows 10 - Tool Disable Windows 10 Tracking.mp4 98.43MB
7. Windows 10 - Tool Disable Windows 10 Tracking.vtt 7.63KB
7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4 19.35MB
7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.vtt 10.96KB
8.1 Deepfreeze Cloud Browser and Desktop.html 129B
8.1 Homograph attack using internationalized domain name.html 134B
8.1 How to disable cortana-on Windows 10.html 147B
8.1 Server Name Indication (SNI) Wiki.html 113B
8.1 Software distributions based on Debian.html 105B
8.2 BufferZone.html 112B
8.2 Cortana privacy faq.html 126B
8.2 Debian Security Page.html 93B
8.2 XSS example vulnerability.html 136B
8.3 Automatic Security Updates.html 119B
8.3 Comodo.html 110B
8.3 How to Disable Cortana in Windows 10’s Anniversary Update.html 130B
8.3 Live phishing links.html 87B
8.4 Shadowdefender.html 91B
8.5 f-sandbox.html 92B
8.6 Returnil.html 118B
8.7 Deepfreeze Standard.html 121B
8. HTTPS (HTTP Secure).mp4 81.90MB
8. HTTPS (HTTP Secure).vtt 6.98KB
8. Learn How to Use Linux, Linux Mint Cinnamon 20 Bootable 8GB USB Flash Drive.html 84B
8. Linux - Debian - Patching.mp4 38.50MB
8. Linux - Debian - Patching.vtt 15.21KB
8. Security vs Privacy vs Anonymity - Can we have it all.mp4 5.43MB
8. Security vs Privacy vs Anonymity - Can we have it all.vtt 2.52KB
8. What is Phishing, Vishing and SMShing.mp4 25.98MB
8. What is Phishing, Vishing and SMShing.vtt 15.35KB
8. Windows 10 – Cortana.mp4 41.02MB
8. Windows 10 – Cortana.vtt 3.80KB
8. Windows - Sandboxes and Application Isolation.mp4 26.36MB
8. Windows - Sandboxes and Application Isolation.vtt 8.78KB
9.1 Complete guide windows 10 privacy settings.html 134B
9.1 httpbrew.sh.html 76B
9.1 httpswww.stationx.netsabsa.html 92B
9.1 Sandboxie How it Works.html 106B
9.1 Spam stats.html 104B
9.2 httpsen.wikipedia.orgwikiAuthentication.html 105B
9.2 igeekblogs - How to enable updates.html 134B
9.2 Introduction and quick guide sandboxie.html 143B
9.2 SmartScreen Filter FAQ.html 145B
9.2 Spam example.html 142B
9.3 Apple security updates.html 101B
9.3 httpsen.wikipedia.orgwikiParkerian_Hexad.html 106B
9.3 Sandboxie forum.html 96B
9.4 httpwhatis.techtarget.comdefinitionConfidentiality-integrity-and-availability-CIA.html 147B
9.4 Mac Update.html 86B
9.4 Sandboxie guide.html 118B
9.5 httpsen.wikipedia.orgwikiNon-repudiation.html 106B
9.6 httpsen.wikipedia.orgwikiAuthorization.html 104B
9. Confidentiality, Integrity and Availability - (Security Attributes).mp4 19.34MB
9. Confidentiality, Integrity and Availability - (Security Attributes).vtt 10.37KB
9. Digital Certificates.mp4 81.96MB
9. Digital Certificates.vtt 6.13KB
9. Mac - Patching.mp4 55.58MB
9. Mac - Patching.vtt 9.23KB
9. Spamming & Doxing.mp4 4.79MB
9. Spamming & Doxing.vtt 3.51KB
9. Windows 10 – Privacy Settings.mp4 86.46MB
9. Windows 10 – Privacy Settings.vtt 9.65KB
9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4 70.11MB
9. Windows - Sandboxes and Application Isolation - Sandboxie.vtt 15.22KB
Defense against the Black Arts.html 84B
Defense against the Black Arts.html 84B
hackers bags.html 84B
Python For Beginners.html 84B
You Can Boost Brain Power.html 114B
You Can Boost Brain Power.html 114B
Distribution statistics by country
Portugal (PT) 1
Total 1
IP List List of IP addresses which were distributed this torrent