Общая информация
Название [Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course Hackers Exposed!
Тип
Размер 4.26Гб
Файлы в торренте
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать эти файлы или скачать torrent-файл.
[Tutorialsplanet.NET].url 128б
1.1 Link to The Complete Cyber Security Course - Volume II - Network security + discount coupon studentdiscount25.html 136б
1.1 Nathan's Twitter #GotoNathan.html 91б
1.2 Nathan's Cyber Security Blog.html 99б
1. BONUS DISCOUNT COUPONS .html 4.95Кб
1. Congratulations.mp4 5.29Мб
1. Congratulations.vtt 1.43Кб
1. Goals and Learning Objectives.mp4 1.43Мб
1. Goals and Learning Objectives.mp4 2.30Мб
1. Goals and Learning Objectives.mp4 2.90Мб
1. Goals and Learning Objectives.mp4 1.63Мб
1. Goals and Learning Objectives.mp4 1.84Мб
1. Goals and Learning Objectives.mp4 2.43Мб
1. Goals and Learning Objectives.mp4 1.66Мб
1. Goals and Learning Objectives.mp4 1.73Мб
1. Goals and Learning Objectives.vtt 463б
1. Goals and Learning Objectives.vtt 758б
1. Goals and Learning Objectives.vtt 1.09Кб
1. Goals and Learning Objectives.vtt 592б
1. Goals and Learning Objectives.vtt 704б
1. Goals and Learning Objectives.vtt 852б
1. Goals and Learning Objectives.vtt 584б
1. Goals and Learning Objectives.vtt 639б
1. Goals and Learning Objectives - Removing Privilege.mp4 13.59Мб
1. Goals and Learning Objectives - Removing Privilege.vtt 3.72Кб
1. Theory and Practical.mp4 2.25Мб
1. Theory and Practical.vtt 1.35Кб
1. Welcome and Introduction to the Instructor!.mp4 19.90Мб
1. Welcome and Introduction to the Instructor!.vtt 1.88Кб
10.1 Apparmor.html 105б
10.1 CA Ecosystem.html 105б
10.1 httpsblogs.windows.comwindowsexperience20160510announcing-windows-10-insider-preview-build-14342#31Zq2yELkheC9HyV.99.html 186б
10.1 Top 10 scams.html 127б
10.2 CA example mistake.html 180б
10.2 httpwww.actionfraud.police.uktypes_of_fraud.html 108б
10.2 Script Sandfox.html 118б
10.3 Firejail.html 92б
10.3 httpwww.consumerfraudreporting.org.html 98б
10.3 SSL Sniff.html 107б
10.4 Cert Fingerprints.html 97б
10.4 Linux Sandbox.html 96б
10.5 Certificate patrol.html 127б
10.5 Trusted BSD.html 87б
10. Certificate Authorities and HTTPS.mp4 199.31Мб
10. Certificate Authorities and HTTPS.vtt 16.46Кб
10. Defense In Depth.mp4 3.00Мб
10. Defense In Depth.vtt 1.59Кб
10. Firefox - Browser and extension updates.mp4 34.02Мб
10. Firefox - Browser and extension updates.vtt 5.96Кб
10. Linux - Sandboxes and Application Isolation.mp4 13.86Мб
10. Linux - Sandboxes and Application Isolation.vtt 3.58Кб
10. Social engineering - Scams, cons, tricks and fraud.mp4 11.92Мб
10. Social engineering - Scams, cons, tricks and fraud.vtt 5.94Кб
10. Windows 10 - WiFi Sense.mp4 59.76Мб
10. Windows 10 - WiFi Sense.vtt 4.85Кб
11.10 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html 116б
11.1 Cryptocurrency Mining Malware Infected Over Half-Million PCs Using an NSA Exploit.html 129б
11.1 GWX Control Panel.html 100б
11.1 Sandbox Man page.html 165б
11.2 Apple Sandbox Guide.html 139б
11.2 httpstorrentfreak.compirate-bay-is-mining-cryptocurrency-again-no-opt-out-171011.html 146б
11.2 httpwww.zdnet.comarticlehow-to-block-windows-10-upgrades-on-your-business-network-and-at-home-too.html 164б
11.3 httpsgithub.comhoshsadiqadblock-nocoin-list.html 110б
11.3 Microsoft - How to manage Windows 10 notification and upgrade options.html 107б
11.3 OSX-Sandbox--Seatbelt--Profiles.html 119б
11.4 httpsthehackernews.com201802cryptojacking-malware.html.html 121б
11.4 Mac OS X - App Sandbox.html 193б
11.4 Never 10 by Steve Gibson (Use this!).html 92б
11.5 httpbgr.com20180213android-malware-mining-cryptocurrency-monero-xmr.html 136б
11.5 SuperDuper.html 127б
11.6 Firefox profile.html 132б
11.6 httpsaddons.mozilla.orgen-USfirefoxaddonublock-origin.html 122б
11.7 Buckle Up.html 97б
11.7 httpswww.engadget.com20180213attackers-telegram-deliver-cryptocurrency-mining-malware.html 154б
11.8 How to run your Applications in a Mac OS X sandbox to enhance security.html 176б
11.8 httpsarstechnica.cominformation-technology201801now-even-youtube-serves-ads-with-cpu-draining-cryptocurrency-miners.html 184б
11.9 httpscoinhive.com.html 82б
11. Chrome - Browser and extension updates.mp4 3.57Мб
11. Chrome - Browser and extension updates.vtt 1.75Кб
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.mp4 16.19Мб
11. CPU Hijackers - Crypto Mining Malware and Cryptojackers.vtt 9.64Кб
11. End-to-End Encryption (E2EE).mp4 8.19Мб
11. End-to-End Encryption (E2EE).vtt 2.00Кб
11. Mac - Sandboxes and Application Isolation.mp4 23.80Мб
11. Mac - Sandboxes and Application Isolation.vtt 7.54Кб
11. The Zero Trust Model.mp4 10.27Мб
11. The Zero Trust Model.vtt 4.27Кб
11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4 105.52Мб
11. Windows 7, 8 and 8.1 - Privacy & Tracking.vtt 7.71Кб
12.1 httpsgithub.comfix-macosxyosemite-phone-home.html 110б
12.1 httpswww.deepdotweb.comdark-net-market-comparison-chart.html 121б
12.1 OpenPuff Manual.html 107б
12.1 Virt Manager.html 86б
12.2 httpsgithub.comkarek314macOS-home-call-drop.html 109б
12.2 OpenPuff.html 116б
12.2 Wikipedia - Hypervisor.html 101б
12.3 KVM Debian Jessie.html 98б
12.3 List of Steg Tools.html 105б
12.3 Washingtonpost - How apples os x yosemite tracks-you.html 213б
12.4 Fix Mac OS X.html 84б
12.4 httpwww.spammimic.com.html 85б
12.4 Wikipedia - Kernel-based Virtual Machine.html 119б
12.5 httpsgithub.comfix-macosxnet-monitor.html 102б
12.5 Wikipedia - Comparison of platform virtualization software.html 137б
12.6 OpenVZ.html 90б
12.7 Turnkey Linux - Openvpn.html 97б
12. Darknets, Dark Markets and Exploit kits.mp4 32.43Мб
12. Darknets, Dark Markets and Exploit kits.vtt 8.24Кб
12. IE and Edge - Browser and extention updates.mp4 5.64Мб
12. IE and Edge - Browser and extention updates.vtt 1.02Кб
12. Mac - Privacy & Tracking.mp4 57.97Мб
12. Mac - Privacy & Tracking.vtt 5.11Кб
12. Steganography.mp4 104.31Мб
12. Steganography.vtt 8.60Кб
12. Virtual Machines.mp4 44.44Мб
12. Virtual Machines.vtt 17.10Кб
13.1 Example VMware security bug.html 123б
13.1 httpswww.debian.org.html 84б
13.1 Security Pitfalls.html 135б
13.2 httpdistrowatch.com.html 84б
13.2 Venom.html 90б
13.3 A look at malware with VM detection.html 161б
13.3 httpswww.openbsd.org.html 85б
13.4 httpsen.wikipedia.orgwikiX86_virtualization.html 109б
13.4 httpswww.archlinux.org.html 87б
13.5 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html 110б
13.6 Exploiting dram rowhammer (Could be used on VMs in the future).html 152б
13.7 httpsen.wikipedia.orgwikiCovert_channel.html 105б
13.8 httpsen.wikipedia.orgwikiTiming_channel.html 105б
13. Auto updates - The Impact to privacy and anonymity.mp4 4.30Мб
13. Auto updates - The Impact to privacy and anonymity.vtt 2.67Кб
13. Governments, spies and secret stuff part I.mp4 27.03Мб
13. Governments, spies and secret stuff part I.vtt 5.91Кб
13. How Security and Encryption is Really Attacked.mp4 17.36Мб
13. How Security and Encryption is Really Attacked.vtt 3.09Кб
13. Linux and Unix “like” Operating systems.mp4 46.23Мб
13. Linux and Unix “like” Operating systems.vtt 3.79Кб
13. Virtual Machine Weaknesses.mp4 22.74Мб
13. Virtual Machine Weaknesses.vtt 14.92Кб
14.1 Convert VM to ISO.html 109б
14.1 httpwww.nsaplayset.org.html 87б
14.1 Manjaro - httpsmanjaro.org.html 81б
14.2 httpsnsa.gov1.infodninsa-ant-catalog.html 103б
14.2 Ubuntu - httpswww.ubuntu.com.html 84б
14.3 httpscryptome.org201401nsa-codenames.htm.html 107б
14.3 Linux Mint - httpslinuxmint.com.html 83б
14.4 httpswikileaks.org-Leaks-.html.html 95б
14.5 httpstheintercept.com.html 86б
14.6 Through a PRISM, Darkly - Everything we know about NSA spying [30c3].html 104б
14. General Use Operating Systems (Windows, MacOS and Linux).mp4 46.91Мб
14. General Use Operating Systems (Windows, MacOS and Linux).vtt 5.01Кб
14. Governments, spies and secret stuff part II.mp4 30.24Мб
14. Governments, spies and secret stuff part II.vtt 10.72Кб
14. Virtual Machine Hardening.mp4 36.97Мб
14. Virtual Machine Hardening.vtt 13.06Кб
15.10 A Worldwide Survey of Encryption Products - pdf.html 153б
15.11 httpswww.csoonline.comarticle3213033securitynsa-whistleblower-william-binney-presented-how-the-nsa-tracks-you-at-sha2017.html.html 193б
15.12 Report - Keys Under Doormats Mandating insecurity by requiring government access to all data and communication.html 150б
15.13 httpwww.crypto.compapersgovernmentreform-blaze2015.pdf.html 120б
15.1 Debian - httpswww.debian.org.html 84б
15.1 httpcis-india.orginternet-governancebloghow-india-regulates-encryption.html 137б
15.1 httpswww.whonix.org.html 84б
15.2 Archlinux - httpswww.archlinux.org.html 87б
15.2 Kazakhstans new encryption law.html 185б
15.2 Whonix Stream Isolation.html 105б
15.3 OpenBSD - httpswww.openbsd.org.html 85б
15.3 WhatsApp was Banned for 48 Hours in Brazil.html 112б
15.3 Whonix and virtualbox.html 99б
15.4 ARM - Anonymizing relay monitor.html 108б
15.4 UK data communications bill.html 121б
15.5 Clipper chip.html 192б
15.5 Whonix Check.html 100б
15.6 Matt Blaze Speaking to a US congressional committee.html 107б
15.6 Whonix Features.html 97б
15.7 How to implement physical isolation.html 131б
15.7 The Case against Regulating Encryption Technology.html 112б
15.8 A Worldwide Survey of E ncryption Products - xls.html 154б
15.8 Whonix VM snapshots.html 116б
15.9 httpwww.washingtonsblog.com201505nsa-admits-it-collects-too-much-info-to-stop-terror-attacks.html.html 164б
15.9 If setting up your own workstations - MUST READ.html 112б
15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).mp4 39.41Мб
15. General Use Operating Systems With a Security and Privacy Focus (Debian, Arch).vtt 6.06Кб
15. Regulating encryption, mandating insecurity & legalizing spying.mp4 42.74Мб
15. Regulating encryption, mandating insecurity & legalizing spying.vtt 15.78Кб
15. Whonix OS - Anonymous Operating system.mp4 88.65Мб
15. Whonix OS - Anonymous Operating system.vtt 27.52Кб
16.1 Apple removes malware infected apps from the app store.html 165б
16.1 Trisquel OS - httpstrisquel.info.html 83б
16.1 Whonix's lack of an Amnesic feature.html 190б
16.2 Astra Linux - httpastralinux.ru.html 82б
16.2 Examples of backdoors.html 123б
16.2 Whonix - Warnings.html 96б
16.3 Apple backdoor order.html 112б
16.3 Subgraph OS - httpssubgraph.comsgos.html 87б
16.4 Formal methods.html 105б
16.4 Qubes OS - httpswww.qubes-os.org.html 86б
16.5 Hardened Gentoo Linux - httpswiki.gentoo.orgwikiProjectHardened.html 106б
16.5 httpblog.cryptographyengineering.com201512on-juniper-backdoor.html.html 133б
16.6 Security-Enhanced Linux (SELinux) - httpsgithub.comSELinuxProject.html 94б
16.6 Video on how to build your own software reproducibly.html 142б
16.7 httpsblog.torproject.orgblogdeterministic-builds-part-one-cyberwar-and-global-compromise.html 154б
16.7 PureOS - httpswww.pureos.net.html 84б
16.8 httpsreproducible-builds.org.html 93б
16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).mp4 32.32Мб
16. Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS).vtt 3.49Кб
16. Trust & Backdoors.mp4 24.49Мб
16. Trust & Backdoors.vtt 11.01Кб
16. Whonix OS - Weaknesses.mp4 15.79Мб
16. Whonix OS - Weaknesses.vtt 6.24Кб
17.10 Hardware Compatibility List (HCL).html 90б
17.1 Disposable VMs (DispVMs).html 97б
17.1 httpswww.google.comtransparencyreportremovalsgovernmenthl=en.html 129б
17.1 Whonix - httpswww.whonix.org.html 84б
17.2 httpswww.google.comtransparencyreportremovalseuropeprivacyhl=en.html 132б
17.2 Qubes docs.html 90б
17.2 Qubes OS - httpswww.qubes-os.org.html 86б
17.3 Debian template(s).html 107б
17.3 httpsearchenginewatch.comsewnews2351154google-censorship-ruling-in-canada-has-worldwide-implications.html 168б
17.3 Tails OS - httpstails.boum.org.html 84б
17.4 Qubes Download.html 96б
17.5 Windows templates.html 108б
17.6 Whonix templates.html 105б
17.7 Split GPG.html 100б
17.8 Librem 13 laptop.html 105б
17.9 Video Tour of Qubes.html 91б
17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp4 21.54Мб
17. Anonymity Focused Operating Systems (Tails and Whonix OS).vtt 3.53Кб
17. Censorship.mp4 6.49Мб
17. Censorship.vtt 2.73Кб
17. Qubes OS.mp4 78.73Мб
17. Qubes OS.vtt 26.33Кб
18.1 httpwww.stationx.netalerts.html 91б
18.1 Kali Linux - httpswww.kali.org.html 82б
18.1 Partitioning my digital life into security domains.html 145б
18.2 BlackArch Linux - httpsblackarch.org.html 83б
18.3 BackBox Linux - httpsbackbox.org.html 81б
18.4 Parrot GNULinux - httpswww.parrotsec.org.html 87б
18.5 Pentoo - httpswww.pentoo.ch.html 83б
18. Cyber Threat Intelligence – Stay Informed.mp4 2.61Мб
18. Cyber Threat Intelligence – Stay Informed.vtt 1.07Кб
18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp4 13.38Мб
18. Penetration Testing and Ethical Hacking Focused Operating Systems.vtt 1.15Кб
18. Security Domains, Isolation and Compartmentalization.mp4 14.98Мб
18. Security Domains, Isolation and Compartmentalization.vtt 6.55Кб
19.1 iOS - httpsdeveloper.apple.comios.html 93б
19.2 LineageOS - httpslineageos.org.html 83б
19.3 Replicant - Httpswww.replicant.us.html 86б
19.4 PureOS Librem 5 - httpspuri.smshoplibrem-5.html 91б
19.5 Android - httpswww.android.com.html 85б
19.6 MicroG - httpsmicrog.org.html 80б
19.7 OmniROM - httpswww.omnirom.org.html 85б
19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).mp4 46.71Мб
19. Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish).vtt 2.99Кб
2.10 httpvirtualboxes.orgimages.html 92б
2.11 Windows VMs here.html 124б
2.1 httpkrebsonsecurity.com201306the-value-of-a-hacked-email-account.html 132б
2.1 httpsen.wikipedia.orgwikiHypervisor.html 101б
2.1 httpstosdr.org.html 79б
2.1 httpswww.stationx.netcanarytokens.html 99б
2.1 httpswww.stationx.netcertificate-request.html 106б
2.2 httpkrebsonsecurity.com201210the-scrap-value-of-a-hacked-pc-revisited.html 137б
2.2 httpsen.wikipedia.orgwikiComparison_of_platform_virtualization_software.html 137б
2.2 httpwww.telegraph.co.uktechnologysocial-media9780565Facebook-terms-and-conditions-why-you-dont-own-your-online-life.html.html 188б
2.3 httpswww.eff.orgwho-has-your-back-government-data-requests-2015.html 128б
2.3 httpwww.osboxes.orgvirtualbox-images.html 102б
2.4 httpwww.osboxes.orgguide#!.html 92б
2.4 The complete guide to facebook privacy settings.html 136б
2.5 httpfriendica.com.html 82б
2.5 httpwww.osboxes.orgvmware-images.html 98б
2.6 httpsdiasporafoundation.org.html 92б
2.6 httpvirtual-machine.org.html 88б
2.7 Twitter Privacy Settings.html 120б
2.7 Vmware Network Adapter Settings.html 191б
2.8 httpsgnu.iosocialtry.html 87б
2.8 Virtualbox Network Adapter Settings.html 104б
2.9 httpsmarketplace.vmware.com.html 92б
2.9 List of Personally Identifiable Information (PII).html 134б
2. Certificate Of Completion for CPEs.mp4 2.20Мб
2. Certificate Of Completion for CPEs.vtt 1.12Кб
2. Goals and Learning Objectives.mp4 2.70Мб
2. Goals and Learning Objectives.vtt 905б
2. Information Disclosure and Identity Strategies for Social Media.mp4 83.82Мб
2. Information Disclosure and Identity Strategies for Social Media.vtt 22.48Кб
2. Introduction to Isolation and Compartmentalization.mp4 5.67Мб
2. Introduction to Isolation and Compartmentalization.vtt 3.04Кб
2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 113.36Мб
2. Introduction to Setting up a Testing Environment Using Virtual Machines.vtt 10.77Кб
2. Security Domains.mp4 21.84Мб
2. Security Domains.vtt 15.14Кб
2. Security Features and Functionality.mp4 57.90Мб
2. Security Features and Functionality.vtt 6.88Кб
2. Security Quick Win!.mp4 43.20Мб
2. Security Quick Win!.vtt 15.27Кб
2. Symmetric Encryption.mp4 32.31Мб
2. Symmetric Encryption.vtt 9.99Кб
2. The Importance of Patching.mp4 11.66Мб
2. The Importance of Patching.vtt 5.84Кб
2. Why You Need Security – The Value Of A Hack.mp4 28.93Мб
2. Why You Need Security – The Value Of A Hack.vtt 5.90Кб
2. Windows 7 - Not using admin.mp4 11.00Мб
2. Windows 7 - Not using admin.vtt 4.98Кб
20.1 Download Debian.html 92б
20.2 Debian Live CDDVD.html 92б
20.3 Free Debian Books and Guides.html 93б
20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 57.78Мб
20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.vtt 57.78Мб
3.10 httpfreemail.ms.html 80б
3.11 httpsanonbox.net.html 81б
3.12 httpgetairmail.com.html 83б
3.13 http10minutemail.com10MinuteMailindex.html.html 108б
3.14 httpwww.migmail.net.html 84б
3.15 Example SMS recieve online site.html 96б
3.16 Top 10 sites receive sms online without phone.html 135б
3.17 httpdontmail.net.html 81б
3.1 Diagram of Mac.html 131б
3.1 httpsmailinator.com.html 84б
3.1 httpsresearch.google.compubspub43963.html.html 107б
3.1 httpwww.vmware.comproductsworkstationcompare.html.html 116б
3.1 Top 50 products vs security bugs.html 114б
3.2 httpbugmenot.com.html 81б
3.2 httpwww.vmware.comproductsplayerfaqsfaqs.html.html 113б
3.2 Report - Buying Into the Bias Why Vulnerability Statistics Suck.html 168б
3.2 Windows - Tmac.html 89б
3.3 httpswww.guerrillamail.com.html 92б
3.3 Linux - How to use macchanger.html 132б
3.4 httpwww.mytrashmail.com.html 88б
3.4 Mac OS X - How to change the mac address.html 141б
3.5 httpwww.dispostable.com.html 88б
3.5 Mac OS X - Macdaddyx.html 109б
3.6 httpwww.mailexpire.com.html 87б
3.6 Mac OS X - Wifispoof.html 83б
3.7 httpwww.tempinbox.com.html 85б
3.8 httpswww.trash-mail.comen.html 91б
3.9 httpcrapmail.dken.html 83б
3. Asymmetric Encryption.mp4 72.32Мб
3. Asymmetric Encryption.vtt 11.46Кб
3. Goals and Learning Objectives - Volume 1.mp4 16.11Мб
3. Goals and Learning Objectives - Volume 1.vtt 2.55Кб
3. Identify Verification and Registration.mp4 23.40Мб
3. Identify Verification and Registration.vtt 8.44Кб
3. Physical and Hardware Isolation - How to change the Mac Address.mp4 25.58Мб
3. Physical and Hardware Isolation - How to change the Mac Address.vtt 9.91Кб
3. Protect What You Value.mp4 8.94Мб
3. Protect What You Value.vtt 4.76Кб
3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).mp4 48.07Мб
3. Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys).vtt 21.59Кб
3. Security Bugs and Vulnerabilities.mp4 83.90Мб
3. Security Bugs and Vulnerabilities.vtt 6.17Кб
3. The Top 3 Things You Need To Stay Safe Online.mp4 2.50Мб
3. The Top 3 Things You Need To Stay Safe Online.vtt 1.45Кб
3. Vmware.mp4 110.48Мб
3. Vmware.vtt 10.66Кб
3. Windows 7 - Auto Update.mp4 4.94Мб
3. Windows 7 - Auto Update.vtt 1.63Кб
3. Windows 8 and 8.1 - Not using admin.mp4 18.24Мб
3. Windows 8 and 8.1 - Not using admin.vtt 5.58Кб
4.1 Example hashes.html 104б
4.1 Exploit Kit Landscape Map.html 99б
4.1 httpswww.virtualbox.org.html 88б
4.1 httpwww.google.com.stationx.net.html 95б
4.1 OS usage share.html 125б
4.1 Windows - CPU Z.html 103б
4.2 CVE details.html 88б
4.2 httpwww.urlvoid.com.html 84б
4.2 Windows - dmidecode.html 115б
4.3 httpswww.exploit-db.comsearch.html 95б
4.3 Mac OS X - Mac Cupid.html 120б
4.4 Linux - i-nex.html 88б
4.5 Linux and Mac OS X - dmidecode.html 93б
4.6 Mac OS X - Installing dmidecode with brew.html 119б
4.7 httpswww.yubico.com.html 84б
4.8 httpswww.nitrokey.com.html 87б
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp4 23.30Мб
4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.vtt 12.95Кб
4. Hash Functions.mp4 89.24Мб
4. Hash Functions.vtt 6.30Кб
4. Physical and Hardware Isolation - Hardware Serials.mp4 50.25Мб
4. Physical and Hardware Isolation - Hardware Serials.vtt 15.96Кб
4. Sample from Vol 2 - Password cracking part 2.mp4 24.16Мб
4. Sample from Vol 2 - Password cracking part 2.vtt 11.74Кб
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 38.11Мб
4. Security Bugs and Vulnerabilities - The Vulnerability Landscape.vtt 10.62Кб
4. Target Audience.mp4 7.33Мб
4. Target Audience.vtt 3.23Кб
4. Usage Share.mp4 34.29Мб
4. Usage Share.vtt 5.53Кб
4. Virtual box.mp4 144.16Мб
4. Virtual box.vtt 10.82Кб
4. What is Privacy, Anonymity and Pseudonymity.mp4 11.87Мб
4. What is Privacy, Anonymity and Pseudonymity.vtt 5.07Кб
4. Windows 10 - Not using admin.mp4 14.15Мб
4. Windows 10 - Not using admin.vtt 4.58Кб
4. Windows 8 & 8.1 - Auto Update.mp4 6.54Мб
4. Windows 8 & 8.1 - Auto Update.vtt 1.84Кб
5.1 httpswww.parsemail.org.html 87б
5.1 httpswww.symantec.comenukcode-signing.html 107б
5.1 Kali iso here if you want to install on a computer's hard disk or live boot it..html 92б
5.1 Microsoft Privacy Statement.html 114б
5.1 Portable Apps.html 85б
5.1 The Cyber Security Landscape Diagram.jpg.jpg 777.15Кб
5.2 How to Get Email Headers.html 111б
5.2 Kali on Microsoft App Store as an official WSL.html 123б
5.2 Pen Drive Apps.html 89б
5.2 Windows 10 Device Guard using Digital Signatures.html 174б
5.2 With Windows 10, Microsoft Blatantly Disregards User Choice and Privacy A Deep Dive.html 174б
5.3 Aegis Secure Key - USB 2.0 Flash Drive.html 108б
5.3 httpswww.virustotal.comendocumentationemail-submissions.html 123б
5.3 Kali AWS appliance.html 109б
5.3 Microsoft Service Agreement.html 123б
5.4 Cortana privacy faq.html 126б
5.4 httpswhois.domaintools.combbc.co.uk.html 100б
5.4 Kali images for Virtualbox or VMware.html 150б
5.4 Maxthon.html 84б
5.5 Authentic8.html 97б
5.5 httpswhois.domaintools.comblob.com.html 99б
5.5 Kali Arm hardware.html 118б
5.6 Spoons.net.html 88б
5.7 Spikes.html 91б
5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp4 49.31Мб
5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.vtt 17.75Кб
5. Digital Signatures.mp4 42.73Мб
5. Digital Signatures.vtt 5.08Кб
5. Hackers, crackers and cyber criminals.mp4 7.70Мб
5. Hackers, crackers and cyber criminals.vtt 2.99Кб
5. Kali Linux 2018.mp4 59.63Мб
5. Kali Linux 2018.vtt 4.77Кб
5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.mp4 31.76Мб
5. Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3.vtt 21.23Кб
5. Security, Vulnerabilities, Threats and Adversaries.mp4 11.23Мб
5. Security, Vulnerabilities, Threats and Adversaries.vtt 4.65Кб
5. Study Recommendations.mp4 17.95Мб
5. Study Recommendations.vtt 6.48Кб
5. Virtual Isolation.mp4 57.32Мб
5. Virtual Isolation.vtt 12.84Кб
5. Windows 10 - Auto Update.mp4 4.94Мб
5. Windows 10 - Auto Update.vtt 1.73Кб
5. Windows 10 - Privacy & Tracking.mp4 79.95Мб
5. Windows 10 - Privacy & Tracking.vtt 6.96Кб
6.1 Common Vulnerabilities and Exposures.html 85б
6.1 Dual Booting explained.html 177б
6.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html 117б
6.1 httpswww.securityforum.org.html 91б
6.1 httpwww.consumerfraudreporting.orgcredit_freeze_summary.php.html 124б
6.1 Malware stats.html 107б
6.1 Mozilla Cipher Suite Recommendations.html 110б
6.2 7 most common RATs.html 149б
6.2 httpswww.iso.orgstandard56742.html.html 100б
6.2 httpwww.scambusters.org.html 88б
6.2 National vulnerability database.html 85б
6.2 Wikipedia Transport Layer Security (TLS) page.html 115б
6.3 httpswww.stationx.netsabsa.html 92б
6.3 httpwww.actionfraud.police.uktypes_of_fraud.html 108б
6.3 Microsoft Security Bulletins.html 115б
6.3 Report - Spotlight perils of malvertisements.html 142б
6.3 Weakdh Cipher Suite Recommendations.html 93б
6.4 Chef Jamie Oliver’s website hacked for the third time.html 106б
6.4 Steve Gibson's Cipher Suite Recommendations.html 117б
6.4 Windows 10 Ditches Patch Tuesday for Security's Sake.html 178б
6.5 Patch Tuesday may be dead, but Microsoft's not confessing to the crime.html 197б
6.5 SophosLabs 2018 Malware Forecast.html 162б
6. Asset Selection.mp4 7.68Мб
6. Asset Selection.vtt 3.55Кб
6. Course updates.mp4 4.39Мб
6. Course updates.vtt 787б
6. Dual Boot.mp4 7.93Мб
6. Dual Boot.vtt 4.42Кб
6. Malware, viruses, rootkits and RATs.mp4 12.14Мб
6. Malware, viruses, rootkits and RATs.vtt 7.27Кб
6. Sample from Vol 4 - Email clients, protocols and authentication.mp4 38.19Мб
6. Sample from Vol 4 - Email clients, protocols and authentication.vtt 19.41Кб
6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 160.85Мб
6. Secure Sockets Layer (SSL) and Transport layer security (TLS).vtt 13.65Кб
6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp4 14.52Мб
6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).vtt 8.29Кб
6. Windows 10 - Disable tracking automatically.mp4 67.89Мб
6. Windows 10 - Disable tracking automatically.vtt 5.67Кб
6. Windows - Criticality and Patch Tuesday.mp4 41.81Мб
6. Windows - Criticality and Patch Tuesday.vtt 4.09Кб
7.1 Chromium sandbox design.html 121б
7.1 Flexera Personal Software Inspector - Previously Secunia PSI.html 174б
7.1 httpsgithub.com10se1ucgoDisableWinTrackingreleases.html 117б
7.1 httpwww.telegraph.co.uknewsworldnewsnorthamericausa11416985Millions-of-computers-may-be-compromised-by-US-spyware-report.html.html 195б
7.1 SSL Strip tool By Moxie Marlinspike.html 107б
7.2 Cain & Abel.html 89б
7.2 httpwww.mcafee.comusresourcesreportsrp-quarterly-threat-q4-2014.pdf.html 135б
7.2 Mozilla Sandbox design.html 102б
7.3 httpssecurelist.comanalysisquarterly-malware-reports72493it-threat-evolution-in-q3-2015.html 156б
7.3 Intro to Sniffers.html 127б
7.4 httpwww.slate.comarticlestechnologybitwise201502lenovo_superfish_scandal_why_it_s_one_of_the_worst_consumer_computing_screw.html.html 198б
7.4 sniffdet - Remote Sniffer Detection ToolLibrary.html 93б
7.5 Arpwatch Tool to Monitor Ethernet Activity in Linux.html 119б
7.6 WIFI Pineapple.html 91б
7. Built-in Sandboxes and Application Isolation.mp4 10.40Мб
7. Built-in Sandboxes and Application Isolation.vtt 4.43Кб
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.mp4 10.77Мб
7. Spyware, Adware, Scareware, PUPs & Browser hijacking.vtt 5.33Кб
7. SSL Stripping.mp4 114.51Мб
7. SSL Stripping.vtt 13.34Кб
7. Threat Modeling and Risk Assessments.mp4 18.03Мб
7. Threat Modeling and Risk Assessments.vtt 9.18Кб
7. Windows 10 - Tool Disable Windows 10 Tracking.mp4 98.43Мб
7. Windows 10 - Tool Disable Windows 10 Tracking.vtt 7.63Кб
7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp4 19.36Мб
7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.vtt 10.96Кб
8.1 BufferZone.html 112б
8.1 Cortana privacy faq.html 126б
8.1 Debian Security Page.html 93б
8.1 Server Name Indication (SNI) Wiki.html 113б
8.1 XSS example vulnerability.html 136б
8.2 How to disable cortana-on Windows 10.html 147б
8.2 Live phishing links.html 87б
8.2 Shadowdefender.html 91б
8.2 Software distributions based on Debian.html 105б
8.3 Automatic Security Updates.html 119б
8.3 Deepfreeze Standard.html 121б
8.3 Homograph attack using internationalized domain name.html 134б
8.3 How to Disable Cortana in Windows 10’s Anniversary Update.html 130б
8.4 Deepfreeze Cloud Browser and Desktop.html 129б
8.5 f-sandbox.html 92б
8.6 Returnil.html 118б
8.7 Comodo.html 110б
8. HTTPS (HTTP Secure).mp4 81.90Мб
8. HTTPS (HTTP Secure).vtt 6.98Кб
8. Linux - Debian - Patching.mp4 38.49Мб
8. Linux - Debian - Patching.vtt 15.21Кб
8. Security vs Privacy vs Anonymity - Can we have it all.mp4 5.44Мб
8. Security vs Privacy vs Anonymity - Can we have it all.vtt 2.52Кб
8. What is Phishing, Vishing and SMShing.mp4 25.99Мб
8. What is Phishing, Vishing and SMShing.vtt 15.35Кб
8. Windows 10 – Cortana.mp4 41.02Мб
8. Windows 10 – Cortana.vtt 3.80Кб
8. Windows - Sandboxes and Application Isolation.mp4 26.36Мб
8. Windows - Sandboxes and Application Isolation.vtt 8.78Кб
9.1 Apple security updates.html 101б
9.1 httpswww.stationx.netsabsa.html 92б
9.1 Sandboxie How it Works.html 106б
9.1 SmartScreen Filter FAQ.html 145б
9.1 Spam example.html 142б
9.2 Complete guide windows 10 privacy settings.html 134б
9.2 httpbrew.sh.html 76б
9.2 Introduction and quick guide sandboxie.html 143б
9.2 Spam stats.html 104б
9.3 httpsen.wikipedia.orgwikiParkerian_Hexad.html 106б
9.3 igeekblogs - How to enable updates.html 134б
9.3 Sandboxie guide.html 118б
9.4 httpsen.wikipedia.orgwikiNon-repudiation.html 106б
9.4 Mac Update.html 86б
9.4 Sandboxie forum.html 96б
9.5 httpsen.wikipedia.orgwikiAuthorization.html 104б
9.6 httpsen.wikipedia.orgwikiAuthentication.html 105б
9. Confidentiality, Integrity and Availability - (Security Attributes).mp4 19.34Мб
9. Confidentiality, Integrity and Availability - (Security Attributes).vtt 10.37Кб
9. Digital Certificates.mp4 81.97Мб
9. Digital Certificates.vtt 6.13Кб
9. Mac - Patching.mp4 55.58Мб
9. Mac - Patching.vtt 9.23Кб
9. Spamming & Doxing.mp4 4.79Мб
9. Spamming & Doxing.vtt 3.51Кб
9. Windows 10 – Privacy Settings.mp4 86.46Мб
9. Windows 10 – Privacy Settings.vtt 9.65Кб
9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4 70.12Мб
9. Windows - Sandboxes and Application Isolation - Sandboxie.vtt 15.22Кб
Статистика распространения по странам
Франция (FR) 1
Всего 1
Список IP Полный список IP-адресов, которые скачивают или раздают этот торрент