2017
16:38 hours
├── 01 Introduction
│ ├── 001 Welcome to Volume 4.mp4
│ ├── 002 Introduction to the Instructor.mp4
│ ├── 003 Security Quick Win.mp4
│ ├── 004 Target Audience.mp4
│ ├── 005 Study Recommendations.mp4
│ ├── 006 Course updates.mp4
│ └── links.txt
├── 02 Goals and Learning Objectives – Volume 4
│ ├── 007 What is End Point Protection and why is it important.mp4
│ └── 008 Goals and Learning Objectives – Volume 4.mp4
├── 03 File and Disk Encryption
│ ├── 009 Goals and Learning Objectives.mp4
│ ├── 010 Disk Encryption What is it good for.mp4
│ ├── 011 Disk Encryption Attacks – Cryptoalgorithms Brute Force Attacks Implementation.mp4
│ ├── 012 Disk Encryption Attacks – Physical.mp4
│ ├── 013 Disk Encryption Attacks – Containers Volumes and Partitions.mp4
│ ├── 014 Windows – Disk Encryption – An Introduction.mp4
│ ├── 015 Windows – Disk Encryption – Bitlocker.mp4
│ ├── 016 Windows – Setting Up BitLocker.mp4
│ ├── 017 Windows – Disk Encryption – VeraCrypt.mp4
│ ├── 018 Windows – Disk Encryption – CipherShed Diskcryptor Symantec and Bestcrypt.mp4
│ ├── 019 Windows Mac Linux – Setting up VeraCrypt.mp4
│ ├── 020 Mac – Filevault2.mp4
│ ├── 021 Mac – Setting up Filevault2.mp4
│ ├── 022 Linux Whole Disk Encryption – Dm-crypt and LUKS.mp4
│ ├── 023 Linux – Setting up DMCryptLUKS.mp4
│ ├── 024 Linux – Encrypting the boot partition with Grub2.mp4
│ ├── 025 Self Encrypting Drives SEDs.mp4
│ ├── 026 Defense Against Disk Decryption Attacks.mp4
│ ├── 027 File Encryption.mp4
│ ├── 028 Mandatory Key Disclosure Plausible Deniability.mp4
│ ├── 029 Nesting Crypto Systems Obfuscation.mp4
│ ├── 030 Case Studies in Disk Decryption.mp4
│ └── links.txt
├── 04 Anti-Virus and End-Point-Protection
│ ├── 031 Goals and Learning Objectives.mp4
│ ├── 032 Is Anti-Virus dead – The Threat Landscape.mp4
│ ├── 033 Is Anti-Virus dead – Protection Methods.mp4
│ ├── 034 Ransomware.mp4
│ ├── 035 Anti-Virus and End-Point-Protection Testing.mp4
│ ├── 036 The Problem With AV and EPP Testing.mp4
│ ├── 037 The Best of Business End-Point-Protection EPP.mp4
│ ├── 038 Windows – The Best of Anti-Virus and End-Point-Protection.mp4
│ ├── 039 Business End Point Protection EPP.mp4
│ ├── 040 Mac – XProtect.mp4
│ ├── 041 Mac – The Best of Anti-Virus and End-Point-Protection.mp4
│ ├── 042 Linux – The Best of Anti-Virus and End-Point-Protection.mp4
│ ├── 043 Online and Second Opinion – Anti-Virus and End-Point-Protection.mp4
│ ├── 044 Is Anti-Virus and End-Point-Protection Dangerous.mp4
│ └── links.txt
├── 05 Next Generation – Anti-Virus End-Point-Protection Detection Response EDR
│ ├── 045 Goals and Learning Objectives.mp4
│ ├── 046 Next Generation – Anti-Virus NG-AV End-Point-Protection NG-EPP.mp4
│ ├── 047 End Point Detection and Response EDR.mp4
│ ├── 048 End-Point-Protection How it works together in layers.mp4
│ └── links.txt
├── 06 End-Point-Protection Technology
│ ├── 049 Goals and Learning Objectives.mp4
│ ├── 050 What is application and execution control.mp4
│ ├── 051 Windows – Application control – ACLs Windows Permission Identifier Accessenum.mp4
│ ├── 052 Windows – Application control – User Account Control UAC.mp4
│ ├── 053 Windows – Application control – Software Restriction Policies.mp4
│ ├── 054 Windows – Application control – AppLocker.mp4
│ ├── 055 Windows – Application Control – Parental controls.mp4
│ ├── 056 Windows – Third Party App Control AV Appguard VoodooShield NoVirusThanks.mp4
│ ├── 057 Windows – Exploitation Prevention – EMET.mp4
│ ├── 058 Windows – Exploitation Prevention – Traps MBEA and HMPA.mp4
│ ├── 059 Windows 10 – Device Guard.mp4
│ ├── 060 Windows – Defender Application Guard for Microsoft Edge.mp4
│ ├── 061 Linux – Access Control Models.mp4
│ ├── 062 Linux – Security frameworks – AppArmor.mp4
│ ├── 063 Linux – Security frameworks – SElinux.mp4
│ ├── 064 Linux – Security frameworks – Grsecurity.mp4
│ ├── 065 Linux – Security frameworks – PaX and more.mp4
│ ├── 066 Linux Mac – File permissions POSIX and ACLs.mp4
│ ├── 067 Mac – Application control – Parental controls.mp4
│ ├── 068 Mac – Application control – Gatekeeper.mp4
│ ├── 069 Mac – Application control – System Integrity Protection.mp4
│ ├── 070 Mac – Application control – Santa.mp4
│ ├── 071 Mac – Application control – Little Flocker.mp4
│ ├── 072 Mac – Other Stuff.mp4
│ ├── 073 The New Normal For End-Point-Protection Technology.mp4
│ ├── 074 Cylance.mp4
│ └── links.txt
├── 07 Threat Detection and Monitoring
│ ├── 075 Goals and Learning Objectives.mp4
│ ├── 076 A Complete Failure to Detect Threats.mp4
│ ├── 077 Rethinking Honeypots.mp4
│ ├── 078 CanaryTokens.mp4
│ ├── 079 OpenCanary.mp4
│ ├── 080 CanaryPi.html
│ ├── 081 Artillery – Binary Defense.mp4
│ ├── 082 Honey Drive.mp4
│ ├── 083 Intrusion Detection Systems IDS Part 1 – Methods.mp4
│ ├── 084 Intrusion Detection Systems IDS Part 2 – Snort Suricata Bro IDS OpenWIPS-n.mp4
│ ├── 085 Host-Based Intrusion Detection – OSSEC.mp4
│ ├── 086 Network Analysis – Sguil Xplico NetworkMiner.mp4
│ ├── 087 File Integrity Monitoring FIM and Checking Part 1.mp4
│ ├── 088 File Integrity Monitoring FIM and Checking Part 2 – Tripwire and El Jefe.mp4
│ ├── 089 Network Security Toolkit NST.mp4
│ ├── 090 Security Onion.mp4
│ ├── 091 Security Information and Event Management Software SIEM.mp4
│ └── links.txt
├── 08 Malware and Hacker Hunting on the End-Point
│ ├── 092 Goals and Learning Objectives.mp4
│ ├── 093 Introduction to Malware and Hacker Hunting.mp4
│ ├── 094 Windows – Farbar Recovery Scanner.mp4
│ ├── 095 Automated Malware Removal Tools.mp4
│ ├── 096 Live Rescue Operating Systems CDs and USBs.mp4
│ ├── 097 Windows – Malware Seek Destroy – Process Explorer – Part 1.mp4
│ ├── 098 Windows – Malware Seek Destroy – Process Explorer – Part 2.mp4
│ ├── 099 Windows – Malware Seek Destroy – Process Tools.mp4
│ ├── 100 Windows – Malware Seek Destroy – Sigcheck.mp4
│ ├── 101 Windows – Malware Seek Destroy – Autoruns.mp4
│ ├── 102 Windows – Malware Seek Destroy – Process Monitor.mp4
│ ├── 103 Windows – Malware Seek Destroy – Network Connections.mp4
│ ├── 104 Malware Seek Destroy – Networkx.mp4
│ ├── 105 Linux – Malware Seek Destroy – Sysdig.mp4
│ ├── 106 Linux – Seek Destroy Malware and Hackers – Csysdig.mp4
│ ├── 107 Linux – Seek Destroy Malware and Hackers – debsums unhide.mp4
│ ├── 108 Linux Mac OS X – Malware Seek Destroy – netstat.mp4
│ ├── 109 Linux Mac OS X – Malware Seek Destroy – lsof.mp4
│ ├── 110 Linux – Malware Seek Destroy – rkhunter.mp4
│ ├── 111 Linux – Malware Seek Destroy – Linux – Chkrootkit Tiger Clamav LMD.mp4
│ ├── 112 Linux – Malware Seek Destroy – Linux – Persistence Part 1.mp4
│ ├── 113 Linux – Malware Seek Destroy – Linux – Persistence Part 2.mp4
│ ├── 114 Linux – Malware Seek Destroy – Linux – Persistence Part 3.mp4
│ ├── 115 Mac – Malware Seek Destroy – Task Explorer.mp4
│ ├── 116 Mac – Malware Seek Destroy KnockKnock BlockBlock KextViewer.mp4
│ ├── 117 Mac Linux Windows – OSquery.mp4
│ ├── 118 Firmware Rootkits Seek and Destroy Part 1.mp4
│ ├── 119 Firmware Rootkits Seek and Destroy Part 2.mp4
│ ├── 120 End-Point-Protection Recovery and Remediation Technology.mp4
│ ├── 121 Encrypted Backup and Cloud Storage.mp4
│ └── links.txt
├── 09 Operating System and Application Hardening
│ ├── 122 Goals and Learning Objectives.mp4
│ ├── 123 An Introduction to Hardening.mp4
│ ├── 124 Hardening Standards.mp4
│ ├── 125 OpenSCAP.mp4
│ ├── 126 Baseline Auditing.mp4
│ ├── 127 Windows – Hardening.mp4
│ ├── 128 Windows – Security Compliance Manager SCM.mp4
│ ├── 129 Mac Hardening.mp4
│ ├── 130 Linux Hardening.mp4
│ ├── 131 Security Focused Operating Systems.mp4
│ ├── 132 Monitoring for Security Drift.mp4
│ └── links.txt
├── 10 Secure Deleting Evidence Elimination and Anti-Forensics
│ ├── 133 Goals and Learning Objectives.mp4
│ ├── 134 Secure File Deletion – Mechanical drives.mp4
│ ├── 135 Secure File Deletion – Solid Sate Drives.mp4
│ ├── 136 Evidence Elimination Anti-Forensics – An Introduction.mp4
│ ├── 137 Evidence Elimination – CCleaner and Bleachit.mp4
│ ├── 138 Evidence Elimination – Virtual Memory Swap RAM Memory Cache and Buffer.mp4
│ ├── 139 Disk Wiping – Mechanical Drives.mp4
│ ├── 140 Disk Wiping – Solid State Drives SSD.mp4
│ ├── 141 Scrubbing EXIF Metadata Part 1 – Introduction.mp4
│ ├── 142 Scrubbing EXIF Metadata Part 2 – Tools.mp4
│ ├── 143 Scrubbing EXIF Metadata Part 3 – Guidance.mp4
│ ├── 144 Sensor Noise Camera Identification.mp4
│ └── links.txt
├── 11 Email Security Privacy and Anonymity
│ ├── 145 Goals and Learning Objectives.mp4
│ ├── 146 Clients Protocols and Authentication.mp4
│ ├── 147 Email Weaknesses.mp4
│ ├── 148 PGP GPG Privacy.mp4
│ ├── 149 PGP GPG Clients.mp4
│ ├── 150 Windows – PGP GPG.mp4
│ ├── 151 Tail – PGP GPG.mp4
│ ├── 152 PGP GPG Weaknesses.mp4
│ ├── 153 Improving OpenPGP Security – Best Practices – Part 1.mp4
│ ├── 154 Improving OpenPGP Security – Primary and Subkeys – Part 2.mp4
│ ├── 155 Improving OpenPGP Security – SmartcardsYubikey – Part 3.mp4
│ ├── 156 Email Tracking Exploits.mp4
│ ├── 157 Email Anonymity Pseudonymity.mp4
│ ├── 158 TorBirdy.mp4
│ ├── 159 Remailers.mp4
│ ├── 160 Choosing an Email Provider.mp4
│ ├── 161 Email Alternatives.mp4
│ └── links.txt
├── 12 Messengers – Security Privacy and Anonymity
│ ├── 162 Goals and Learning Objectives.mp4
│ ├── 163 An Introduction to Instant Messengers.mp4
│ ├── 164 Instant Messenger – Signal.mp4
│ ├── 165 Instant Messengers – Chatsecure.mp4
│ ├── 166 Instant Messengers – Cryptocat.mp4
│ ├── 167 Instant Messengers – Ricochet.mp4
│ ├── 168 Instant Messengers – Other.mp4
│ ├── 169 Video and Voice Messengers – Linphone.mp4
│ ├── 170 Video and Voice Messengers – Jitsi.mp4
│ ├── 171 Video and Voice Messengers – Other.mp4
│ └── links.txt
├── 13 BONUS SECTION
│ ├── 172 Congratulations.mp4
│ ├── 173 BONUS – Important Information.mp4
│ ├── 174 Certificate Of Completion for CPEs.html
│ ├── 175 BONUS Sample Lecture from Volume 1 – Qubes OS.mp4
│ ├── 176 BONUS Sample Lecture from Volume 2 – Effective Network Isolation.mp4
│ ├── 177 BONUS Sample Lecture from Volume 3 – Socks5 proxy tunneling.mp4
│ ├── 178 BONUS DISCOUNT COUPONS.html
│ └── links.txt