2016
12:10 hours
├── 01 Introduction
│ ├── 001 Welcome to Volume 2.mp4
│ ├── 002 Introduction to the Instructor.mp4
│ ├── 003 Target Audience.mp4
│ ├── 004 Study Recommendations.mp4
│ └── 005 Course updates.mp4
├── 02 Goals and Learning Objectives – Volume 2
│ └── 006 Goals and Learning Objectives – Volume 2.mp4
├── 03 Routers – Port and Vulnerability scanning
│ ├── 007 Goals and Learning Objectives.mp4
│ ├── 008 The Home Router.mp4
│ ├── 009 External Vulnerability Scanning – Shodan Qualys Nmap.mp4
│ ├── 010 Internal Vulnerability Scanning – MBSA Nmap Nessus Fing Superscan OpenVAS.mp4
│ ├── 011 Open Source Custom Router Firmware.mp4
│ └── attached_files
│ └── 008 The Home Router
│ └── OSI-Model-and-TCP-Model.gif
├── 04 Firewalls
│ ├── 012 Goals and Learning Objectives.mp4
│ ├── 013 Firewalls Host-based network-based and virtual Part 1.mp4
│ ├── 014 Firewalls Host-based network-based and virtual Part 2.mp4
│ ├── 015 Windows – Host Based Firewalls – Windows Firewall.mp4
│ ├── 016 Windows – Host Based Firewalls – Windows Firewall Control WFC.mp4
│ ├── 017 Windows – Host Based Firewalls – Third Party.mp4
│ ├── 018 Linux – Host Based Firewalls – iptables.mp4
│ ├── 019 Linux – Host Based Firewalls – UFW gufw nftables.mp4
│ ├── 020 Mac – Host based Firewalls – Application Firewall PF.mp4
│ ├── 021 Mac – Host based Firewalls – pflist Icefloor Murus.mp4
│ ├── 022 Mac – Host based Firewalls – Little Snitch.mp4
│ ├── 023 Network based firewalls – Routers – DD-WRT.mp4
│ ├── 024 Network based firewalls – Hardware.mp4
│ ├── 025 Network based firewalls – pfSense Smoothwall and Vyos.mp4
│ └── attached_files
│ └── 019 Linux – Host Based Firewalls – UFW gufw nftables
│ └── iptables-frontends.txt
├── 05 Network Attacks Architecture and Isolation
│ ├── 026 Goals and Learning Objectives.mp4
│ ├── 027 Network Attacks and Network Isolation – Introduction and IOT.mp4
│ ├── 028 Network Attacks and Network Isolation – Arp Spoofing and Switches.mp4
│ ├── 029 Effective Network Isolation Part 1.mp4
│ └── 030 Effective Network Isolation Part 2.mp4
├── 06 Wireless and Wi-Fi Security
│ ├── 031 Goals and Learning Objectives.mp4
│ ├── 032 Wi-Fi Weaknesses – WEP.mp4
│ ├── 033 Wi-Fi Weaknesses – WPA WPA2 TKIP and CCMP.mp4
│ ├── 034 Wi-Fi Weaknesses – Wi-Fi Protected Setup WPS Evil Twin and Rouge AP.mp4
│ ├── 035 Wi-Fi Security Testing.mp4
│ ├── 036 Wireless Security – Secure Configuration and Network Isolation.mp4
│ ├── 037 Wireless security – RF Isolation and Reduction.mp4
│ └── 038 Wireless security – Who is on my Wi-Fi Network.mp4
├── 07 Network Monitoring for Threats
│ ├── 039 Goals and Learning Objectives.mp4
│ ├── 040 Syslog.mp4
│ ├── 041 Network Monitoring – Wireshark tcpdump tshark iptables Part 1.mp4
│ ├── 042 Network Monitoring – Wireshark tcpdump tshark iptables Part 2.mp4
│ ├── 043 Wireshark – Finding malware and hackers – Part 1.mp4
│ ├── 044 Wireshark – Finding malware and hackers – Part 2.mp4
│ └── 045 Network Monitoring – Wincap NST Netminer and NetWorx.mp4
├── 08 How We Are Tracked Online
│ ├── 046 Goals and Learning Objectives.mp4
│ ├── 047 Types of Tracking.mp4
│ ├── 048 IP Address.mp4
│ ├── 049 3rd Party Connections.mp4
│ ├── 050 HTTP Referer.mp4
│ ├── 051 Cookies and Scripts.mp4
│ ├── 052 Super Cookies.mp4
│ ├── 053 Browser Fingerprinting and Browser Volunteered Information.mp4
│ ├── 054 Browser and Browser Functionality.mp4
│ ├── 055 More Tracking.mp4
│ └── 056 Browser and Internet Profiling.mp4
├── 09 Search Engines and Privacy
│ ├── 057 Goals and Learning Objectives.mp4
│ ├── 058 Search Engine Tracking Censorship and Privacy.mp4
│ ├── 059 Ixquick and Startpage.mp4
│ ├── 060 DuckDuckGo.mp4
│ ├── 061 Disconnect search.mp4
│ ├── 062 YaCy.mp4
│ └── 063 Private and Anonymous Searching.mp4
├── 10 Browser Security and Tracking Prevention
│ ├── 064 Goals and Learning Objectives.mp4
│ ├── 065 Which Browser Choice of Browser.mp4
│ ├── 066 Reducing the Browser Attack Surface.mp4
│ ├── 067 Browser Hacking Demo.mp4
│ ├── 068 Browser Isolation and Compartmentalization.mp4
│ ├── 069 Firefox Security Privacy and Tracking.mp4
│ ├── 070 uBlock origin – HTTP Filters ad and track blockers.mp4
│ ├── 071 uMatrix – HTTP Filters ad and track blockers.mp4
│ ├── 072 Disconnect Ghostery Request policy – HTTP Filters ad and track blockers.mp4
│ ├── 073 ABP Privacy badger WOT – HTTP Filters ad and track blockers.mp4
│ ├── 074 No-script – HTTP Filters ad and track blockers.mp4
│ ├── 075 Policeman and others – HTTP Filters ad and track blockers.mp4
│ ├── 076 History Cookies and Super cookies Part 1.mp4
│ ├── 077 History Cookies and Super cookies Part 2.mp4
│ ├── 078 HTTP Referer.mp4
│ ├── 079 Browser Fingerprinting.mp4
│ ├── 080 Certificates and Encryption.mp4
│ └── 081 Firefox Hardening.mp4
├── 11 Passwords and Authentication Methods
│ ├── 082 Goals and Learning Objectives.mp4
│ ├── 083 Password Attacks.mp4
│ ├── 084 How Passwords are Cracked – Hashes – Part 1.mp4
│ ├── 085 How Passwords are Cracked – Hashcat – Part 2.mp4
│ ├── 086 Operating System Passwords.mp4
│ ├── 087 Password Managers – An Introduction.mp4
│ ├── 088 Password Managers – Master Password.mp4
│ ├── 089 Password Managers – KeePass and KeePassX.mp4
│ ├── 090 Password Managers – LastPass.mp4
│ ├── 091 Password Managers – Hardening Lastpass.mp4
│ ├── 092 Creating a Strong Password That You Can Remember – Part 1.mp4
│ ├── 093 Creating a Strong Password That You Can Remember – Part 2.mp4
│ ├── 094 Multi-Factor Authentication – Soft Tokens – Google Authenticator and Authy.mp4
│ ├── 095 Multi-Factor Authentication – Hard Tokens – 2FA Dongles.mp4
│ ├── 096 Choosing a Method of Multi-Factor Authentication.mp4
│ ├── 097 Multi-Factor Authentication – Strengths and Weaknesses.mp4
│ └── 098 The Future of Password and Authentication.mp4
└── 12 BONUS Section… Whats Next…Volume 3 and 4
├── 099 BONUS – Important Information.mp4
├── 100 Congratulations.mp4
├── 101 Certificate Of Completion for CPEs.html
├── 102 BONUS Lecture from Volume 3 – Which VPN protocol is best to use and why.mp4
├── 103 BONUS Lecture from Volume 4 – Email Tracking and Hacking.mp4
├── 104 BONUS Lecture from Volume 1 – Security Vulnerabilities Threats and Adversaries.mp4