2016
10:52 hours
Volume 1 only.
├── 01 Introduction
│ ├── 001 Welcome and Introduction to the Instructor.mp4
│ ├── 002 Goals and Learning Objectives – Volume 1.mp4
│ ├── 003 Target Audience.mp4
│ ├── 004 Study Recommendations.mp4
│ └── 005 Course updates.mp4
├── 02 know Yourself – The Threat and Vulnerability Landscape
│ ├── 006 Goals and Learning Objectives.mp4
│ ├── 007 Protect What You Value.mp4
│ ├── 008 What is Privacy Anonymity and Pseudonymity.mp4
│ ├── 009 Security Vulnerabilities Threats and Adversaries.mp4
│ ├── 010 Threat Modeling and Risk Assessments.mp4
│ ├── 011 Security vs Privacy vs Anonymity – Can we have it all.mp4
│ ├── 012 Defense In Depth.mp4
│ ├── 013 The Zero Trust Model.mp4
│ └── attached_files
│ └── 009 Security Vulnerabilities Threats and Adversaries
│ └── The-Cyber-Security-Landscape-Diagram.jpg
├── 03 Know Your Enemy – The Current Threat and Vulnerability Landscape
│ ├── 014 Goals and Learning Objectives.mp4
│ ├── 015 Why You Need Security The Value Of A Hack.mp4
│ ├── 016 The Top 3 Things You Need To Stay Safe Online.mp4
│ ├── 017 Security Bugs and Vulnerabilities – The Vulnerability Landscape.mp4
│ ├── 018 Hackers crackers and cyber criminals.mp4
│ ├── 019 Malware viruses rootkits and RATs.mp4
│ ├── 020 Spyware Adware Scareware PUPs Browser hijacking.mp4
│ ├── 021 What is Phishing Vishing and SMShing.mp4
│ ├── 022 Spamming Doxing.mp4
│ ├── 023 Social engineering – Scams cons tricks and fraud.mp4
│ ├── 024 Darknets Dark Markets and Exploit kits.mp4
│ ├── 025 Governments spies and secret stuff part I.mp4
│ ├── 026 Governments spies and secret stuff part II.mp4
│ ├── 027 Regulating encryption mandating insecurity legalizing spying.mp4
│ ├── 028 Trust Backdoors.mp4
│ ├── 029 Censorship.mp4
│ └── 030 Security News and Alerts Stay Informed.mp4
├── 04 Encryption Crash Course
│ ├── 031 Goals and Learning Objectives.mp4
│ ├── 032 Symmetric Encryption.mp4
│ ├── 033 Asymmetric Encryption.mp4
│ ├── 034 Hash Functions.mp4
│ ├── 035 Digital Signatures.mp4
│ ├── 036 Secure Sockets Layer SSL and Transport layer security TLS.mp4
│ ├── 037 SSL Stripping.mp4
│ ├── 038 HTTPS HTTP Secure.mp4
│ ├── 039 Digital Certificates.mp4
│ ├── 040 Certificate Authorities and HTTPS.mp4
│ ├── 041 End-to-End Encryption E2EE.mp4
│ ├── 042 Steganography.mp4
│ └── 043 How Security and Encryption is Really Attacked.mp4
├── 05 Setting up a Testing Environment Using Virtual Machines
│ ├── 044 Goals and Learning Objectives.mp4
│ ├── 045 Introduction to Setting up a Testing Environment Using Virtual Machines.mp4
│ ├── 046 Vmware.mp4
│ ├── 047 Virtual box.mp4
│ └── 048 Kali Linux 2016.mp4
├── 06 Operating System Security Privacy Windows vs Mac OS X vs Linux
│ ├── 049 Goals and Learning Objectives.mp4
│ ├── 050 Security Features and Functionality.mp4
│ ├── 051 Security Bugs and Vulnerabilities.mp4
│ ├── 052 Usage Share.mp4
│ ├── 053 Windows 10 – Privacy Tracking.mp4
│ ├── 054 Windows 10 – Disable tracking automatically.mp4
│ ├── 055 Windows 10 – Tool Disable Windows 10 Tracking.mp4
│ ├── 056 Windows 10 Cortana.mp4
│ ├── 057 Windows 10 Privacy Settings.mp4
│ ├── 058 Windows 10 – WiFi Sense.mp4
│ ├── 059 Windows 7 8 and 8.1 – Privacy Tracking.mp4
│ ├── 060 Mac OS X – Privacy Tracking.mp4
│ ├── 061 Linux and Unix like Operating systems.mp4
│ ├── 062 Linux – Debian.mp4
│ ├── 063 Linux – Debian 8 Jessie – Virtual box guest additions Issue.mp4
│ ├── 064 Linux – OpenBSD and Archlinux.mp4
│ └── 065 Linux – Ubuntu.mp4
├── 07 Security Bugs and Vulnerabilities
│ ├── 066 Goals and Learning Objectives.mp4
│ ├── 067 The Importance of Patching.mp4
│ ├── 068 Windows 7 – Auto Update.mp4
│ ├── 069 Windows 8 8.1 – Auto Update.mp4
│ ├── 070 Windows 10 – Auto Update.mp4
│ ├── 071 Windows – Criticality and Patch Tuesday.mp4
│ ├── 072 Windows 7 8 8.1 10 – Automate the pain away from patching.mp4
│ ├── 073 Linux – Debian – Patching.mp4
│ ├── 074 Mac OS X – Patching.mp4
│ ├── 075 Firefox – Browser and extension updates.mp4
│ ├── 076 Chrome – Browser and extension updates.mp4
│ ├── 077 IE and Edge – Browser and extention updates.mp4
│ └── 078 Auto updates – The Impact to privacy and anonymity.mp4
├── 08 Reducing Threat Privilege
│ ├── 079 Goals and Learning Objectives Removing Privilege.mp4
│ ├── 080 Windows 7 – Not using admin.mp4
│ ├── 081 Windows 8 and 8.1 – Not using admin.mp4
│ └── 082 Windows 10 – Not using admin.mp4
├── 09 Social Engineering and Social Media Offence and Defence
│ ├── 083 Goals and Learning Objectives.mp4
│ ├── 084 Information Disclosure and Identity Strategies for Social Media.mp4
│ ├── 085 Identify Verification and Registration.mp4
│ ├── 086 Behavioural Security Controls Against Social Threats Phishing Spam Part 1.mp4
│ ├── 087 Behavioural Security Controls Against Social Threats Phishing Spam Part 2.mp4
│ └── 088 Technical Security Controls Against Social Threats Phishing Spam Scam Cons.mp4
├── 10 Security Domains
│ ├── 089 Goals and Learning Objectives.mp4
│ └── 090 Security Domains.mp4
├── 11 Security Through Isolation and Compartmentalization
│ ├── 091 Goals and Learning Objectives.mp4
│ ├── 092 Introduction to Isolation and Compartmentalization.mp4
│ ├── 093 Physical and Hardware Isolation – How to change the Mac Address.mp4
│ ├── 094 Physical and Hardware Isolation – Hardware Serials.mp4
│ ├── 095 Virtual Isolation.mp4
│ ├── 096 Dual Boot.mp4
│ ├── 097 Built-in Sandboxes and Application Isolation.mp4
│ ├── 098 Windows – Sandboxes and Application Isolation.mp4
│ ├── 099 Windows – Sandboxes and Application Isolation – Sandboxie.mp4
│ ├── 100 Linux – Sandboxes and Application Isolation.mp4
│ ├── 101 Mac OS X – Sandboxes and Application Isolation.mp4
│ ├── 102 Virtual Machines.mp4
│ ├── 103 Virtual Machine Weaknesses.mp4
│ ├── 104 Virtual Machine Hardening.mp4
│ ├── 105 Whonix OS – Anonymous Operating system.mp4
│ ├── 106 Whonix OS – Weaknesses.mp4
│ ├── 107 Qubes OS.mp4
│ └── 108 Security Domains Isolation and Compartmentalization.mp4
└── 12 BONUS – Whats next… Volume 2 3 and 4
├── 109 BONUS – Important Information.mp4
├── 110 Congratulations.mp4
├── 111 BONUS Lecture from Volume 2 – Router Vulnerability Scanning Shodan Qualys.mp4
├── 112 BONUS Lecture from Volume 2 – Password cracking part 2.mp4
├── 113 BONUS Lecture from Volume 3 – Bypassing firewalls and HTTP proxies part 3.mp4
├── 114 BONUS Lecture from Volume 4 – Email clients protocols and authentication.mp4
└── 115 BONUS DISCOUNT COUPONS