1. Урок 1.00:00:35
    Welcome to Volume 2
  2. Урок 2.00:02:07
    Introduction to the Instructor!
  3. Урок 3.00:11:25
    Security Quick Win!
  4. Урок 4.00:01:55
    Target Audience
  5. Урок 5.00:04:20
    Study Recommendations
  6. Урок 6.00:00:41
    Course updates
  7. Урок 7.00:03:10
    Goals and Learning Objectives - Volume 2
  8. Урок 8.00:00:29
    Goals and Learning Objectives
  9. Урок 9.00:13:45
    The Home Router
  10. Урок 10.00:16:24
    External Vulnerability Scanning - Shodan, Qualys & Nmap
  11. Урок 11.00:19:34
    Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS
  12. Урок 12.00:11:38
    Open Source Custom Router Firmware
  13. Урок 13.00:00:26
    Goals and Learning Objectives
  14. Урок 14.00:14:50
    Firewalls – Host-based, network-based and virtual Part 1
  15. Урок 15.00:04:55
    Firewalls – Host-based, network-based and virtual Part 2
  16. Урок 16.00:10:30
    Windows - Host Based Firewalls - Windows Firewall
  17. Урок 17.00:05:19
    Windows - Host Based Firewalls - Windows Firewall Control (WFC)
  18. Урок 18.00:08:46
    Windows - Host Based Firewalls - Third Party
  19. Урок 19.00:20:00
    Linux - Host Based Firewalls - iptables
  20. Урок 20.00:12:09
    Linux - Host Based Firewalls - UFW, gufw & nftables
  21. Урок 21.00:13:53
    Mac - Host based Firewalls - Application Firewall & PF
  22. Урок 22.00:07:49
    Mac - Host based Firewalls - pflist, Icefloor & Murus
  23. Урок 23.00:06:23
    Mac - Host based Firewalls - Little Snitch
  24. Урок 24.00:05:10
    Network based firewalls - Routers - DD-WRT
  25. Урок 25.00:02:44
    Network based firewalls - Hardware
  26. Урок 26.00:10:35
    Network based firewalls - pfSense, Smoothwall and Vyos
  27. Урок 27.00:00:19
    Goals and Learning Objectives
  28. Урок 28.00:06:36
    Network Attacks and Network Isolation - Introduction and IOT
  29. Урок 29.00:06:20
    Network Attacks and Network Isolation - Arp Spoofing and Switches
  30. Урок 30.00:12:28
    Effective Network Isolation Part 1
  31. Урок 31.00:07:27
    Effective Network Isolation Part 2
  32. Урок 32.00:00:26
    Goals and Learning Objectives
  33. Урок 33.00:02:29
    Wi-Fi Weaknesses - WEP
  34. Урок 34.00:13:42
    Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP
  35. Урок 35.00:06:50
    Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP
  36. Урок 36.00:04:02
    Wi-Fi Security Testing
  37. Урок 37.00:14:19
    Wireless Security - Secure Configuration and Network Isolation
  38. Урок 38.00:03:02
    Wireless security - RF Isolation and Reduction
  39. Урок 39.00:03:21
    Wireless security - Who is on my Wi-Fi Network?
  40. Урок 40.00:00:18
    Goals and Learning Objectives
  41. Урок 41.00:17:00
    Syslog
  42. Урок 42.00:14:02
    Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1
  43. Урок 43.00:08:00
    Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2
  44. Урок 44.00:15:47
    Wireshark - Finding malware and hackers - Part 1
  45. Урок 45.00:08:13
    Wireshark - Finding malware and hackers - Part 2
  46. Урок 46.00:01:40
    Network Monitoring - Wincap, NST, Netminer and NetWorx
  47. Урок 47.00:00:24
    Goals and Learning Objectives
  48. Урок 48.00:04:26
    Types of Tracking
  49. Урок 49.00:05:28
    IP Address
  50. Урок 50.00:04:26
    3rd Party Connections
  51. Урок 51.00:03:22
    HTTP Referer
  52. Урок 52.00:08:01
    Cookies and Scripts
  53. Урок 53.00:05:14
    Super Cookies
  54. Урок 54.00:02:38
    Browser Fingerprinting and Browser Volunteered Information
  55. Урок 55.00:01:40
    Browser and Browser Functionality
  56. Урок 56.00:02:49
    More Tracking
  57. Урок 57.00:06:36
    Browser and Internet Profiling
  58. Урок 58.00:00:21
    Goals and Learning Objectives
  59. Урок 59.00:12:45
    Search Engine Tracking, Censorship and Privacy
  60. Урок 60.00:07:57
    Ixquick and Startpage
  61. Урок 61.00:03:45
    DuckDuckGo
  62. Урок 62.00:04:44
    Disconnect search
  63. Урок 63.00:03:33
    YaCy
  64. Урок 64.00:07:35
    Private and Anonymous Searching
  65. Урок 65.00:00:22
    Goals and Learning Objectives
  66. Урок 66.00:06:02
    Which Browser – Choice of Browser
  67. Урок 67.00:11:35
    Reducing the Browser Attack Surface
  68. Урок 68.00:09:27
    Browser Hacking Demo
  69. Урок 69.00:06:11
    Browser Isolation and Compartmentalization
  70. Урок 70.00:12:27
    Firefox Security, Privacy and Tracking
  71. Урок 71.00:14:14
    uBlock origin - HTTP Filters, ad and track blockers
  72. Урок 72.00:07:15
    uMatrix - HTTP Filters, ad and track blockers
  73. Урок 73.00:06:38
    Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers
  74. Урок 74.00:06:47
    ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers
  75. Урок 75.00:08:30
    No-script - HTTP Filters, ad and track blockers
  76. Урок 76.00:03:57
    Policeman and others - HTTP Filters, ad and track blockers
  77. Урок 77.00:11:44
    History, Cookies and Super cookies Part 1
  78. Урок 78.00:12:14
    History, Cookies and Super cookies Part 2
  79. Урок 79.00:02:20
    HTTP Referer
  80. Урок 80.00:18:27
    Browser Fingerprinting
  81. Урок 81.00:11:30
    Certificates and Encryption
  82. Урок 82.00:18:51
    Firefox Hardening
  83. Урок 83.00:00:32
    Goals and Learning Objectives
  84. Урок 84.00:03:23
    Password Attacks
  85. Урок 85.00:16:18
    How Passwords are Cracked - Hashes - Part 1
  86. Урок 86.00:07:10
    How Passwords are Cracked - Hashcat - Part 2
  87. Урок 87.00:02:29
    Operating System Passwords
  88. Урок 88.00:02:08
    Password Managers - An Introduction
  89. Урок 89.00:05:13
    Password Managers - Master Password
  90. Урок 90.00:05:56
    Password Managers - KeePass, KeePassX and KeyPassXC
  91. Урок 91.00:11:23
    Password Managers - LastPass
  92. Урок 92.00:07:35
    Password Managers - Hardening Lastpass
  93. Урок 93.00:08:54
    Creating a Strong Password That You Can Remember - Part 1
  94. Урок 94.00:09:24
    Creating a Strong Password That You Can Remember - Part 2
  95. Урок 95.00:10:55
    Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy
  96. Урок 96.00:05:54
    Multi-Factor Authentication - Hard Tokens - 2FA Dongles
  97. Урок 97.00:02:51
    Choosing a Method of Multi-Factor Authentication
  98. Урок 98.00:02:11
    Multi-Factor Authentication - Strengths and Weaknesses
  99. Урок 99.00:01:24
    The Future of Password and Authentication
  100. Урок 100.00:01:42
    Congratulations
  101. Урок 101.00:00:57
    Certificate Of Completion for CPEs
  102. Урок 102.00:11:45
    Which VPN protocol is best to use? and why?
  103. Урок 103.00:10:34
    Email Tracking and Hacking
  104. Урок 104.00:04:38
    Security Vulnerabilities, Threats and Adversaries