1. Урок 1. 00:00:35
    Welcome to Volume 2
  2. Урок 2. 00:02:07
    Introduction to the Instructor!
  3. Урок 3. 00:11:25
    Security Quick Win!
  4. Урок 4. 00:01:55
    Target Audience
  5. Урок 5. 00:04:20
    Study Recommendations
  6. Урок 6. 00:00:41
    Course updates
  7. Урок 7. 00:03:10
    Goals and Learning Objectives - Volume 2
  8. Урок 8. 00:00:29
    Goals and Learning Objectives
  9. Урок 9. 00:13:45
    The Home Router
  10. Урок 10. 00:16:24
    External Vulnerability Scanning - Shodan, Qualys & Nmap
  11. Урок 11. 00:19:34
    Internal Vulnerability Scanning - MBSA, Nmap, Nessus, Fing & Superscan & OpenVAS
  12. Урок 12. 00:11:38
    Open Source Custom Router Firmware
  13. Урок 13. 00:00:26
    Goals and Learning Objectives
  14. Урок 14. 00:14:50
    Firewalls – Host-based, network-based and virtual Part 1
  15. Урок 15. 00:04:55
    Firewalls – Host-based, network-based and virtual Part 2
  16. Урок 16. 00:10:30
    Windows - Host Based Firewalls - Windows Firewall
  17. Урок 17. 00:05:19
    Windows - Host Based Firewalls - Windows Firewall Control (WFC)
  18. Урок 18. 00:08:46
    Windows - Host Based Firewalls - Third Party
  19. Урок 19. 00:20:00
    Linux - Host Based Firewalls - iptables
  20. Урок 20. 00:12:09
    Linux - Host Based Firewalls - UFW, gufw & nftables
  21. Урок 21. 00:13:53
    Mac - Host based Firewalls - Application Firewall & PF
  22. Урок 22. 00:07:49
    Mac - Host based Firewalls - pflist, Icefloor & Murus
  23. Урок 23. 00:06:23
    Mac - Host based Firewalls - Little Snitch
  24. Урок 24. 00:05:10
    Network based firewalls - Routers - DD-WRT
  25. Урок 25. 00:02:44
    Network based firewalls - Hardware
  26. Урок 26. 00:10:35
    Network based firewalls - pfSense, Smoothwall and Vyos
  27. Урок 27. 00:00:19
    Goals and Learning Objectives
  28. Урок 28. 00:06:36
    Network Attacks and Network Isolation - Introduction and IOT
  29. Урок 29. 00:06:20
    Network Attacks and Network Isolation - Arp Spoofing and Switches
  30. Урок 30. 00:12:28
    Effective Network Isolation Part 1
  31. Урок 31. 00:07:27
    Effective Network Isolation Part 2
  32. Урок 32. 00:00:26
    Goals and Learning Objectives
  33. Урок 33. 00:02:29
    Wi-Fi Weaknesses - WEP
  34. Урок 34. 00:13:42
    Wi-Fi Weaknesses - WPA, WPA2, TKIP and CCMP
  35. Урок 35. 00:06:50
    Wi-Fi Weaknesses - Wi-Fi Protected Setup WPS, Evil Twin and Rouge AP
  36. Урок 36. 00:04:02
    Wi-Fi Security Testing
  37. Урок 37. 00:14:19
    Wireless Security - Secure Configuration and Network Isolation
  38. Урок 38. 00:03:02
    Wireless security - RF Isolation and Reduction
  39. Урок 39. 00:03:21
    Wireless security - Who is on my Wi-Fi Network?
  40. Урок 40. 00:00:18
    Goals and Learning Objectives
  41. Урок 41. 00:17:00
    Syslog
  42. Урок 42. 00:14:02
    Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 1
  43. Урок 43. 00:08:00
    Network Monitoring - Wireshark, tcpdump, tshark, iptables Part 2
  44. Урок 44. 00:15:47
    Wireshark - Finding malware and hackers - Part 1
  45. Урок 45. 00:08:13
    Wireshark - Finding malware and hackers - Part 2
  46. Урок 46. 00:01:40
    Network Monitoring - Wincap, NST, Netminer and NetWorx
  47. Урок 47. 00:00:24
    Goals and Learning Objectives
  48. Урок 48. 00:04:26
    Types of Tracking
  49. Урок 49. 00:05:28
    IP Address
  50. Урок 50. 00:04:26
    3rd Party Connections
  51. Урок 51. 00:03:22
    HTTP Referer
  52. Урок 52. 00:08:01
    Cookies and Scripts
  53. Урок 53. 00:05:14
    Super Cookies
  54. Урок 54. 00:02:38
    Browser Fingerprinting and Browser Volunteered Information
  55. Урок 55. 00:01:40
    Browser and Browser Functionality
  56. Урок 56. 00:02:49
    More Tracking
  57. Урок 57. 00:06:36
    Browser and Internet Profiling
  58. Урок 58. 00:00:21
    Goals and Learning Objectives
  59. Урок 59. 00:12:45
    Search Engine Tracking, Censorship and Privacy
  60. Урок 60. 00:07:57
    Ixquick and Startpage
  61. Урок 61. 00:03:45
    DuckDuckGo
  62. Урок 62. 00:04:44
    Disconnect search
  63. Урок 63. 00:03:33
    YaCy
  64. Урок 64. 00:07:35
    Private and Anonymous Searching
  65. Урок 65. 00:00:22
    Goals and Learning Objectives
  66. Урок 66. 00:06:02
    Which Browser – Choice of Browser
  67. Урок 67. 00:11:35
    Reducing the Browser Attack Surface
  68. Урок 68. 00:09:27
    Browser Hacking Demo
  69. Урок 69. 00:06:11
    Browser Isolation and Compartmentalization
  70. Урок 70. 00:12:27
    Firefox Security, Privacy and Tracking
  71. Урок 71. 00:14:14
    uBlock origin - HTTP Filters, ad and track blockers
  72. Урок 72. 00:07:15
    uMatrix - HTTP Filters, ad and track blockers
  73. Урок 73. 00:06:38
    Disconnect, Ghostery, Request policy - HTTP Filters, ad and track blockers
  74. Урок 74. 00:06:47
    ABP, Privacy badger, WOT - HTTP Filters, ad and track blockers
  75. Урок 75. 00:08:30
    No-script - HTTP Filters, ad and track blockers
  76. Урок 76. 00:03:57
    Policeman and others - HTTP Filters, ad and track blockers
  77. Урок 77. 00:11:44
    History, Cookies and Super cookies Part 1
  78. Урок 78. 00:12:14
    History, Cookies and Super cookies Part 2
  79. Урок 79. 00:02:20
    HTTP Referer
  80. Урок 80. 00:18:27
    Browser Fingerprinting
  81. Урок 81. 00:11:30
    Certificates and Encryption
  82. Урок 82. 00:18:51
    Firefox Hardening
  83. Урок 83. 00:00:32
    Goals and Learning Objectives
  84. Урок 84. 00:03:23
    Password Attacks
  85. Урок 85. 00:16:18
    How Passwords are Cracked - Hashes - Part 1
  86. Урок 86. 00:07:10
    How Passwords are Cracked - Hashcat - Part 2
  87. Урок 87. 00:02:29
    Operating System Passwords
  88. Урок 88. 00:02:08
    Password Managers - An Introduction
  89. Урок 89. 00:05:13
    Password Managers - Master Password
  90. Урок 90. 00:05:56
    Password Managers - KeePass, KeePassX and KeyPassXC
  91. Урок 91. 00:11:23
    Password Managers - LastPass
  92. Урок 92. 00:07:35
    Password Managers - Hardening Lastpass
  93. Урок 93. 00:08:54
    Creating a Strong Password That You Can Remember - Part 1
  94. Урок 94. 00:09:24
    Creating a Strong Password That You Can Remember - Part 2
  95. Урок 95. 00:10:55
    Multi-Factor Authentication - Soft Tokens - Google Authenticator and Authy
  96. Урок 96. 00:05:54
    Multi-Factor Authentication - Hard Tokens - 2FA Dongles
  97. Урок 97. 00:02:51
    Choosing a Method of Multi-Factor Authentication
  98. Урок 98. 00:02:11
    Multi-Factor Authentication - Strengths and Weaknesses
  99. Урок 99. 00:01:24
    The Future of Password and Authentication
  100. Урок 100. 00:01:42
    Congratulations
  101. Урок 101. 00:00:57
    Certificate Of Completion for CPEs
  102. Урок 102. 00:11:45
    Which VPN protocol is best to use? and why?
  103. Урок 103. 00:10:34
    Email Tracking and Hacking
  104. Урок 104. 00:04:38
    Security Vulnerabilities, Threats and Adversaries