-
Урок 1.
00:02:07
Welcome and Introduction to the Instructor!
-
Урок 2.
00:12:00
Security Quick Win!
-
Урок 3.
00:02:31
Goals and Learning Objectives - Volume 1
-
Урок 4.
00:01:55
Target Audience
-
Урок 5.
00:05:17
Study Recommendations
-
Урок 6.
00:00:41
Course updates
-
Урок 7.
00:03:46
Cyber Security and Ethical Hacking Careers
-
Урок 8.
00:01:09
Theory and Practical
-
Урок 9.
00:00:42
Goals and Learning Objectives
-
Урок 10.
00:04:38
Protect What You Value
-
Урок 11.
00:04:37
What is Privacy, Anonymity and Pseudonymity
-
Урок 12.
00:04:38
Security, Vulnerabilities, Threats and Adversaries
-
Урок 13.
00:03:22
Asset Selection
-
Урок 14.
00:07:52
Threat Modeling and Risk Assessments
-
Урок 15.
00:01:57
Security vs Privacy vs Anonymity - Can we have it all?
-
Урок 16.
00:09:23
Confidentiality, Integrity and Availability - (Security Attributes)
-
Урок 17.
00:01:37
Defense In Depth
-
Урок 18.
00:03:41
The Zero Trust Model
-
Урок 19.
00:00:45
Goals and Learning Objectives
-
Урок 20.
00:05:15
Why You Need Security – The Value Of A Hack
-
Урок 21.
00:01:24
The Top 3 Things You Need To Stay Safe Online
-
Урок 22.
00:09:36
Security Bugs and Vulnerabilities - The Vulnerability Landscape
-
Урок 23.
00:02:33
Hackers, crackers and cyber criminals
-
Урок 24.
00:06:53
Malware, viruses, rootkits and RATs
-
Урок 25.
00:04:45
Spyware, Adware, Scareware, PUPs & Browser hijacking
-
Урок 26.
00:15:07
What is Phishing, Vishing and SMShing
-
Урок 27.
00:03:16
Spamming & Doxing
-
Урок 28.
00:05:33
Social engineering - Scams, cons, tricks and fraud
-
Урок 29.
00:08:43
CPU Hijackers - Crypto Mining Malware and Cryptojackers
-
Урок 30.
00:08:02
Darknets, Dark Markets and Exploit kits
-
Урок 31.
00:05:14
Governments, spies and secret stuff part I
-
Урок 32.
00:10:36
Governments, spies and secret stuff part II
-
Урок 33.
00:14:38
Regulating encryption, mandating insecurity & legalizing spying
-
Урок 34.
00:10:15
Trust & Backdoors
-
Урок 35.
00:02:25
Censorship
-
Урок 36.
00:01:13
Cyber Threat Intelligence – Stay Informed
-
Урок 37.
00:00:25
Goals and Learning Objectives
-
Урок 38.
00:09:55
Symmetric Encryption
-
Урок 39.
00:10:18
Asymmetric Encryption
-
Урок 40.
00:06:33
Hash Functions
-
Урок 41.
00:04:46
Digital Signatures
-
Урок 42.
00:13:27
Secure Sockets Layer (SSL) and Transport layer security (TLS)
-
Урок 43.
00:12:03
SSL Stripping
-
Урок 44.
00:07:00
HTTPS (HTTP Secure)
-
Урок 45.
00:06:21
Digital Certificates
-
Урок 46.
00:14:08
Certificate Authorities and HTTPS
-
Урок 47.
00:01:58
End-to-End Encryption (E2EE)
-
Урок 48.
00:08:13
Steganography
-
Урок 49.
00:02:43
How Security and Encryption is Really Attacked
-
Урок 50.
00:00:29
Goals and Learning Objectives
-
Урок 51.
00:10:02
Introduction to Setting up a Testing Environment Using Virtual Machines
-
Урок 52.
00:10:56
Vmware
-
Урок 53.
00:12:10
Virtual box
-
Урок 54.
00:04:12
Kali Linux 2018
-
Урок 55.
00:00:38
Goals and Learning Objectives
-
Урок 56.
00:05:57
Security Features and Functionality
-
Урок 57.
00:05:32
Security Bugs and Vulnerabilities
-
Урок 58.
00:05:02
Usage Share
-
Урок 59.
00:06:09
Windows 10 - Privacy & Tracking
-
Урок 60.
00:04:43
Windows 10 - Disable tracking automatically
-
Урок 61.
00:08:15
Windows 10 - Tool : Disable Windows 10 Tracking
-
Урок 62.
00:03:00
Windows 10 – Cortana
-
Урок 63.
00:09:41
Windows 10 – Privacy Settings
-
Урок 64.
00:04:17
Windows 10 - WiFi Sense
-
Урок 65.
00:07:20
Windows 7, 8 and 8.1 - Privacy & Tracking
-
Урок 66.
00:04:29
Mac - Privacy & Tracking
-
Урок 67.
00:03:31
Linux and Unix “like” Operating systems
-
Урок 68.
00:04:10
General Use Operating Systems (Windows, MacOS and Linux)
-
Урок 69.
00:05:05
General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)
-
Урок 70.
00:02:56
Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)
-
Урок 71.
00:02:57
Anonymity Focused Operating Systems (Tails and Whonix OS)
-
Урок 72.
00:00:50
Penetration Testing and Ethical Hacking Focused Operating Systems
-
Урок 73.
00:02:32
Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)
-
Урок 74.
00:06:27
Linux - Debian 8 Jessie - Virtual box guest additions Issue
-
Урок 75.
00:00:26
Goals and Learning Objectives
-
Урок 76.
00:03:48
The Importance of Patching
-
Урок 77.
00:01:16
Windows 7 - Auto Update
-
Урок 78.
00:01:26
Windows 8 & 8.1 - Auto Update
-
Урок 79.
00:01:26
Windows 10 - Auto Update
-
Урок 80.
00:03:47
Windows - Criticality and Patch Tuesday
-
Урок 81.
00:08:35
Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
-
Урок 82.
00:10:59
Linux - Debian - Patching
-
Урок 83.
00:06:59
Mac - Patching
-
Урок 84.
00:04:24
Firefox - Browser and extension updates
-
Урок 85.
00:01:14
Chrome - Browser and extension updates
-
Урок 86.
00:00:47
IE and Edge - Browser and extention updates
-
Урок 87.
00:01:43
Auto updates - The Impact to privacy and anonymity
-
Урок 88.
00:02:54
Goals and Learning Objectives - Removing Privilege
-
Урок 89.
00:03:33
Windows 7 - Not using admin
-
Урок 90.
00:04:16
Windows 8 and 8.1 - Not using admin
-
Урок 91.
00:03:26
Windows 10 - Not using admin
-
Урок 92.
00:00:27
Goals and Learning Objectives
-
Урок 93.
00:12:35
Information Disclosure and Identity Strategies for Social Media
-
Урок 94.
00:05:07
Identify Verification and Registration
-
Урок 95.
00:07:52
Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1
-
Урок 96.
00:10:23
Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2
-
Урок 97.
00:05:03
Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)
-
Урок 98.
00:00:22
Goals and Learning Objectives
-
Урок 99.
00:10:01
Security Domains
-
Урок 100.
00:00:39
Goals and Learning Objectives
-
Урок 101.
00:02:11
Introduction to Isolation and Compartmentalization
-
Урок 102.
00:07:11
Physical and Hardware Isolation - How to change the Mac Address
-
Урок 103.
00:11:19
Physical and Hardware Isolation - Hardware Serials
-
Урок 104.
00:08:37
Virtual Isolation
-
Урок 105.
00:02:42
Dual Boot
-
Урок 106.
00:03:08
Built-in Sandboxes and Application Isolation
-
Урок 107.
00:05:58
Windows - Sandboxes and Application Isolation
-
Урок 108.
00:11:30
Windows - Sandboxes and Application Isolation - Sandboxie
-
Урок 109.
00:03:05
Linux - Sandboxes and Application Isolation
-
Урок 110.
00:06:35
Mac - Sandboxes and Application Isolation
-
Урок 111.
00:10:52
Virtual Machines
-
Урок 112.
00:10:32
Virtual Machine Weaknesses
-
Урок 113.
00:09:16
Virtual Machine Hardening
-
Урок 114.
00:20:52
Whonix OS - Anonymous Operating system
-
Урок 115.
00:04:19
Whonix OS - Weaknesses
-
Урок 116.
00:19:08
Qubes OS
-
Урок 117.
00:04:43
Security Domains, Isolation and Compartmentalization
-
Урок 118.
00:00:59
Congratulations
-
Урок 119.
00:00:57
Certificate Of Completion for CPEs
-
Урок 120.
00:16:24
Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys)
-
Урок 121.
00:07:10
Sample from Vol 2 - Password cracking part 2
-
Урок 122.
00:15:22
Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3
-
Урок 123.
00:13:18
Sample from Vol 4 - Email clients, protocols and authentication