• Урок 1. 00:02:07
    Welcome and Introduction to the Instructor!
  • Урок 2. 00:12:00
    Security Quick Win!
  • Урок 3. 00:02:31
    Goals and Learning Objectives - Volume 1
  • Урок 4. 00:01:55
    Target Audience
  • Урок 5. 00:05:17
    Study Recommendations
  • Урок 6. 00:00:41
    Course updates
  • Урок 7. 00:03:46
    Cyber Security and Ethical Hacking Careers
  • Урок 8. 00:01:09
    Theory and Practical
  • Урок 9. 00:00:42
    Goals and Learning Objectives
  • Урок 10. 00:04:38
    Protect What You Value
  • Урок 11. 00:04:37
    What is Privacy, Anonymity and Pseudonymity
  • Урок 12. 00:04:38
    Security, Vulnerabilities, Threats and Adversaries
  • Урок 13. 00:03:22
    Asset Selection
  • Урок 14. 00:07:52
    Threat Modeling and Risk Assessments
  • Урок 15. 00:01:57
    Security vs Privacy vs Anonymity - Can we have it all?
  • Урок 16. 00:09:23
    Confidentiality, Integrity and Availability - (Security Attributes)
  • Урок 17. 00:01:37
    Defense In Depth
  • Урок 18. 00:03:41
    The Zero Trust Model
  • Урок 19. 00:00:45
    Goals and Learning Objectives
  • Урок 20. 00:05:15
    Why You Need Security – The Value Of A Hack
  • Урок 21. 00:01:24
    The Top 3 Things You Need To Stay Safe Online
  • Урок 22. 00:09:36
    Security Bugs and Vulnerabilities - The Vulnerability Landscape
  • Урок 23. 00:02:33
    Hackers, crackers and cyber criminals
  • Урок 24. 00:06:53
    Malware, viruses, rootkits and RATs
  • Урок 25. 00:04:45
    Spyware, Adware, Scareware, PUPs & Browser hijacking
  • Урок 26. 00:15:07
    What is Phishing, Vishing and SMShing
  • Урок 27. 00:03:16
    Spamming & Doxing
  • Урок 28. 00:05:33
    Social engineering - Scams, cons, tricks and fraud
  • Урок 29. 00:08:43
    CPU Hijackers - Crypto Mining Malware and Cryptojackers
  • Урок 30. 00:08:02
    Darknets, Dark Markets and Exploit kits
  • Урок 31. 00:05:14
    Governments, spies and secret stuff part I
  • Урок 32. 00:10:36
    Governments, spies and secret stuff part II
  • Урок 33. 00:14:38
    Regulating encryption, mandating insecurity & legalizing spying
  • Урок 34. 00:10:15
    Trust & Backdoors
  • Урок 35. 00:02:25
    Censorship
  • Урок 36. 00:01:13
    Cyber Threat Intelligence – Stay Informed
  • Урок 37. 00:00:25
    Goals and Learning Objectives
  • Урок 38. 00:09:55
    Symmetric Encryption
  • Урок 39. 00:10:18
    Asymmetric Encryption
  • Урок 40. 00:06:33
    Hash Functions
  • Урок 41. 00:04:46
    Digital Signatures
  • Урок 42. 00:13:27
    Secure Sockets Layer (SSL) and Transport layer security (TLS)
  • Урок 43. 00:12:03
    SSL Stripping
  • Урок 44. 00:07:00
    HTTPS (HTTP Secure)
  • Урок 45. 00:06:21
    Digital Certificates
  • Урок 46. 00:14:08
    Certificate Authorities and HTTPS
  • Урок 47. 00:01:58
    End-to-End Encryption (E2EE)
  • Урок 48. 00:08:13
    Steganography
  • Урок 49. 00:02:43
    How Security and Encryption is Really Attacked
  • Урок 50. 00:00:29
    Goals and Learning Objectives
  • Урок 51. 00:10:02
    Introduction to Setting up a Testing Environment Using Virtual Machines
  • Урок 52. 00:10:56
    Vmware
  • Урок 53. 00:12:10
    Virtual box
  • Урок 54. 00:04:12
    Kali Linux 2018
  • Урок 55. 00:00:38
    Goals and Learning Objectives
  • Урок 56. 00:05:57
    Security Features and Functionality
  • Урок 57. 00:05:32
    Security Bugs and Vulnerabilities
  • Урок 58. 00:05:02
    Usage Share
  • Урок 59. 00:06:09
    Windows 10 - Privacy & Tracking
  • Урок 60. 00:04:43
    Windows 10 - Disable tracking automatically
  • Урок 61. 00:08:15
    Windows 10 - Tool : Disable Windows 10 Tracking
  • Урок 62. 00:03:00
    Windows 10 – Cortana
  • Урок 63. 00:09:41
    Windows 10 – Privacy Settings
  • Урок 64. 00:04:17
    Windows 10 - WiFi Sense
  • Урок 65. 00:07:20
    Windows 7, 8 and 8.1 - Privacy & Tracking
  • Урок 66. 00:04:29
    Mac - Privacy & Tracking
  • Урок 67. 00:03:31
    Linux and Unix “like” Operating systems
  • Урок 68. 00:04:10
    General Use Operating Systems (Windows, MacOS and Linux)
  • Урок 69. 00:05:05
    General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)
  • Урок 70. 00:02:56
    Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)
  • Урок 71. 00:02:57
    Anonymity Focused Operating Systems (Tails and Whonix OS)
  • Урок 72. 00:00:50
    Penetration Testing and Ethical Hacking Focused Operating Systems
  • Урок 73. 00:02:32
    Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)
  • Урок 74. 00:06:27
    Linux - Debian 8 Jessie - Virtual box guest additions Issue
  • Урок 75. 00:00:26
    Goals and Learning Objectives
  • Урок 76. 00:03:48
    The Importance of Patching
  • Урок 77. 00:01:16
    Windows 7 - Auto Update
  • Урок 78. 00:01:26
    Windows 8 & 8.1 - Auto Update
  • Урок 79. 00:01:26
    Windows 10 - Auto Update
  • Урок 80. 00:03:47
    Windows - Criticality and Patch Tuesday
  • Урок 81. 00:08:35
    Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
  • Урок 82. 00:10:59
    Linux - Debian - Patching
  • Урок 83. 00:06:59
    Mac - Patching
  • Урок 84. 00:04:24
    Firefox - Browser and extension updates
  • Урок 85. 00:01:14
    Chrome - Browser and extension updates
  • Урок 86. 00:00:47
    IE and Edge - Browser and extention updates
  • Урок 87. 00:01:43
    Auto updates - The Impact to privacy and anonymity
  • Урок 88. 00:02:54
    Goals and Learning Objectives - Removing Privilege
  • Урок 89. 00:03:33
    Windows 7 - Not using admin
  • Урок 90. 00:04:16
    Windows 8 and 8.1 - Not using admin
  • Урок 91. 00:03:26
    Windows 10 - Not using admin
  • Урок 92. 00:00:27
    Goals and Learning Objectives
  • Урок 93. 00:12:35
    Information Disclosure and Identity Strategies for Social Media
  • Урок 94. 00:05:07
    Identify Verification and Registration
  • Урок 95. 00:07:52
    Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1
  • Урок 96. 00:10:23
    Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2
  • Урок 97. 00:05:03
    Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)
  • Урок 98. 00:00:22
    Goals and Learning Objectives
  • Урок 99. 00:10:01
    Security Domains
  • Урок 100. 00:00:39
    Goals and Learning Objectives
  • Урок 101. 00:02:11
    Introduction to Isolation and Compartmentalization
  • Урок 102. 00:07:11
    Physical and Hardware Isolation - How to change the Mac Address
  • Урок 103. 00:11:19
    Physical and Hardware Isolation - Hardware Serials
  • Урок 104. 00:08:37
    Virtual Isolation
  • Урок 105. 00:02:42
    Dual Boot
  • Урок 106. 00:03:08
    Built-in Sandboxes and Application Isolation
  • Урок 107. 00:05:58
    Windows - Sandboxes and Application Isolation
  • Урок 108. 00:11:30
    Windows - Sandboxes and Application Isolation - Sandboxie
  • Урок 109. 00:03:05
    Linux - Sandboxes and Application Isolation
  • Урок 110. 00:06:35
    Mac - Sandboxes and Application Isolation
  • Урок 111. 00:10:52
    Virtual Machines
  • Урок 112. 00:10:32
    Virtual Machine Weaknesses
  • Урок 113. 00:09:16
    Virtual Machine Hardening
  • Урок 114. 00:20:52
    Whonix OS - Anonymous Operating system
  • Урок 115. 00:04:19
    Whonix OS - Weaknesses
  • Урок 116. 00:19:08
    Qubes OS
  • Урок 117. 00:04:43
    Security Domains, Isolation and Compartmentalization
  • Урок 118. 00:00:59
    Congratulations
  • Урок 119. 00:00:57
    Certificate Of Completion for CPEs
  • Урок 120. 00:16:24
    Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys)
  • Урок 121. 00:07:10
    Sample from Vol 2 - Password cracking part 2
  • Урок 122. 00:15:22
    Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3
  • Урок 123. 00:13:18
    Sample from Vol 4 - Email clients, protocols and authentication
Этот курс находится в платной подписке. Оформи премиум подписку и смотри The Complete Cyber Security Course : Hackers Exposed!, а также все другие курсы, прямо сейчас!
Премиум