Урок 1.00:02:07
Welcome and Introduction to the Instructor!
Урок 2.00:12:00
Security Quick Win!
Урок 3.00:02:31
Goals and Learning Objectives - Volume 1
Урок 4.00:01:55
Target Audience
Урок 5.00:05:17
Study Recommendations
Урок 6.00:00:41
Course updates
Урок 7.00:03:46
Cyber Security and Ethical Hacking Careers
Урок 8.00:01:09
Theory and Practical
Урок 9.00:00:42
Goals and Learning Objectives
Урок 10.00:04:38
Protect What You Value
Урок 11.00:04:37
What is Privacy, Anonymity and Pseudonymity
Урок 12.00:04:38
Security, Vulnerabilities, Threats and Adversaries
Урок 13.00:03:22
Asset Selection
Урок 14.00:07:52
Threat Modeling and Risk Assessments
Урок 15.00:01:57
Security vs Privacy vs Anonymity - Can we have it all?
Урок 16.00:09:23
Confidentiality, Integrity and Availability - (Security Attributes)
Урок 17.00:01:37
Defense In Depth
Урок 18.00:03:41
The Zero Trust Model
Урок 19.00:00:45
Goals and Learning Objectives
Урок 20.00:05:15
Why You Need Security – The Value Of A Hack
Урок 21.00:01:24
The Top 3 Things You Need To Stay Safe Online
Урок 22.00:09:36
Security Bugs and Vulnerabilities - The Vulnerability Landscape
Урок 23.00:02:33
Hackers, crackers and cyber criminals
Урок 24.00:06:53
Malware, viruses, rootkits and RATs
Урок 25.00:04:45
Spyware, Adware, Scareware, PUPs & Browser hijacking
Урок 26.00:15:07
What is Phishing, Vishing and SMShing
Урок 27.00:03:16
Spamming & Doxing
Урок 28.00:05:33
Social engineering - Scams, cons, tricks and fraud
Урок 29.00:08:43
CPU Hijackers - Crypto Mining Malware and Cryptojackers
Урок 30.00:08:02
Darknets, Dark Markets and Exploit kits
Урок 31.00:05:14
Governments, spies and secret stuff part I
Урок 32.00:10:36
Governments, spies and secret stuff part II
Урок 33.00:14:38
Regulating encryption, mandating insecurity & legalizing spying
Урок 34.00:10:15
Trust & Backdoors
Урок 35.00:02:25
Censorship
Урок 36.00:01:13
Cyber Threat Intelligence – Stay Informed
Урок 37.00:00:25
Goals and Learning Objectives
Урок 38.00:09:55
Symmetric Encryption
Урок 39.00:10:18
Asymmetric Encryption
Урок 40.00:06:33
Hash Functions
Урок 41.00:04:46
Digital Signatures
Урок 42.00:13:27
Secure Sockets Layer (SSL) and Transport layer security (TLS)
Урок 43.00:12:03
SSL Stripping
Урок 44.00:07:00
HTTPS (HTTP Secure)
Урок 45.00:06:21
Digital Certificates
Урок 46.00:14:08
Certificate Authorities and HTTPS
Урок 47.00:01:58
End-to-End Encryption (E2EE)
Урок 48.00:08:13
Steganography
Урок 49.00:02:43
How Security and Encryption is Really Attacked
Урок 50.00:00:29
Goals and Learning Objectives
Урок 51.00:10:02
Introduction to Setting up a Testing Environment Using Virtual Machines
Урок 52.00:10:56
Vmware
Урок 53.00:12:10
Virtual box
Урок 54.00:04:12
Kali Linux 2018
Урок 55.00:00:38
Goals and Learning Objectives
Урок 56.00:05:57
Security Features and Functionality
Урок 57.00:05:32
Security Bugs and Vulnerabilities
Урок 58.00:05:02
Usage Share
Урок 59.00:06:09
Windows 10 - Privacy & Tracking
Урок 60.00:04:43
Windows 10 - Disable tracking automatically
Урок 61.00:08:15
Windows 10 - Tool : Disable Windows 10 Tracking
Урок 62.00:03:00
Windows 10 – Cortana
Урок 63.00:09:41
Windows 10 – Privacy Settings
Урок 64.00:04:17
Windows 10 - WiFi Sense
Урок 65.00:07:20
Windows 7, 8 and 8.1 - Privacy & Tracking
Урок 66.00:04:29
Mac - Privacy & Tracking
Урок 67.00:03:31
Linux and Unix “like” Operating systems
Урок 68.00:04:10
General Use Operating Systems (Windows, MacOS and Linux)
Урок 69.00:05:05
General Use Operating Systems With a Security and Privacy Focus (Debian, Arch)
Урок 70.00:02:56
Pure Security Focused Operating Systems (QubesOS, Subgraph OS, Trisquel OS)
Урок 71.00:02:57
Anonymity Focused Operating Systems (Tails and Whonix OS)
Урок 72.00:00:50
Penetration Testing and Ethical Hacking Focused Operating Systems
Урок 73.00:02:32
Mobile Operating Systems with Security & Privacy Focus (LineageOS, Sailfish)
Урок 74.00:06:27
Linux - Debian 8 Jessie - Virtual box guest additions Issue
Урок 75.00:00:26
Goals and Learning Objectives
Урок 76.00:03:48
The Importance of Patching
Урок 77.00:01:16
Windows 7 - Auto Update
Урок 78.00:01:26
Windows 8 & 8.1 - Auto Update
Урок 79.00:01:26
Windows 10 - Auto Update
Урок 80.00:03:47
Windows - Criticality and Patch Tuesday
Урок 81.00:08:35
Windows 7, 8, 8.1 & 10 - Automate the pain away from patching
Урок 82.00:10:59
Linux - Debian - Patching
Урок 83.00:06:59
Mac - Patching
Урок 84.00:04:24
Firefox - Browser and extension updates
Урок 85.00:01:14
Chrome - Browser and extension updates
Урок 86.00:00:47
IE and Edge - Browser and extention updates
Урок 87.00:01:43
Auto updates - The Impact to privacy and anonymity
Урок 88.00:02:54
Goals and Learning Objectives - Removing Privilege
Урок 89.00:03:33
Windows 7 - Not using admin
Урок 90.00:04:16
Windows 8 and 8.1 - Not using admin
Урок 91.00:03:26
Windows 10 - Not using admin
Урок 92.00:00:27
Goals and Learning Objectives
Урок 93.00:12:35
Information Disclosure and Identity Strategies for Social Media
Урок 94.00:05:07
Identify Verification and Registration
Урок 95.00:07:52
Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1
Урок 96.00:10:23
Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2
Урок 97.00:05:03
Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons)
Урок 98.00:00:22
Goals and Learning Objectives
Урок 99.00:10:01
Security Domains
Урок 100.00:00:39
Goals and Learning Objectives
Урок 101.00:02:11
Introduction to Isolation and Compartmentalization
Урок 102.00:07:11
Physical and Hardware Isolation - How to change the Mac Address
Урок 103.00:11:19
Physical and Hardware Isolation - Hardware Serials
Урок 104.00:08:37
Virtual Isolation
Урок 105.00:02:42
Dual Boot
Урок 106.00:03:08
Built-in Sandboxes and Application Isolation
Урок 107.00:05:58
Windows - Sandboxes and Application Isolation
Урок 108.00:11:30
Windows - Sandboxes and Application Isolation - Sandboxie
Урок 109.00:03:05
Linux - Sandboxes and Application Isolation
Урок 110.00:06:35
Mac - Sandboxes and Application Isolation
Урок 111.00:10:52
Virtual Machines
Урок 112.00:10:32
Virtual Machine Weaknesses
Урок 113.00:09:16
Virtual Machine Hardening
Урок 114.00:20:52
Whonix OS - Anonymous Operating system
Урок 115.00:04:19
Whonix OS - Weaknesses
Урок 116.00:19:08
Qubes OS
Урок 117.00:04:43
Security Domains, Isolation and Compartmentalization
Урок 118.00:00:59
Congratulations
Урок 119.00:00:57
Certificate Of Completion for CPEs
Урок 120.00:16:24
Sample from Vol 2 - Router Vulnerability Scanning (Shodan, Qualys)
Урок 121.00:07:10
Sample from Vol 2 - Password cracking part 2
Урок 122.00:15:22
Sample from Vol 3 - Bypassing firewalls and HTTP proxies part 3
Урок 123.00:13:18
Sample from Vol 4 - Email clients, protocols and authentication