1. Урок 1.00:00:45
    Welcome to Volume 4
  2. Урок 2.00:02:07
    Introduction to the Instructor!
  3. Урок 3.00:11:25
    Security Quick Win!
  4. Урок 4.00:01:55
    Target Audience
  5. Урок 5.00:04:20
    Study Recommendations
  6. Урок 6.00:00:41
    Course updates
  7. Урок 7.00:04:39
    What is End Point Protection? and why is it important?
  8. Урок 8.00:03:27
    Goals and Learning Objectives - Volume 4
  9. Урок 9.00:00:46
    Goals and Learning Objectives
  10. Урок 10.00:07:49
    Disk Encryption – What is it good for?
  11. Урок 11.00:05:30
    Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
  12. Урок 12.00:11:18
    Disk Encryption Attacks - Physical
  13. Урок 13.00:02:22
    Disk Encryption Attacks - Containers, Volumes and Partitions
  14. Урок 14.00:02:41
    Windows - Disk Encryption - An Introduction
  15. Урок 15.00:12:08
    Windows - Disk Encryption - Bitlocker
  16. Урок 16.00:09:31
    Windows - Setting Up BitLocker
  17. Урок 17.00:11:29
    Windows - Disk Encryption - VeraCrypt
  18. Урок 18.00:03:07
    Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
  19. Урок 19.00:11:43
    Windows, Mac & Linux - Setting up VeraCrypt
  20. Урок 20.00:05:40
    Mac - Filevault2
  21. Урок 21.00:07:36
    Mac - Setting up Filevault2
  22. Урок 22.00:05:56
    Linux Whole Disk Encryption - Dm-crypt and LUKS
  23. Урок 23.00:05:10
    Linux - Setting up DMCrypt/LUKS
  24. Урок 24.00:04:48
    Linux - Encrypting the boot partition with Grub2
  25. Урок 25.00:01:48
    Self Encrypting Drives (SEDs)
  26. Урок 26.00:07:49
    Defense Against Disk Decryption Attacks
  27. Урок 27.00:04:14
    File Encryption
  28. Урок 28.00:07:36
    Mandatory Key Disclosure & Plausible Deniability
  29. Урок 29.00:03:21
    Nesting Crypto Systems & Obfuscation
  30. Урок 30.00:02:47
    Case Studies in Disk Decryption
  31. Урок 31.00:00:39
    Goals and Learning Objectives
  32. Урок 32.00:03:56
    Is Anti-Virus dead? - The Threat Landscape
  33. Урок 33.00:10:54
    Is Anti-Virus dead? - Protection Methods
  34. Урок 34.00:04:18
    Ransomware
  35. Урок 35.00:05:41
    Anti-Virus and End-Point-Protection Testing
  36. Урок 36.00:03:39
    The Problem With AV and EPP Testing
  37. Урок 37.00:04:05
    The Best of Business End-Point-Protection (EPP)
  38. Урок 38.00:04:06
    Windows - The Best of Anti-Virus and End-Point-Protection
  39. Урок 39.00:02:24
    Business End Point Protection (EPP)
  40. Урок 40.00:02:52
    Mac - XProtect
  41. Урок 41.00:02:35
    Mac - The Best of Anti-Virus and End-Point-Protection
  42. Урок 42.00:02:42
    Linux - The Best of Anti-Virus and End-Point-Protection
  43. Урок 43.00:03:13
    Online and Second Opinion - Anti-Virus and End-Point-Protection
  44. Урок 44.00:06:36
    Is Anti-Virus and End-Point-Protection Dangerous?
  45. Урок 45.00:00:35
    Goals and Learning Objectives
  46. Урок 46.00:05:00
    Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
  47. Урок 47.00:06:40
    End Point Detection and Response (EDR)
  48. Урок 48.00:06:58
    End-Point-Protection: How it works together in layers
  49. Урок 49.00:00:41
    Goals and Learning Objectives
  50. Урок 50.00:09:50
    What is application and execution control?
  51. Урок 51.00:06:28
    Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
  52. Урок 52.00:04:19
    Windows - Application control - User Account Control (UAC)
  53. Урок 53.00:04:35
    Windows - Application control - Software Restriction Policies
  54. Урок 54.00:10:24
    Windows - Application control - AppLocker
  55. Урок 55.00:02:44
    Windows - Application Control - Parental controls
  56. Урок 56.00:06:36
    Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
  57. Урок 57.00:12:59
    Windows - Exploitation Prevention - EMET
  58. Урок 58.00:04:50
    Windows - Exploitation Prevention - Traps, MBEA and HMPA
  59. Урок 59.00:11:34
    Windows 10 - Device Guard
  60. Урок 60.00:02:23
    Windows - Defender Application Guard for Microsoft Edge
  61. Урок 61.00:07:46
    Linux - Access Control Models
  62. Урок 62.00:02:14
    Linux - Security frameworks - AppArmor
  63. Урок 63.00:03:20
    Linux - Security frameworks - SElinux
  64. Урок 64.00:04:00
    Linux - Security frameworks - Grsecurity
  65. Урок 65.00:01:41
    Linux - Security frameworks - PaX and more
  66. Урок 66.00:08:04
    Linux & Mac - File permissions, POSIX and ACLs
  67. Урок 67.00:03:05
    Mac - Application control - Parental controls
  68. Урок 68.00:05:24
    Mac - Application control - Gatekeeper
  69. Урок 69.00:05:43
    Mac - Application control - System Integrity Protection
  70. Урок 70.00:03:48
    Mac - Application control - Santa
  71. Урок 71.00:07:19
    Mac - Application control - Xfence (Previously Little Flocker)
  72. Урок 72.00:01:20
    Mac - Other Stuff!
  73. Урок 73.00:07:51
    The New Normal For End-Point-Protection Technology
  74. Урок 74.00:04:47
    Cylance
  75. Урок 75.00:00:49
    Goals and Learning Objectives
  76. Урок 76.00:05:21
    A Complete Failure to Detect Threats
  77. Урок 77.00:04:38
    Rethinking Honeypots
  78. Урок 78.00:18:47
    CanaryTokens
  79. Урок 79.00:12:20
    OpenCanary
  80. Урок 80.00:03:33
    Artillery - Binary Defense
  81. Урок 81.00:01:14
    Honey Drive
  82. Урок 82.00:07:12
    Intrusion Detection Systems (IDS) Part 1 - Methods
  83. Урок 83.00:04:56
    Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
  84. Урок 84.00:04:41
    Host-Based Intrusion Detection - OSSEC
  85. Урок 85.00:03:06
    Network Analysis - Sguil, Xplico & NetworkMiner
  86. Урок 86.00:02:59
    File Integrity Monitoring (FIM) and Checking Part 1
  87. Урок 87.00:02:32
    File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
  88. Урок 88.00:02:05
    Network Security Toolkit (NST)
  89. Урок 89.00:01:18
    Security Onion
  90. Урок 90.00:02:52
    Security Information and Event Management Software (SIEM)
  91. Урок 91.00:00:50
    Goals and Learning Objectives
  92. Урок 92.00:08:21
    Introduction to Malware and Hacker Hunting
  93. Урок 93.00:09:21
    Windows - Farbar Recovery Scanner
  94. Урок 94.00:10:42
    Automated Malware Removal Tools
  95. Урок 95.00:06:43
    Live Rescue Operating Systems, CDs, and USBs
  96. Урок 96.00:11:34
    Windows - Malware Seek & Destroy - Process Explorer - Part 1
  97. Урок 97.00:10:05
    Windows - Malware Seek & Destroy - Process Explorer - Part 2
  98. Урок 98.00:02:10
    Windows - Malware Seek & Destroy - Process Tools
  99. Урок 99.00:02:32
    Windows - Malware Seek & Destroy - Sigcheck
  100. Урок 100.00:10:10
    Windows - Malware Seek & Destroy - Autoruns
  101. Урок 101.00:10:48
    Windows - Malware Seek & Destroy - Process Monitor
  102. Урок 102.00:08:12
    Windows - Malware Seek & Destroy - Network Connections
  103. Урок 103.00:02:22
    Malware Seek & Destroy - Networkx
  104. Урок 104.00:10:28
    Linux - Malware Seek & Destroy - Sysdig
  105. Урок 105.00:11:14
    Linux - Seek & Destroy Malware and Hackers - Csysdig
  106. Урок 106.00:01:54
    Linux - Seek & Destroy Malware and Hackers - debsums & unhide
  107. Урок 107.00:07:14
    Linux & Mac OS X - Malware Seek & Destroy - netstat
  108. Урок 108.00:08:16
    Linux & Mac OS X - Malware Seek & Destroy - lsof
  109. Урок 109.00:06:14
    Linux - Malware Seek & Destroy - rkhunter
  110. Урок 110.00:02:01
    Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD
  111. Урок 111.00:03:24
    Linux - Malware Seek & Destroy - Linux - Persistence Part 1
  112. Урок 112.00:10:19
    Linux - Malware Seek & Destroy - Linux - Persistence Part 2
  113. Урок 113.00:02:57
    Linux - Malware Seek & Destroy - Linux - Persistence Part 3
  114. Урок 114.00:05:23
    Mac - Malware Seek & Destroy - Task Explorer
  115. Урок 115.00:07:27
    Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer
  116. Урок 116.00:14:48
    Mac, Linux & Windows - OSquery
  117. Урок 117.00:07:29
    Firmware Rootkits – Seek and Destroy Part 1
  118. Урок 118.00:04:06
    Firmware Rootkits – Seek and Destroy Part 2
  119. Урок 119.00:03:18
    End-Point-Protection Recovery and Remediation Technology
  120. Урок 120.00:06:04
    Encrypted Backup and Cloud Storage
  121. Урок 121.00:00:48
    Goals and Learning Objectives
  122. Урок 122.00:05:29
    An Introduction to Hardening
  123. Урок 123.00:10:02
    Hardening Standards
  124. Урок 124.00:12:47
    OpenSCAP
  125. Урок 125.00:03:32
    Baseline Auditing
  126. Урок 126.00:01:55
    Windows - Hardening
  127. Урок 127.00:11:02
    Windows - Security Compliance Manager (SCM)
  128. Урок 128.00:01:36
    Mac – Hardening
  129. Урок 129.00:03:32
    Linux – Hardening
  130. Урок 130.00:04:50
    Security Focused Operating Systems
  131. Урок 131.00:01:17
    Monitoring for Security Drift
  132. Урок 132.00:00:44
    Goals and Learning Objectives
  133. Урок 133.00:08:11
    Secure File Deletion - Mechanical drives
  134. Урок 134.00:06:38
    Secure File Deletion - Solid Sate Drives
  135. Урок 135.00:04:43
    Evidence Elimination & Anti-Forensics - An Introduction
  136. Урок 136.00:07:03
    Evidence Elimination - CCleaner and Bleachit
  137. Урок 137.00:05:50
    Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer
  138. Урок 138.00:05:47
    Disk Wiping - Mechanical Drives
  139. Урок 139.00:10:54
    Disk Wiping - Solid State Drives (SSD)
  140. Урок 140.00:06:57
    Scrubbing EXIF & Metadata Part 1 - Introduction
  141. Урок 141.00:05:15
    Scrubbing EXIF & Metadata Part 2 - Tools
  142. Урок 142.00:04:37
    Scrubbing EXIF & Metadata Part 3 - Guidance
  143. Урок 143.00:04:07
    Sensor Noise Camera Identification
  144. Урок 144.00:01:06
    Goals and Learning Objectives
  145. Урок 145.00:13:18
    Clients, Protocols and Authentication
  146. Урок 146.00:13:03
    Email Weaknesses
  147. Урок 147.00:05:51
    PGP, GPG & Privacy
  148. Урок 148.00:06:29
    PGP & GPG Clients
  149. Урок 149.00:19:53
    Windows - PGP & GPG
  150. Урок 150.00:04:02
    Tail - PGP & GPG
  151. Урок 151.00:06:16
    PGP & GPG Weaknesses
  152. Урок 152.00:02:33
    Improving OpenPGP Security - Best Practices - Part 1
  153. Урок 153.00:12:21
    Improving OpenPGP Security - Primary and Subkeys - Part 2
  154. Урок 154.00:07:43
    Improving OpenPGP Security - Smartcards/Yubikey - Part 3
  155. Урок 155.00:10:34
    Email Tracking & Exploits
  156. Урок 156.00:06:19
    Email Anonymity & Pseudonymity
  157. Урок 157.00:07:37
    TorBirdy
  158. Урок 158.00:07:35
    Remailers
  159. Урок 159.00:13:47
    Choosing an Email Provider
  160. Урок 160.00:03:18
    Email Alternatives
  161. Урок 161.00:00:20
    Goals and Learning Objectives
  162. Урок 162.00:03:09
    An Introduction to Instant Messengers
  163. Урок 163.00:02:31
    Instant Messenger - Signal
  164. Урок 164.00:01:40
    Instant Messengers - Chatsecure
  165. Урок 165.00:00:46
    Instant Messengers - Cryptocat
  166. Урок 166.00:00:47
    Instant Messengers - Ricochet
  167. Урок 167.00:00:39
    Instant Messengers - Other
  168. Урок 168.00:04:29
    Video and Voice Messengers - Linphone
  169. Урок 169.00:01:41
    Video and Voice Messengers - Jitsi
  170. Урок 170.00:00:58
    Video and Voice Messengers - Other
  171. Урок 171.00:00:30
    Congratulations!!
  172. Урок 172.00:00:57
    Certificate Of Completion for CPEs
  173. Урок 173.00:19:08
    Qubes OS
  174. Урок 174.00:12:28
    Effective Network Isolation
  175. Урок 175.00:10:21
    Socks5 proxy tunneling