1. Урок 1. 00:00:45
    Welcome to Volume 4
  2. Урок 2. 00:02:07
    Introduction to the Instructor!
  3. Урок 3. 00:11:25
    Security Quick Win!
  4. Урок 4. 00:01:55
    Target Audience
  5. Урок 5. 00:04:20
    Study Recommendations
  6. Урок 6. 00:00:41
    Course updates
  7. Урок 7. 00:04:39
    What is End Point Protection? and why is it important?
  8. Урок 8. 00:03:27
    Goals and Learning Objectives - Volume 4
  9. Урок 9. 00:00:46
    Goals and Learning Objectives
  10. Урок 10. 00:07:49
    Disk Encryption – What is it good for?
  11. Урок 11. 00:05:30
    Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
  12. Урок 12. 00:11:18
    Disk Encryption Attacks - Physical
  13. Урок 13. 00:02:22
    Disk Encryption Attacks - Containers, Volumes and Partitions
  14. Урок 14. 00:02:41
    Windows - Disk Encryption - An Introduction
  15. Урок 15. 00:12:08
    Windows - Disk Encryption - Bitlocker
  16. Урок 16. 00:09:31
    Windows - Setting Up BitLocker
  17. Урок 17. 00:11:29
    Windows - Disk Encryption - VeraCrypt
  18. Урок 18. 00:03:07
    Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
  19. Урок 19. 00:11:43
    Windows, Mac & Linux - Setting up VeraCrypt
  20. Урок 20. 00:05:40
    Mac - Filevault2
  21. Урок 21. 00:07:36
    Mac - Setting up Filevault2
  22. Урок 22. 00:05:56
    Linux Whole Disk Encryption - Dm-crypt and LUKS
  23. Урок 23. 00:05:10
    Linux - Setting up DMCrypt/LUKS
  24. Урок 24. 00:04:48
    Linux - Encrypting the boot partition with Grub2
  25. Урок 25. 00:01:48
    Self Encrypting Drives (SEDs)
  26. Урок 26. 00:07:49
    Defense Against Disk Decryption Attacks
  27. Урок 27. 00:04:14
    File Encryption
  28. Урок 28. 00:07:36
    Mandatory Key Disclosure & Plausible Deniability
  29. Урок 29. 00:03:21
    Nesting Crypto Systems & Obfuscation
  30. Урок 30. 00:02:47
    Case Studies in Disk Decryption
  31. Урок 31. 00:00:39
    Goals and Learning Objectives
  32. Урок 32. 00:03:56
    Is Anti-Virus dead? - The Threat Landscape
  33. Урок 33. 00:10:54
    Is Anti-Virus dead? - Protection Methods
  34. Урок 34. 00:04:18
    Ransomware
  35. Урок 35. 00:05:41
    Anti-Virus and End-Point-Protection Testing
  36. Урок 36. 00:03:39
    The Problem With AV and EPP Testing
  37. Урок 37. 00:04:05
    The Best of Business End-Point-Protection (EPP)
  38. Урок 38. 00:04:06
    Windows - The Best of Anti-Virus and End-Point-Protection
  39. Урок 39. 00:02:24
    Business End Point Protection (EPP)
  40. Урок 40. 00:02:52
    Mac - XProtect
  41. Урок 41. 00:02:35
    Mac - The Best of Anti-Virus and End-Point-Protection
  42. Урок 42. 00:02:42
    Linux - The Best of Anti-Virus and End-Point-Protection
  43. Урок 43. 00:03:13
    Online and Second Opinion - Anti-Virus and End-Point-Protection
  44. Урок 44. 00:06:36
    Is Anti-Virus and End-Point-Protection Dangerous?
  45. Урок 45. 00:00:35
    Goals and Learning Objectives
  46. Урок 46. 00:05:00
    Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
  47. Урок 47. 00:06:40
    End Point Detection and Response (EDR)
  48. Урок 48. 00:06:58
    End-Point-Protection: How it works together in layers
  49. Урок 49. 00:00:41
    Goals and Learning Objectives
  50. Урок 50. 00:09:50
    What is application and execution control?
  51. Урок 51. 00:06:28
    Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
  52. Урок 52. 00:04:19
    Windows - Application control - User Account Control (UAC)
  53. Урок 53. 00:04:35
    Windows - Application control - Software Restriction Policies
  54. Урок 54. 00:10:24
    Windows - Application control - AppLocker
  55. Урок 55. 00:02:44
    Windows - Application Control - Parental controls
  56. Урок 56. 00:06:36
    Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
  57. Урок 57. 00:12:59
    Windows - Exploitation Prevention - EMET
  58. Урок 58. 00:04:50
    Windows - Exploitation Prevention - Traps, MBEA and HMPA
  59. Урок 59. 00:11:34
    Windows 10 - Device Guard
  60. Урок 60. 00:02:23
    Windows - Defender Application Guard for Microsoft Edge
  61. Урок 61. 00:07:46
    Linux - Access Control Models
  62. Урок 62. 00:02:14
    Linux - Security frameworks - AppArmor
  63. Урок 63. 00:03:20
    Linux - Security frameworks - SElinux
  64. Урок 64. 00:04:00
    Linux - Security frameworks - Grsecurity
  65. Урок 65. 00:01:41
    Linux - Security frameworks - PaX and more
  66. Урок 66. 00:08:04
    Linux & Mac - File permissions, POSIX and ACLs
  67. Урок 67. 00:03:05
    Mac - Application control - Parental controls
  68. Урок 68. 00:05:24
    Mac - Application control - Gatekeeper
  69. Урок 69. 00:05:43
    Mac - Application control - System Integrity Protection
  70. Урок 70. 00:03:48
    Mac - Application control - Santa
  71. Урок 71. 00:07:19
    Mac - Application control - Xfence (Previously Little Flocker)
  72. Урок 72. 00:01:20
    Mac - Other Stuff!
  73. Урок 73. 00:07:51
    The New Normal For End-Point-Protection Technology
  74. Урок 74. 00:04:47
    Cylance
  75. Урок 75. 00:00:49
    Goals and Learning Objectives
  76. Урок 76. 00:05:21
    A Complete Failure to Detect Threats
  77. Урок 77. 00:04:38
    Rethinking Honeypots
  78. Урок 78. 00:18:47
    CanaryTokens
  79. Урок 79. 00:12:20
    OpenCanary
  80. Урок 80. 00:03:33
    Artillery - Binary Defense
  81. Урок 81. 00:01:14
    Honey Drive
  82. Урок 82. 00:07:12
    Intrusion Detection Systems (IDS) Part 1 - Methods
  83. Урок 83. 00:04:56
    Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
  84. Урок 84. 00:04:41
    Host-Based Intrusion Detection - OSSEC
  85. Урок 85. 00:03:06
    Network Analysis - Sguil, Xplico & NetworkMiner
  86. Урок 86. 00:02:59
    File Integrity Monitoring (FIM) and Checking Part 1
  87. Урок 87. 00:02:32
    File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
  88. Урок 88. 00:02:05
    Network Security Toolkit (NST)
  89. Урок 89. 00:01:18
    Security Onion
  90. Урок 90. 00:02:52
    Security Information and Event Management Software (SIEM)
  91. Урок 91. 00:00:50
    Goals and Learning Objectives
  92. Урок 92. 00:08:21
    Introduction to Malware and Hacker Hunting
  93. Урок 93. 00:09:21
    Windows - Farbar Recovery Scanner
  94. Урок 94. 00:10:42
    Automated Malware Removal Tools
  95. Урок 95. 00:06:43
    Live Rescue Operating Systems, CDs, and USBs
  96. Урок 96. 00:11:34
    Windows - Malware Seek & Destroy - Process Explorer - Part 1
  97. Урок 97. 00:10:05
    Windows - Malware Seek & Destroy - Process Explorer - Part 2
  98. Урок 98. 00:02:10
    Windows - Malware Seek & Destroy - Process Tools
  99. Урок 99. 00:02:32
    Windows - Malware Seek & Destroy - Sigcheck
  100. Урок 100. 00:10:10
    Windows - Malware Seek & Destroy - Autoruns
  101. Урок 101. 00:10:48
    Windows - Malware Seek & Destroy - Process Monitor
  102. Урок 102. 00:08:12
    Windows - Malware Seek & Destroy - Network Connections
  103. Урок 103. 00:02:22
    Malware Seek & Destroy - Networkx
  104. Урок 104. 00:10:28
    Linux - Malware Seek & Destroy - Sysdig
  105. Урок 105. 00:11:14
    Linux - Seek & Destroy Malware and Hackers - Csysdig
  106. Урок 106. 00:01:54
    Linux - Seek & Destroy Malware and Hackers - debsums & unhide
  107. Урок 107. 00:07:14
    Linux & Mac OS X - Malware Seek & Destroy - netstat
  108. Урок 108. 00:08:16
    Linux & Mac OS X - Malware Seek & Destroy - lsof
  109. Урок 109. 00:06:14
    Linux - Malware Seek & Destroy - rkhunter
  110. Урок 110. 00:02:01
    Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD
  111. Урок 111. 00:03:24
    Linux - Malware Seek & Destroy - Linux - Persistence Part 1
  112. Урок 112. 00:10:19
    Linux - Malware Seek & Destroy - Linux - Persistence Part 2
  113. Урок 113. 00:02:57
    Linux - Malware Seek & Destroy - Linux - Persistence Part 3
  114. Урок 114. 00:05:23
    Mac - Malware Seek & Destroy - Task Explorer
  115. Урок 115. 00:07:27
    Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer
  116. Урок 116. 00:14:48
    Mac, Linux & Windows - OSquery
  117. Урок 117. 00:07:29
    Firmware Rootkits – Seek and Destroy Part 1
  118. Урок 118. 00:04:06
    Firmware Rootkits – Seek and Destroy Part 2
  119. Урок 119. 00:03:18
    End-Point-Protection Recovery and Remediation Technology
  120. Урок 120. 00:06:04
    Encrypted Backup and Cloud Storage
  121. Урок 121. 00:00:48
    Goals and Learning Objectives
  122. Урок 122. 00:05:29
    An Introduction to Hardening
  123. Урок 123. 00:10:02
    Hardening Standards
  124. Урок 124. 00:12:47
    OpenSCAP
  125. Урок 125. 00:03:32
    Baseline Auditing
  126. Урок 126. 00:01:55
    Windows - Hardening
  127. Урок 127. 00:11:02
    Windows - Security Compliance Manager (SCM)
  128. Урок 128. 00:01:36
    Mac – Hardening
  129. Урок 129. 00:03:32
    Linux – Hardening
  130. Урок 130. 00:04:50
    Security Focused Operating Systems
  131. Урок 131. 00:01:17
    Monitoring for Security Drift
  132. Урок 132. 00:00:44
    Goals and Learning Objectives
  133. Урок 133. 00:08:11
    Secure File Deletion - Mechanical drives
  134. Урок 134. 00:06:38
    Secure File Deletion - Solid Sate Drives
  135. Урок 135. 00:04:43
    Evidence Elimination & Anti-Forensics - An Introduction
  136. Урок 136. 00:07:03
    Evidence Elimination - CCleaner and Bleachit
  137. Урок 137. 00:05:50
    Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer
  138. Урок 138. 00:05:47
    Disk Wiping - Mechanical Drives
  139. Урок 139. 00:10:54
    Disk Wiping - Solid State Drives (SSD)
  140. Урок 140. 00:06:57
    Scrubbing EXIF & Metadata Part 1 - Introduction
  141. Урок 141. 00:05:15
    Scrubbing EXIF & Metadata Part 2 - Tools
  142. Урок 142. 00:04:37
    Scrubbing EXIF & Metadata Part 3 - Guidance
  143. Урок 143. 00:04:07
    Sensor Noise Camera Identification
  144. Урок 144. 00:01:06
    Goals and Learning Objectives
  145. Урок 145. 00:13:18
    Clients, Protocols and Authentication
  146. Урок 146. 00:13:03
    Email Weaknesses
  147. Урок 147. 00:05:51
    PGP, GPG & Privacy
  148. Урок 148. 00:06:29
    PGP & GPG Clients
  149. Урок 149. 00:19:53
    Windows - PGP & GPG
  150. Урок 150. 00:04:02
    Tail - PGP & GPG
  151. Урок 151. 00:06:16
    PGP & GPG Weaknesses
  152. Урок 152. 00:02:33
    Improving OpenPGP Security - Best Practices - Part 1
  153. Урок 153. 00:12:21
    Improving OpenPGP Security - Primary and Subkeys - Part 2
  154. Урок 154. 00:07:43
    Improving OpenPGP Security - Smartcards/Yubikey - Part 3
  155. Урок 155. 00:10:34
    Email Tracking & Exploits
  156. Урок 156. 00:06:19
    Email Anonymity & Pseudonymity
  157. Урок 157. 00:07:37
    TorBirdy
  158. Урок 158. 00:07:35
    Remailers
  159. Урок 159. 00:13:47
    Choosing an Email Provider
  160. Урок 160. 00:03:18
    Email Alternatives
  161. Урок 161. 00:00:20
    Goals and Learning Objectives
  162. Урок 162. 00:03:09
    An Introduction to Instant Messengers
  163. Урок 163. 00:02:31
    Instant Messenger - Signal
  164. Урок 164. 00:01:40
    Instant Messengers - Chatsecure
  165. Урок 165. 00:00:46
    Instant Messengers - Cryptocat
  166. Урок 166. 00:00:47
    Instant Messengers - Ricochet
  167. Урок 167. 00:00:39
    Instant Messengers - Other
  168. Урок 168. 00:04:29
    Video and Voice Messengers - Linphone
  169. Урок 169. 00:01:41
    Video and Voice Messengers - Jitsi
  170. Урок 170. 00:00:58
    Video and Voice Messengers - Other
  171. Урок 171. 00:00:30
    Congratulations!!
  172. Урок 172. 00:00:57
    Certificate Of Completion for CPEs
  173. Урок 173. 00:19:08
    Qubes OS
  174. Урок 174. 00:12:28
    Effective Network Isolation
  175. Урок 175. 00:10:21
    Socks5 proxy tunneling