-
Урок 1.
00:00:45
Welcome to Volume 4
-
Урок 2.
00:02:07
Introduction to the Instructor!
-
Урок 3.
00:11:25
Security Quick Win!
-
Урок 4.
00:01:55
Target Audience
-
Урок 5.
00:04:20
Study Recommendations
-
Урок 6.
00:00:41
Course updates
-
Урок 7.
00:04:39
What is End Point Protection? and why is it important?
-
Урок 8.
00:03:27
Goals and Learning Objectives - Volume 4
-
Урок 9.
00:00:46
Goals and Learning Objectives
-
Урок 10.
00:07:49
Disk Encryption – What is it good for?
-
Урок 11.
00:05:30
Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
-
Урок 12.
00:11:18
Disk Encryption Attacks - Physical
-
Урок 13.
00:02:22
Disk Encryption Attacks - Containers, Volumes and Partitions
-
Урок 14.
00:02:41
Windows - Disk Encryption - An Introduction
-
Урок 15.
00:12:08
Windows - Disk Encryption - Bitlocker
-
Урок 16.
00:09:31
Windows - Setting Up BitLocker
-
Урок 17.
00:11:29
Windows - Disk Encryption - VeraCrypt
-
Урок 18.
00:03:07
Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
-
Урок 19.
00:11:43
Windows, Mac & Linux - Setting up VeraCrypt
-
Урок 20.
00:05:40
Mac - Filevault2
-
Урок 21.
00:07:36
Mac - Setting up Filevault2
-
Урок 22.
00:05:56
Linux Whole Disk Encryption - Dm-crypt and LUKS
-
Урок 23.
00:05:10
Linux - Setting up DMCrypt/LUKS
-
Урок 24.
00:04:48
Linux - Encrypting the boot partition with Grub2
-
Урок 25.
00:01:48
Self Encrypting Drives (SEDs)
-
Урок 26.
00:07:49
Defense Against Disk Decryption Attacks
-
Урок 27.
00:04:14
File Encryption
-
Урок 28.
00:07:36
Mandatory Key Disclosure & Plausible Deniability
-
Урок 29.
00:03:21
Nesting Crypto Systems & Obfuscation
-
Урок 30.
00:02:47
Case Studies in Disk Decryption
-
Урок 31.
00:00:39
Goals and Learning Objectives
-
Урок 32.
00:03:56
Is Anti-Virus dead? - The Threat Landscape
-
Урок 33.
00:10:54
Is Anti-Virus dead? - Protection Methods
-
Урок 34.
00:04:18
Ransomware
-
Урок 35.
00:05:41
Anti-Virus and End-Point-Protection Testing
-
Урок 36.
00:03:39
The Problem With AV and EPP Testing
-
Урок 37.
00:04:05
The Best of Business End-Point-Protection (EPP)
-
Урок 38.
00:04:06
Windows - The Best of Anti-Virus and End-Point-Protection
-
Урок 39.
00:02:24
Business End Point Protection (EPP)
-
Урок 40.
00:02:52
Mac - XProtect
-
Урок 41.
00:02:35
Mac - The Best of Anti-Virus and End-Point-Protection
-
Урок 42.
00:02:42
Linux - The Best of Anti-Virus and End-Point-Protection
-
Урок 43.
00:03:13
Online and Second Opinion - Anti-Virus and End-Point-Protection
-
Урок 44.
00:06:36
Is Anti-Virus and End-Point-Protection Dangerous?
-
Урок 45.
00:00:35
Goals and Learning Objectives
-
Урок 46.
00:05:00
Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
-
Урок 47.
00:06:40
End Point Detection and Response (EDR)
-
Урок 48.
00:06:58
End-Point-Protection: How it works together in layers
-
Урок 49.
00:00:41
Goals and Learning Objectives
-
Урок 50.
00:09:50
What is application and execution control?
-
Урок 51.
00:06:28
Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
-
Урок 52.
00:04:19
Windows - Application control - User Account Control (UAC)
-
Урок 53.
00:04:35
Windows - Application control - Software Restriction Policies
-
Урок 54.
00:10:24
Windows - Application control - AppLocker
-
Урок 55.
00:02:44
Windows - Application Control - Parental controls
-
Урок 56.
00:06:36
Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
-
Урок 57.
00:12:59
Windows - Exploitation Prevention - EMET
-
Урок 58.
00:04:50
Windows - Exploitation Prevention - Traps, MBEA and HMPA
-
Урок 59.
00:11:34
Windows 10 - Device Guard
-
Урок 60.
00:02:23
Windows - Defender Application Guard for Microsoft Edge
-
Урок 61.
00:07:46
Linux - Access Control Models
-
Урок 62.
00:02:14
Linux - Security frameworks - AppArmor
-
Урок 63.
00:03:20
Linux - Security frameworks - SElinux
-
Урок 64.
00:04:00
Linux - Security frameworks - Grsecurity
-
Урок 65.
00:01:41
Linux - Security frameworks - PaX and more
-
Урок 66.
00:08:04
Linux & Mac - File permissions, POSIX and ACLs
-
Урок 67.
00:03:05
Mac - Application control - Parental controls
-
Урок 68.
00:05:24
Mac - Application control - Gatekeeper
-
Урок 69.
00:05:43
Mac - Application control - System Integrity Protection
-
Урок 70.
00:03:48
Mac - Application control - Santa
-
Урок 71.
00:07:19
Mac - Application control - Xfence (Previously Little Flocker)
-
Урок 72.
00:01:20
Mac - Other Stuff!
-
Урок 73.
00:07:51
The New Normal For End-Point-Protection Technology
-
Урок 74.
00:04:47
Cylance
-
Урок 75.
00:00:49
Goals and Learning Objectives
-
Урок 76.
00:05:21
A Complete Failure to Detect Threats
-
Урок 77.
00:04:38
Rethinking Honeypots
-
Урок 78.
00:18:47
CanaryTokens
-
Урок 79.
00:12:20
OpenCanary
-
Урок 80.
00:03:33
Artillery - Binary Defense
-
Урок 81.
00:01:14
Honey Drive
-
Урок 82.
00:07:12
Intrusion Detection Systems (IDS) Part 1 - Methods
-
Урок 83.
00:04:56
Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
-
Урок 84.
00:04:41
Host-Based Intrusion Detection - OSSEC
-
Урок 85.
00:03:06
Network Analysis - Sguil, Xplico & NetworkMiner
-
Урок 86.
00:02:59
File Integrity Monitoring (FIM) and Checking Part 1
-
Урок 87.
00:02:32
File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
-
Урок 88.
00:02:05
Network Security Toolkit (NST)
-
Урок 89.
00:01:18
Security Onion
-
Урок 90.
00:02:52
Security Information and Event Management Software (SIEM)
-
Урок 91.
00:00:50
Goals and Learning Objectives
-
Урок 92.
00:08:21
Introduction to Malware and Hacker Hunting
-
Урок 93.
00:09:21
Windows - Farbar Recovery Scanner
-
Урок 94.
00:10:42
Automated Malware Removal Tools
-
Урок 95.
00:06:43
Live Rescue Operating Systems, CDs, and USBs
-
Урок 96.
00:11:34
Windows - Malware Seek & Destroy - Process Explorer - Part 1
-
Урок 97.
00:10:05
Windows - Malware Seek & Destroy - Process Explorer - Part 2
-
Урок 98.
00:02:10
Windows - Malware Seek & Destroy - Process Tools
-
Урок 99.
00:02:32
Windows - Malware Seek & Destroy - Sigcheck
-
Урок 100.
00:10:10
Windows - Malware Seek & Destroy - Autoruns
-
Урок 101.
00:10:48
Windows - Malware Seek & Destroy - Process Monitor
-
Урок 102.
00:08:12
Windows - Malware Seek & Destroy - Network Connections
-
Урок 103.
00:02:22
Malware Seek & Destroy - Networkx
-
Урок 104.
00:10:28
Linux - Malware Seek & Destroy - Sysdig
-
Урок 105.
00:11:14
Linux - Seek & Destroy Malware and Hackers - Csysdig
-
Урок 106.
00:01:54
Linux - Seek & Destroy Malware and Hackers - debsums & unhide
-
Урок 107.
00:07:14
Linux & Mac OS X - Malware Seek & Destroy - netstat
-
Урок 108.
00:08:16
Linux & Mac OS X - Malware Seek & Destroy - lsof
-
Урок 109.
00:06:14
Linux - Malware Seek & Destroy - rkhunter
-
Урок 110.
00:02:01
Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD
-
Урок 111.
00:03:24
Linux - Malware Seek & Destroy - Linux - Persistence Part 1
-
Урок 112.
00:10:19
Linux - Malware Seek & Destroy - Linux - Persistence Part 2
-
Урок 113.
00:02:57
Linux - Malware Seek & Destroy - Linux - Persistence Part 3
-
Урок 114.
00:05:23
Mac - Malware Seek & Destroy - Task Explorer
-
Урок 115.
00:07:27
Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer
-
Урок 116.
00:14:48
Mac, Linux & Windows - OSquery
-
Урок 117.
00:07:29
Firmware Rootkits – Seek and Destroy Part 1
-
Урок 118.
00:04:06
Firmware Rootkits – Seek and Destroy Part 2
-
Урок 119.
00:03:18
End-Point-Protection Recovery and Remediation Technology
-
Урок 120.
00:06:04
Encrypted Backup and Cloud Storage
-
Урок 121.
00:00:48
Goals and Learning Objectives
-
Урок 122.
00:05:29
An Introduction to Hardening
-
Урок 123.
00:10:02
Hardening Standards
-
Урок 124.
00:12:47
OpenSCAP
-
Урок 125.
00:03:32
Baseline Auditing
-
Урок 126.
00:01:55
Windows - Hardening
-
Урок 127.
00:11:02
Windows - Security Compliance Manager (SCM)
-
Урок 128.
00:01:36
Mac – Hardening
-
Урок 129.
00:03:32
Linux – Hardening
-
Урок 130.
00:04:50
Security Focused Operating Systems
-
Урок 131.
00:01:17
Monitoring for Security Drift
-
Урок 132.
00:00:44
Goals and Learning Objectives
-
Урок 133.
00:08:11
Secure File Deletion - Mechanical drives
-
Урок 134.
00:06:38
Secure File Deletion - Solid Sate Drives
-
Урок 135.
00:04:43
Evidence Elimination & Anti-Forensics - An Introduction
-
Урок 136.
00:07:03
Evidence Elimination - CCleaner and Bleachit
-
Урок 137.
00:05:50
Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer
-
Урок 138.
00:05:47
Disk Wiping - Mechanical Drives
-
Урок 139.
00:10:54
Disk Wiping - Solid State Drives (SSD)
-
Урок 140.
00:06:57
Scrubbing EXIF & Metadata Part 1 - Introduction
-
Урок 141.
00:05:15
Scrubbing EXIF & Metadata Part 2 - Tools
-
Урок 142.
00:04:37
Scrubbing EXIF & Metadata Part 3 - Guidance
-
Урок 143.
00:04:07
Sensor Noise Camera Identification
-
Урок 144.
00:01:06
Goals and Learning Objectives
-
Урок 145.
00:13:18
Clients, Protocols and Authentication
-
Урок 146.
00:13:03
Email Weaknesses
-
Урок 147.
00:05:51
PGP, GPG & Privacy
-
Урок 148.
00:06:29
PGP & GPG Clients
-
Урок 149.
00:19:53
Windows - PGP & GPG
-
Урок 150.
00:04:02
Tail - PGP & GPG
-
Урок 151.
00:06:16
PGP & GPG Weaknesses
-
Урок 152.
00:02:33
Improving OpenPGP Security - Best Practices - Part 1
-
Урок 153.
00:12:21
Improving OpenPGP Security - Primary and Subkeys - Part 2
-
Урок 154.
00:07:43
Improving OpenPGP Security - Smartcards/Yubikey - Part 3
-
Урок 155.
00:10:34
Email Tracking & Exploits
-
Урок 156.
00:06:19
Email Anonymity & Pseudonymity
-
Урок 157.
00:07:37
TorBirdy
-
Урок 158.
00:07:35
Remailers
-
Урок 159.
00:13:47
Choosing an Email Provider
-
Урок 160.
00:03:18
Email Alternatives
-
Урок 161.
00:00:20
Goals and Learning Objectives
-
Урок 162.
00:03:09
An Introduction to Instant Messengers
-
Урок 163.
00:02:31
Instant Messenger - Signal
-
Урок 164.
00:01:40
Instant Messengers - Chatsecure
-
Урок 165.
00:00:46
Instant Messengers - Cryptocat
-
Урок 166.
00:00:47
Instant Messengers - Ricochet
-
Урок 167.
00:00:39
Instant Messengers - Other
-
Урок 168.
00:04:29
Video and Voice Messengers - Linphone
-
Урок 169.
00:01:41
Video and Voice Messengers - Jitsi
-
Урок 170.
00:00:58
Video and Voice Messengers - Other
-
Урок 171.
00:00:30
Congratulations!!
-
Урок 172.
00:00:57
Certificate Of Completion for CPEs
-
Урок 173.
00:19:08
Qubes OS
-
Урок 174.
00:12:28
Effective Network Isolation
-
Урок 175.
00:10:21
Socks5 proxy tunneling