Урок 1.00:00:45
Welcome to Volume 4
Урок 2.00:02:07
Introduction to the Instructor!
Урок 3.00:11:25
Security Quick Win!
Урок 4.00:01:55
Target Audience
Урок 5.00:04:20
Study Recommendations
Урок 6.00:00:41
Course updates
Урок 7.00:04:39
What is End Point Protection? and why is it important?
Урок 8.00:03:27
Goals and Learning Objectives - Volume 4
Урок 9.00:00:46
Goals and Learning Objectives
Урок 10.00:07:49
Disk Encryption – What is it good for?
Урок 11.00:05:30
Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation
Урок 12.00:11:18
Disk Encryption Attacks - Physical
Урок 13.00:02:22
Disk Encryption Attacks - Containers, Volumes and Partitions
Урок 14.00:02:41
Windows - Disk Encryption - An Introduction
Урок 15.00:12:08
Windows - Disk Encryption - Bitlocker
Урок 16.00:09:31
Windows - Setting Up BitLocker
Урок 17.00:11:29
Windows - Disk Encryption - VeraCrypt
Урок 18.00:03:07
Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt
Урок 19.00:11:43
Windows, Mac & Linux - Setting up VeraCrypt
Урок 20.00:05:40
Mac - Filevault2
Урок 21.00:07:36
Mac - Setting up Filevault2
Урок 22.00:05:56
Linux Whole Disk Encryption - Dm-crypt and LUKS
Урок 23.00:05:10
Linux - Setting up DMCrypt/LUKS
Урок 24.00:04:48
Linux - Encrypting the boot partition with Grub2
Урок 25.00:01:48
Self Encrypting Drives (SEDs)
Урок 26.00:07:49
Defense Against Disk Decryption Attacks
Урок 27.00:04:14
File Encryption
Урок 28.00:07:36
Mandatory Key Disclosure & Plausible Deniability
Урок 29.00:03:21
Nesting Crypto Systems & Obfuscation
Урок 30.00:02:47
Case Studies in Disk Decryption
Урок 31.00:00:39
Goals and Learning Objectives
Урок 32.00:03:56
Is Anti-Virus dead? - The Threat Landscape
Урок 33.00:10:54
Is Anti-Virus dead? - Protection Methods
Урок 34.00:04:18
Ransomware
Урок 35.00:05:41
Anti-Virus and End-Point-Protection Testing
Урок 36.00:03:39
The Problem With AV and EPP Testing
Урок 37.00:04:05
The Best of Business End-Point-Protection (EPP)
Урок 38.00:04:06
Windows - The Best of Anti-Virus and End-Point-Protection
Урок 39.00:02:24
Business End Point Protection (EPP)
Урок 40.00:02:52
Mac - XProtect
Урок 41.00:02:35
Mac - The Best of Anti-Virus and End-Point-Protection
Урок 42.00:02:42
Linux - The Best of Anti-Virus and End-Point-Protection
Урок 43.00:03:13
Online and Second Opinion - Anti-Virus and End-Point-Protection
Урок 44.00:06:36
Is Anti-Virus and End-Point-Protection Dangerous?
Урок 45.00:00:35
Goals and Learning Objectives
Урок 46.00:05:00
Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP)
Урок 47.00:06:40
End Point Detection and Response (EDR)
Урок 48.00:06:58
End-Point-Protection: How it works together in layers
Урок 49.00:00:41
Goals and Learning Objectives
Урок 50.00:09:50
What is application and execution control?
Урок 51.00:06:28
Windows - Application control - ACLs, Windows Permission Identifier & Accessenum
Урок 52.00:04:19
Windows - Application control - User Account Control (UAC)
Урок 53.00:04:35
Windows - Application control - Software Restriction Policies
Урок 54.00:10:24
Windows - Application control - AppLocker
Урок 55.00:02:44
Windows - Application Control - Parental controls
Урок 56.00:06:36
Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks
Урок 57.00:12:59
Windows - Exploitation Prevention - EMET
Урок 58.00:04:50
Windows - Exploitation Prevention - Traps, MBEA and HMPA
Урок 59.00:11:34
Windows 10 - Device Guard
Урок 60.00:02:23
Windows - Defender Application Guard for Microsoft Edge
Урок 61.00:07:46
Linux - Access Control Models
Урок 62.00:02:14
Linux - Security frameworks - AppArmor
Урок 63.00:03:20
Linux - Security frameworks - SElinux
Урок 64.00:04:00
Linux - Security frameworks - Grsecurity
Урок 65.00:01:41
Linux - Security frameworks - PaX and more
Урок 66.00:08:04
Linux & Mac - File permissions, POSIX and ACLs
Урок 67.00:03:05
Mac - Application control - Parental controls
Урок 68.00:05:24
Mac - Application control - Gatekeeper
Урок 69.00:05:43
Mac - Application control - System Integrity Protection
Урок 70.00:03:48
Mac - Application control - Santa
Урок 71.00:07:19
Mac - Application control - Xfence (Previously Little Flocker)
Урок 72.00:01:20
Mac - Other Stuff!
Урок 73.00:07:51
The New Normal For End-Point-Protection Technology
Урок 74.00:04:47
Cylance
Урок 75.00:00:49
Goals and Learning Objectives
Урок 76.00:05:21
A Complete Failure to Detect Threats
Урок 77.00:04:38
Rethinking Honeypots
Урок 78.00:18:47
CanaryTokens
Урок 79.00:12:20
OpenCanary
Урок 80.00:03:33
Artillery - Binary Defense
Урок 81.00:01:14
Honey Drive
Урок 82.00:07:12
Intrusion Detection Systems (IDS) Part 1 - Methods
Урок 83.00:04:56
Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n
Урок 84.00:04:41
Host-Based Intrusion Detection - OSSEC
Урок 85.00:03:06
Network Analysis - Sguil, Xplico & NetworkMiner
Урок 86.00:02:59
File Integrity Monitoring (FIM) and Checking Part 1
Урок 87.00:02:32
File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe
Урок 88.00:02:05
Network Security Toolkit (NST)
Урок 89.00:01:18
Security Onion
Урок 90.00:02:52
Security Information and Event Management Software (SIEM)
Урок 91.00:00:50
Goals and Learning Objectives
Урок 92.00:08:21
Introduction to Malware and Hacker Hunting
Урок 93.00:09:21
Windows - Farbar Recovery Scanner
Урок 94.00:10:42
Automated Malware Removal Tools
Урок 95.00:06:43
Live Rescue Operating Systems, CDs, and USBs
Урок 96.00:11:34
Windows - Malware Seek & Destroy - Process Explorer - Part 1
Урок 97.00:10:05
Windows - Malware Seek & Destroy - Process Explorer - Part 2
Урок 98.00:02:10
Windows - Malware Seek & Destroy - Process Tools
Урок 99.00:02:32
Windows - Malware Seek & Destroy - Sigcheck
Урок 100.00:10:10
Windows - Malware Seek & Destroy - Autoruns
Урок 101.00:10:48
Windows - Malware Seek & Destroy - Process Monitor
Урок 102.00:08:12
Windows - Malware Seek & Destroy - Network Connections
Урок 103.00:02:22
Malware Seek & Destroy - Networkx
Урок 104.00:10:28
Linux - Malware Seek & Destroy - Sysdig
Урок 105.00:11:14
Linux - Seek & Destroy Malware and Hackers - Csysdig
Урок 106.00:01:54
Linux - Seek & Destroy Malware and Hackers - debsums & unhide
Урок 107.00:07:14
Linux & Mac OS X - Malware Seek & Destroy - netstat
Урок 108.00:08:16
Linux & Mac OS X - Malware Seek & Destroy - lsof
Урок 109.00:06:14
Linux - Malware Seek & Destroy - rkhunter
Урок 110.00:02:01
Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD
Урок 111.00:03:24
Linux - Malware Seek & Destroy - Linux - Persistence Part 1
Урок 112.00:10:19
Linux - Malware Seek & Destroy - Linux - Persistence Part 2
Урок 113.00:02:57
Linux - Malware Seek & Destroy - Linux - Persistence Part 3
Урок 114.00:05:23
Mac - Malware Seek & Destroy - Task Explorer
Урок 115.00:07:27
Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer
Урок 116.00:14:48
Mac, Linux & Windows - OSquery
Урок 117.00:07:29
Firmware Rootkits – Seek and Destroy Part 1
Урок 118.00:04:06
Firmware Rootkits – Seek and Destroy Part 2
Урок 119.00:03:18
End-Point-Protection Recovery and Remediation Technology
Урок 120.00:06:04
Encrypted Backup and Cloud Storage
Урок 121.00:00:48
Goals and Learning Objectives
Урок 122.00:05:29
An Introduction to Hardening
Урок 123.00:10:02
Hardening Standards
Урок 124.00:12:47
OpenSCAP
Урок 125.00:03:32
Baseline Auditing
Урок 126.00:01:55
Windows - Hardening
Урок 127.00:11:02
Windows - Security Compliance Manager (SCM)
Урок 128.00:01:36
Mac – Hardening
Урок 129.00:03:32
Linux – Hardening
Урок 130.00:04:50
Security Focused Operating Systems
Урок 131.00:01:17
Monitoring for Security Drift
Урок 132.00:00:44
Goals and Learning Objectives
Урок 133.00:08:11
Secure File Deletion - Mechanical drives
Урок 134.00:06:38
Secure File Deletion - Solid Sate Drives
Урок 135.00:04:43
Evidence Elimination & Anti-Forensics - An Introduction
Урок 136.00:07:03
Evidence Elimination - CCleaner and Bleachit
Урок 137.00:05:50
Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer
Урок 138.00:05:47
Disk Wiping - Mechanical Drives
Урок 139.00:10:54
Disk Wiping - Solid State Drives (SSD)
Урок 140.00:06:57
Scrubbing EXIF & Metadata Part 1 - Introduction
Урок 141.00:05:15
Scrubbing EXIF & Metadata Part 2 - Tools
Урок 142.00:04:37
Scrubbing EXIF & Metadata Part 3 - Guidance
Урок 143.00:04:07
Sensor Noise Camera Identification
Урок 144.00:01:06
Goals and Learning Objectives
Урок 145.00:13:18
Clients, Protocols and Authentication
Урок 146.00:13:03
Email Weaknesses
Урок 147.00:05:51
PGP, GPG & Privacy
Урок 148.00:06:29
PGP & GPG Clients
Урок 149.00:19:53
Windows - PGP & GPG
Урок 150.00:04:02
Tail - PGP & GPG
Урок 151.00:06:16
PGP & GPG Weaknesses
Урок 152.00:02:33
Improving OpenPGP Security - Best Practices - Part 1
Урок 153.00:12:21
Improving OpenPGP Security - Primary and Subkeys - Part 2
Урок 154.00:07:43
Improving OpenPGP Security - Smartcards/Yubikey - Part 3
Урок 155.00:10:34
Email Tracking & Exploits
Урок 156.00:06:19
Email Anonymity & Pseudonymity
Урок 157.00:07:37
TorBirdy
Урок 158.00:07:35
Remailers
Урок 159.00:13:47
Choosing an Email Provider
Урок 160.00:03:18
Email Alternatives
Урок 161.00:00:20
Goals and Learning Objectives
Урок 162.00:03:09
An Introduction to Instant Messengers
Урок 163.00:02:31
Instant Messenger - Signal
Урок 164.00:01:40
Instant Messengers - Chatsecure
Урок 165.00:00:46
Instant Messengers - Cryptocat
Урок 166.00:00:47
Instant Messengers - Ricochet
Урок 167.00:00:39
Instant Messengers - Other
Урок 168.00:04:29
Video and Voice Messengers - Linphone
Урок 169.00:01:41
Video and Voice Messengers - Jitsi
Урок 170.00:00:58
Video and Voice Messengers - Other
Урок 171.00:00:30
Congratulations!!
Урок 172.00:00:57
Certificate Of Completion for CPEs
Урок 173.00:19:08
Qubes OS
Урок 174.00:12:28
Effective Network Isolation
Урок 175.00:10:21
Socks5 proxy tunneling