zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
the-complete-internet-security-privacy-course-volume-1
magnet:?xt=urn:btih:0032f5e555ef4977bc697a5c93868de9c3533ba7&dn=the-complete-internet-security-privacy-course-volume-1
磁力链接详情
文件列表详情
0032f5e555ef4977bc697a5c93868de9c3533ba7
infohash:
116
文件数量
3.25 GB
文件大小
2017-6-9 23:10
创建日期
2024-12-13 05:36
最后访问
相关分词
the-complete-internet-security-privacy-course-volume-1
01 Introduction/006 Course updates.mp4 2.56 MB
01 Introduction/002 Security Quick Win.mp4 46.71 MB
01 Introduction/001 Welcome and Introduction to the Instructor.mp4 17.13 MB
01 Introduction/005 Study Recommendations.mp4 27.89 MB
01 Introduction/003 Goals and Learning Objectives - Volume 1.mp4 9.1 MB
01 Introduction/004 Target Audience.mp4 7.33 MB
10 Security Domains/090 Goals and Learning Objectives.mp4 1.43 MB
10 Security Domains/091 Security Domains.mp4 21.84 MB
04 Encryption Crash Course/032 Goals and Learning Objectives.mp4 1.63 MB
04 Encryption Crash Course/033 Symmetric Encryption.mp4 52.34 MB
04 Encryption Crash Course/034 Asymmetric Encryption.mp4 27.41 MB
04 Encryption Crash Course/036 Digital Signatures.mp4 24.14 MB
04 Encryption Crash Course/037 Secure Sockets Layer SSL and Transport layer security TLS.mp4 88.35 MB
04 Encryption Crash Course/035 Hash Functions.mp4 37.24 MB
04 Encryption Crash Course/039 HTTPS HTTP Secure.mp4 43.27 MB
04 Encryption Crash Course/040 Digital Certificates.mp4 23.58 MB
04 Encryption Crash Course/041 Certificate Authorities and HTTPS.mp4 59.67 MB
04 Encryption Crash Course/042 End-to-End Encryption E2EE.mp4 3.71 MB
04 Encryption Crash Course/043 Steganography.mp4 57.05 MB
04 Encryption Crash Course/044 How Security and Encryption is Really Attacked.mp4 6.8 MB
04 Encryption Crash Course/038 SSL Stripping.mp4 39.09 MB
08 Reducing Threat Privilege/081 Windows 7 - Not using admin.mp4 10.99 MB
08 Reducing Threat Privilege/080 Goals and Learning Objectives Removing Privilege.mp4 13.59 MB
08 Reducing Threat Privilege/082 Windows 8 and 8.1 - Not using admin.mp4 18.24 MB
08 Reducing Threat Privilege/083 Windows 10 - Not using admin.mp4 14.14 MB
07 Security Bugs and Vulnerabilities/067 Goals and Learning Objectives.mp4 1.66 MB
07 Security Bugs and Vulnerabilities/068 The Importance of Patching.mp4 11.66 MB
07 Security Bugs and Vulnerabilities/069 Windows 7 - Auto Update.mp4 4.94 MB
07 Security Bugs and Vulnerabilities/070 Windows 8 8.1 - Auto Update.mp4 6.54 MB
07 Security Bugs and Vulnerabilities/071 Windows 10 - Auto Update.mp4 4.93 MB
07 Security Bugs and Vulnerabilities/072 Windows - Criticality and Patch Tuesday.mp4 41.81 MB
07 Security Bugs and Vulnerabilities/073 Windows 7 8 8.1 10 - Automate the pain away from patching.mp4 19.35 MB
07 Security Bugs and Vulnerabilities/074 Linux - Debian - Patching.mp4 38.49 MB
07 Security Bugs and Vulnerabilities/075 Mac - Patching.mp4 55.58 MB
07 Security Bugs and Vulnerabilities/076 Firefox - Browser and extension updates.mp4 34.01 MB
07 Security Bugs and Vulnerabilities/077 Chrome - Browser and extension updates.mp4 3.57 MB
07 Security Bugs and Vulnerabilities/078 IE and Edge - Browser and extention updates.mp4 5.63 MB
07 Security Bugs and Vulnerabilities/079 Auto updates - The Impact to privacy and anonymity.mp4 4.3 MB
12 BONUS - Whats next... Volume 2 3 and 4/110 BONUS - Important Information.mp4 4.52 MB
12 BONUS - Whats next... Volume 2 3 and 4/111 Congratulations.mp4 5.28 MB
12 BONUS - Whats next... Volume 2 3 and 4/113 BONUS Lecture from Volume 2 - Router Vulnerability Scanning Shodan Qualys.mp4 48.07 MB
12 BONUS - Whats next... Volume 2 3 and 4/114 BONUS Lecture from Volume 2 - Password cracking part 2.mp4 24.15 MB
12 BONUS - Whats next... Volume 2 3 and 4/115 BONUS Lecture from Volume 3 - Bypassing firewalls and HTTP proxies part 3.mp4 31.75 MB
12 BONUS - Whats next... Volume 2 3 and 4/116 BONUS Lecture from Volume 4 - Email clients protocols and authentication.mp4 38.18 MB
12 BONUS - Whats next... Volume 2 3 and 4/112 Certificate Of Completion for CPEs.mp4 2.2 MB
11 Security Through Isolation and Compartmentalization/099 Windows - Sandboxes and Application Isolation.mp4 26.36 MB
11 Security Through Isolation and Compartmentalization/104 Virtual Machine Weaknesses.mp4 22.73 MB
11 Security Through Isolation and Compartmentalization/103 Virtual Machines.mp4 44.43 MB
11 Security Through Isolation and Compartmentalization/102 Mac - Sandboxes and Application Isolation.mp4 23.79 MB
11 Security Through Isolation and Compartmentalization/101 Linux - Sandboxes and Application Isolation.mp4 13.85 MB
11 Security Through Isolation and Compartmentalization/100 Windows - Sandboxes and Application Isolation - Sandboxie.mp4 70.11 MB
11 Security Through Isolation and Compartmentalization/107 Whonix OS - Weaknesses.mp4 15.78 MB
11 Security Through Isolation and Compartmentalization/092 Goals and Learning Objectives.mp4 2.29 MB
11 Security Through Isolation and Compartmentalization/098 Built-in Sandboxes and Application Isolation.mp4 10.4 MB
11 Security Through Isolation and Compartmentalization/097 Dual Boot.mp4 7.92 MB
11 Security Through Isolation and Compartmentalization/096 Virtual Isolation.mp4 57.31 MB
11 Security Through Isolation and Compartmentalization/095 Physical and Hardware Isolation - Hardware Serials.mp4 50.24 MB
11 Security Through Isolation and Compartmentalization/094 Physical and Hardware Isolation - How to change the Mac Address.mp4 25.57 MB
11 Security Through Isolation and Compartmentalization/093 Introduction to Isolation and Compartmentalization.mp4 5.66 MB
11 Security Through Isolation and Compartmentalization/105 Virtual Machine Hardening.mp4 36.96 MB
11 Security Through Isolation and Compartmentalization/106 Whonix OS - Anonymous Operating system.mp4 88.64 MB
11 Security Through Isolation and Compartmentalization/108 Qubes OS.mp4 78.72 MB
11 Security Through Isolation and Compartmentalization/109 Security Domains Isolation and Compartmentalization.mp4 14.97 MB
02 know Yourself - The Threat and Vulnerability Landscape/014 The Zero Trust Model.mp4 12.19 MB
02 know Yourself - The Threat and Vulnerability Landscape/007 Goals and Learning Objectives.mp4 2.7 MB
02 know Yourself - The Threat and Vulnerability Landscape/008 Protect What You Value.mp4 4.45 MB
02 know Yourself - The Threat and Vulnerability Landscape/009 What is Privacy Anonymity and Pseudonymity.mp4 11.91 MB
02 know Yourself - The Threat and Vulnerability Landscape/010 Security Vulnerabilities Threats and Adversaries.mp4 11.83 MB
02 know Yourself - The Threat and Vulnerability Landscape/011 Threat Modeling and Risk Assessments.mp4 19.84 MB
02 know Yourself - The Threat and Vulnerability Landscape/012 Security vs Privacy vs Anonymity - Can we have it all.mp4 5.63 MB
02 know Yourself - The Threat and Vulnerability Landscape/013 Defense In Depth.mp4 2.62 MB
05 Setting up a Testing Environment Using Virtual Machines/048 Virtual box.mp4 48.9 MB
09 Social Engineering and Social Media Offence and Defence/089 Technical Security Controls Against Social Threats Phishing Spam Scam Cons.mp4 14.51 MB
09 Social Engineering and Social Media Offence and Defence/088 Behavioural Security Controls Against Social Threats Phishing Spam Part 2.mp4 49.3 MB
09 Social Engineering and Social Media Offence and Defence/087 Behavioural Security Controls Against Social Threats Phishing Spam Part 1.mp4 23.29 MB
05 Setting up a Testing Environment Using Virtual Machines/049 Kali Linux 2016.mp4 18.07 MB
09 Social Engineering and Social Media Offence and Defence/085 Information Disclosure and Identity Strategies for Social Media.mp4 83.81 MB
05 Setting up a Testing Environment Using Virtual Machines/047 Vmware.mp4 41.69 MB
05 Setting up a Testing Environment Using Virtual Machines/046 Introduction to Setting up a Testing Environment Using Virtual Machines.mp4 47.98 MB
05 Setting up a Testing Environment Using Virtual Machines/045 Goals and Learning Objectives.mp4 1.84 MB
09 Social Engineering and Social Media Offence and Defence/084 Goals and Learning Objectives.mp4 1.73 MB
09 Social Engineering and Social Media Offence and Defence/086 Identify Verification and Registration.mp4 23.39 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/060 Windows 7 8 and 8.1 - Privacy Tracking.mp4 43.69 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/054 Windows 10 - Privacy Tracking.mp4 45.18 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/057 Windows 10 Cortana.mp4 5.26 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/052 Security Bugs and Vulnerabilities.mp4 22.06 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/062 Linux and Unix like Operating systems.mp4 19.86 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/063 Linux - Debian.mp4 2.37 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/064 Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4 36.59 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/065 Linux - OpenBSD and Archlinux.mp4 12.57 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/066 Linux - Ubuntu.mp4 2.7 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/059 Windows 10 - WiFi Sense.mp4 17.46 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/058 Windows 10 Privacy Settings.mp4 37.3 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/053 Usage Share.mp4 15.36 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/056 Windows 10 - Tool Disable Windows 10 Tracking.mp4 53.6 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/055 Windows 10 - Disable tracking automatically.mp4 22.46 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/061 Mac - Privacy Tracking.mp4 42.28 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/050 Goals and Learning Objectives.mp4 2.43 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Linux/051 Security Features and Functionality.mp4 10.63 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/028 Regulating encryption mandating insecurity legalizing spying.mp4 195.98 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/015 Goals and Learning Objectives.mp4 2.89 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/016 Why You Need Security The Value Of A Hack.mp4 73.59 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/017 The Top 3 Things You Need To Stay Safe Online.mp4 3.35 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/018 Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4 57.81 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/027 Governments spies and secret stuff part II.mp4 71.39 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/030 Censorship.mp4 9.04 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/029 Trust Backdoors.mp4 57.4 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/019 Hackers crackers and cyber criminals.mp4 18.84 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/020 Malware viruses rootkits and RATs.mp4 38.97 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/021 Spyware Adware Scareware PUPs Browser hijacking.mp4 19.44 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/022 What is Phishing Vishing and SMShing.mp4 54.46 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/023 Spamming Doxing.mp4 8.55 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/024 Social engineering - Scams cons tricks and fraud.mp4 17.97 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/025 Darknets Dark Markets and Exploit kits.mp4 155.06 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/026 Governments spies and secret stuff part I.mp4 88.63 MB
03 Know Your Enemy - The Current Threat and Vulnerability Landscape/031 Security News and Alerts Stay Informed.mp4 1.98 MB
其他位置