zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Cyber Security - VOLUME 3
magnet:?xt=urn:btih:1572b547fb602ed18fda859a877b64e2bbdd2a94&dn=Cyber Security - VOLUME 3
磁力链接详情
文件列表详情
1572b547fb602ed18fda859a877b64e2bbdd2a94
infohash:
117
文件数量
2.89 GB
文件大小
2020-8-13 21:38
创建日期
2024-12-10 16:17
最后访问
相关分词
Cyber
Security
-
VOLUME
3
3. OPSEC (Operational Security)/6. 10 Rules of OPSEC.mp4 185.34 MB
1. Introduction/2. Introduction to the Instructor!.mp4 17.13 MB
1. Introduction/3. Security Quick Win!.mp4 44.61 MB
1. Introduction/4. Target Audience.mp4 8.67 MB
1. Introduction/5. Study Recommendations.mp4 27.89 MB
1. Introduction/6. Course updates.mp4 2.57 MB
2. Goals and Objectives for Volume III/1. Goals and Learning Objectives.mp4 19.57 MB
3. OPSEC (Operational Security)/1. Goals and Learning Objectives.mp4 4.23 MB
3. OPSEC (Operational Security)/2. Introduction to OPSEC.mp4 10.41 MB
3. OPSEC (Operational Security)/3. Identities, pseudonyms and aliases (Identity Strategies).mp4 14.46 MB
3. OPSEC (Operational Security)/4. Establishing Cover.mp4 60.05 MB
3. OPSEC (Operational Security)/5. Identify Cross Contamination.mp4 51.11 MB
1. Introduction/1. Welcome to Volume III.mp4 3.3 MB
3. OPSEC (Operational Security)/7. Authorship Recognition and Evasion Methods.mp4 18.8 MB
3. OPSEC (Operational Security)/8. The knock.mp4 12.93 MB
3. OPSEC (Operational Security)/9. Case Studies of OPSEC Failures.mp4 29.58 MB
4. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/1. Goals and Learning Objectives.mp4 1.23 MB
4. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/2. Introduction to live operating systems.mp4 46.12 MB
4. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/3. Knoppix, Puppy linux, Jondo live, Tiny core linux, Window To Go.mp4 63.89 MB
4. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/4. Tails.mp4 63.64 MB
4. Live Operating Systems – Tails, Knoppix, Puppy linux, Jondo live, Tiny core linu/5. Tails Demo.mp4 44.24 MB
5. Virtual Private Networks (VPNs)/1. Goals and Learning Objectives.mp4 3.69 MB
5. Virtual Private Networks (VPNs)/2. Introduction to VPNs.mp4 23.8 MB
5. Virtual Private Networks (VPNs)/3. Which VPN protocol is best to use and why.mp4 34.6 MB
5. Virtual Private Networks (VPNs)/4. VPN Weaknesses.mp4 30.85 MB
5. Virtual Private Networks (VPNs)/5. Can you trust VPN providers.mp4 33.88 MB
5. Virtual Private Networks (VPNs)/6. VPNs and Domain Name System (DNS) Leaks.mp4 40.14 MB
5. Virtual Private Networks (VPNs)/7. Setting up an OpenVPN client in Windows, Mac, iPhone and Android.mp4 86.84 MB
5. Virtual Private Networks (VPNs)/8. Setting up an OpenVPN client on Linux.mp4 58.6 MB
5. Virtual Private Networks (VPNs)/9. Preventing VPN Leaks - Firewalls and kill switches.mp4 54.65 MB
5. Virtual Private Networks (VPNs)/10. Choosing the right VPN provider.mp4 37.1 MB
5. Virtual Private Networks (VPNs)/11. Setting up an OpenVPN server Part 1 - The fast and easy way.mp4 55.3 MB
5. Virtual Private Networks (VPNs)/12. Setting up an OpenVPN server Part 2 - Debian client.mp4 24.14 MB
5. Virtual Private Networks (VPNs)/13. Setting up an OpenVPN server Part 3 - Home VPN.mp4 18.26 MB
6. Tor/1. Goals and Learning Objectives.mp4 1.84 MB
6. Tor/2. What is Tor.mp4 17.57 MB
6. Tor/3. The Tor Network and Browser.mp4 56.68 MB
6. Tor/4. What should Tor be used for.mp4 23.33 MB
6. Tor/5. Directory Authorities and Relays.mp4 16.29 MB
6. Tor/6. Tor Bridges.mp4 14.66 MB
6. Tor/7. Tor Pluggable Transports and Traffic Obfuscation.mp4 17.86 MB
6. Tor/8. Torrc Configuration File.mp4 45.99 MB
6. Tor/9. Running other applications through Tor.mp4 33.05 MB
6. Tor/10. Tor Weaknesses Part 1.mp4 87.27 MB
6. Tor/11. Tor Weaknesses Part 2.mp4 15.12 MB
6. Tor/12. Conclusions on Tor and mitigation to reduce risk.mp4 122.64 MB
6. Tor/13. Attacking Tor how the NSA targets users' online anonymity.mp4 26.24 MB
6. Tor/14. Hidden services – The Tor darknet.mp4 7.88 MB
6. Tor/15. Finding Tor hidden services.mp4 9.74 MB
6. Tor/16. Other Tor Apps.mp4 6.48 MB
7. VPN and Tor Routers/1. Goals and Learning Objectives.mp4 1.33 MB
7. VPN and Tor Routers/2. Introduction to VPN and Tor Routers.mp4 10.82 MB
7. VPN and Tor Routers/3. Custom Router Firmware for VPN & TOR Tunneling.mp4 21.43 MB
7. VPN and Tor Routers/4. Off the shelf VPN and TOR Routers.mp4 18.77 MB
7. VPN and Tor Routers/5. DIY Hardware TOR Routers.mp4 7.3 MB
7. VPN and Tor Routers/6. TOR and VPN Gateway Virtual Machines.mp4 16.31 MB
8. Proxies – HTTP, HTTPS, SOCKs and Web/1. Goals and Learning Objectives.mp4 1.64 MB
8. Proxies – HTTP, HTTPS, SOCKs and Web/2. Proxies – HTTP, HTTPS and SOCKS Part 1.mp4 17.16 MB
8. Proxies – HTTP, HTTPS, SOCKs and Web/3. Proxies – HTTP, HTTPS and SOCKS Part 2.mp4 16.33 MB
8. Proxies – HTTP, HTTPS, SOCKs and Web/4. CGI proxies - Web proxy or web form proxy.mp4 9.15 MB
9. SSH Secure Shell/1. Goals and Learning Objectives.mp4 1.65 MB
9. SSH Secure Shell/2. Introduction & How to Login.mp4 11.43 MB
9. SSH Secure Shell/3. SSH Remote Port Forwarding.mp4 18.49 MB
9. SSH Secure Shell/4. SSH Local Port Forwarding.mp4 8.18 MB
9. SSH Secure Shell/5. SSH Socks5 Proxy Tunneling with Dynamic Ports.mp4 21.84 MB
9. SSH Secure Shell/6. SSH Public private key authentication.mp4 21.86 MB
9. SSH Secure Shell/7. SSH Hardening.mp4 16.21 MB
10. I2P - The Invisible Internet Project/1. Goals and Learning Objectives.mp4 1.55 MB
10. I2P - The Invisible Internet Project/2. I2P - Introduction.mp4 30.33 MB
10. I2P - The Invisible Internet Project/3. I2P Installing and Secure Configuration Part 1.mp4 58.88 MB
10. I2P - The Invisible Internet Project/4. I2P Installing and Secure Configuration Part 2.mp4 46.99 MB
10. I2P - The Invisible Internet Project/5. I2P Strengths and Weaknesses.mp4 10.19 MB
11. Other Privacy and Anonymising Services/1. Goals and Learning Objectives.mp4 1.43 MB
11. Other Privacy and Anonymising Services/2. JonDonym - Introduction.mp4 20.98 MB
11. Other Privacy and Anonymising Services/3. JonDonym - Installing and Secure Configuration.mp4 14.33 MB
11. Other Privacy and Anonymising Services/4. Bullet Proof Hosting Services (BPHS).mp4 31.1 MB
11. Other Privacy and Anonymising Services/5. Botnets and Hacked Boxes.mp4 18.55 MB
12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/1. Goals and Learning Objectives.mp4 1.39 MB
12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/2. Outbound Firewall Bypassing - The Fundamentals Part 1.mp4 19.28 MB
12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/3. Outbound Firewall Bypassing - The Fundamentals Part 2.mp4 20.14 MB
12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/4. Outbound Bypassing - Tunneling through HTTP proxies.mp4 31.76 MB
12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/5. Outbound Bypassing - Port Sharing and Knocking.mp4 20.81 MB
12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/6. Outbound Bypassing – Cloaking and Obfuscating.mp4 18.13 MB
12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/7. Outbound Bypassing - Remote login - VNC and RDP.mp4 11.03 MB
12. Censorship Circumvention - Bypassing Firewalls & Deep Packet Inspection/8. Inbound Bypassing - Reverse shells, SSH remote tunneling and remote login.mp4 17.05 MB
13. ChainingNesting Privacy and Anonymising Services/1. Goals and Learning Objectives.mp4 2.51 MB
13. ChainingNesting Privacy and Anonymising Services/2. Introduction to nesting and chaining - Proxies, VPN, SSH, JonDonym and Tor.mp4 13.59 MB
13. ChainingNesting Privacy and Anonymising Services/3. Strengths and Weaknesses (User - SSH-VPN-JonDonym - Tor - Internet).mp4 21.07 MB
13. ChainingNesting Privacy and Anonymising Services/4. Strengths and Weaknesses (User - Tor - SSH-VPN-JonDonym - Internet).mp4 19.76 MB
13. ChainingNesting Privacy and Anonymising Services/5. Nested VPNs - Strength and Weaknesses.mp4 16.21 MB
13. ChainingNesting Privacy and Anonymising Services/6. How to setup nested VPNs.mp4 14.52 MB
13. ChainingNesting Privacy and Anonymising Services/7. How to setup nested SSH.mp4 19.34 MB
13. ChainingNesting Privacy and Anonymising Services/8. How to setup proxy chains.mp4 19.56 MB
13. ChainingNesting Privacy and Anonymising Services/9. How to setup - (User - VPN - Tor - Internet).mp4 4.84 MB
13. ChainingNesting Privacy and Anonymising Services/10. How to setup - (User - SSH - Tor - Internet).mp4 12.68 MB
13. ChainingNesting Privacy and Anonymising Services/11. How to setup - (User - JonDonym - Tor - Internet).mp4 4.33 MB
13. ChainingNesting Privacy and Anonymising Services/12. How to setup - (User - Tor - SSHVPNJonDoym - Internet) with transproxy.mp4 50.4 MB
13. ChainingNesting Privacy and Anonymising Services/13. How to setup - (User - Tor - SSHVPNJonDoym - Internet) with Whonix.mp4 21.67 MB
13. ChainingNesting Privacy and Anonymising Services/14. Setting up nested services (3 + hops).mp4 10.8 MB
14. Off-site Internet Connections - Hotspots and Cafes/1. Goals and Learning Objectives.mp4 1.9 MB
14. Off-site Internet Connections - Hotspots and Cafes/2. Staying safe while on public Wi-Fi hotspots.mp4 8.29 MB
14. Off-site Internet Connections - Hotspots and Cafes/3. Using Internet Cafés for security, privacy and anonymity safely.mp4 34.63 MB
14. Off-site Internet Connections - Hotspots and Cafes/4. Using public Wi-Fi hotspots for security, privacy and anonymity safely.mp4 18.41 MB
14. Off-site Internet Connections - Hotspots and Cafes/5. Finding public Wi-Fi hotspots.mp4 18.03 MB
14. Off-site Internet Connections - Hotspots and Cafes/6. Boosting Wi-Fi range.mp4 32.23 MB
14. Off-site Internet Connections - Hotspots and Cafes/7. How are Wi-Fi users geo located.mp4 12.43 MB
15. Mobile, Cell Phones & Cellular Networks/1. Goals and Learning Objectives.mp4 1.75 MB
15. Mobile, Cell Phones & Cellular Networks/2. Cellular Network Weaknesses - The Network Operator.mp4 12.42 MB
15. Mobile, Cell Phones & Cellular Networks/3. Cellular Networks Weaknesses - IMSI catchers.mp4 11.12 MB
15. Mobile, Cell Phones & Cellular Networks/4. Cellular Networks Weaknesses - Signaling System No7 (SS7).mp4 12.22 MB
15. Mobile, Cell Phones & Cellular Networks/5. Mobile and Cell Phone Weaknesses.mp4 22.15 MB
15. Mobile, Cell Phones & Cellular Networks/6. How to use a laptop and cellular networks for Internet privacy and anonymity.mp4 18.59 MB
15. Mobile, Cell Phones & Cellular Networks/7. How you are geo located when using a cellular network.mp4 12.7 MB
16. Wrap Up/1. Congratulations.mp4 8.23 MB
16. Wrap Up/3. Intro to Isolation & Compartmentalization.mp4 5.66 MB
16. Wrap Up/4. Firefox Hardening.mp4 142.28 MB
16. Wrap Up/5. Email Tracking & Exploits.mp4 26.77 MB
其他位置