zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Cyber Security - VOLUME 4
magnet:?xt=urn:btih:f8fe572fc4751fa23dd39c4dbe939a414cb7b5ce&dn=Cyber Security - VOLUME 4
磁力链接详情
文件列表详情
f8fe572fc4751fa23dd39c4dbe939a414cb7b5ce
infohash:
151
文件数量
2.52 GB
文件大小
2020-12-5 04:18
创建日期
2024-12-13 06:41
最后访问
相关分词
Cyber
Security
-
VOLUME
4
8. Malware and Hacker Hunting on the End-Point/11. Windows - Malware Seek & Destroy - Process Monitor.mp4 76.22 MB
1. Introduction/2. Introduction to the Instructor!.mp4 17.14 MB
1. Introduction/3. Security Quick Win!.mp4 44.62 MB
1. Introduction/4. Target Audience.mp4 7.33 MB
1. Introduction/5. Study Recommendations.mp4 27.9 MB
1. Introduction/6. Course updates.mp4 2.57 MB
2. Goals and Learning Objectives - Volume 4/1. What is End Point Protection and why is it important.mp4 34.32 MB
2. Goals and Learning Objectives - Volume 4/2. Goals and Learning Objectives - Volume 4.mp4 25.4 MB
3. File and Disk Encryption/1. Goals and Learning Objectives.mp4 7.2 MB
3. File and Disk Encryption/3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.mp4 16.79 MB
3. File and Disk Encryption/4. Disk Encryption Attacks - Physical.mp4 38.32 MB
3. File and Disk Encryption/5. Disk Encryption Attacks - Containers, Volumes and Partitions.mp4 7.19 MB
3. File and Disk Encryption/6. Windows - Disk Encryption - An Introduction.mp4 7.52 MB
3. File and Disk Encryption/7. Windows - Disk Encryption - Bitlocker.mp4 30.21 MB
3. File and Disk Encryption/8. Windows - Setting Up BitLocker.mp4 23.64 MB
3. File and Disk Encryption/9. Windows - Disk Encryption - VeraCrypt.mp4 25.06 MB
3. File and Disk Encryption/10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.mp4 6.76 MB
3. File and Disk Encryption/11. Windows, Mac & Linux - Setting up VeraCrypt.mp4 29.81 MB
3. File and Disk Encryption/12. Mac - Filevault2.mp4 13.17 MB
3. File and Disk Encryption/14. Linux Whole Disk Encryption - Dm-crypt and LUKS.mp4 13.76 MB
3. File and Disk Encryption/15. Linux - Setting up DMCryptLUKS.mp4 13.19 MB
3. File and Disk Encryption/16. Linux - Encrypting the boot partition with Grub2.mp4 11.72 MB
3. File and Disk Encryption/17. Self Encrypting Drives (SEDs).mp4 3.17 MB
3. File and Disk Encryption/18. Defense Against Disk Decryption Attacks.mp4 20.86 MB
3. File and Disk Encryption/19. File Encryption.mp4 11.11 MB
3. File and Disk Encryption/20. Mandatory Key Disclosure & Plausible Deniability.mp4 20.54 MB
3. File and Disk Encryption/21. Nesting Crypto Systems & Obfuscation.mp4 8.89 MB
3. File and Disk Encryption/22. Case Studies in Disk Decryption.mp4 5.88 MB
4. Anti-Virus and End-Point-Protection/1. Goals and Learning Objectives.mp4 5.62 MB
4. Anti-Virus and End-Point-Protection/2. Is Anti-Virus dead - The Threat Landscape.mp4 11.34 MB
4. Anti-Virus and End-Point-Protection/3. Is Anti-Virus dead - Protection Methods.mp4 36.61 MB
4. Anti-Virus and End-Point-Protection/4. Ransomware.mp4 8.5 MB
4. Anti-Virus and End-Point-Protection/5. Anti-Virus and End-Point-Protection Testing.mp4 12.9 MB
4. Anti-Virus and End-Point-Protection/6. The Problem With AV and EPP Testing.mp4 6.66 MB
4. Anti-Virus and End-Point-Protection/7. The Best of Business End-Point-Protection (EPP).mp4 9.41 MB
4. Anti-Virus and End-Point-Protection/8. Windows - The Best of Anti-Virus and End-Point-Protection.mp4 10.29 MB
4. Anti-Virus and End-Point-Protection/9. Business End Point Protection (EPP).mp4 5.15 MB
4. Anti-Virus and End-Point-Protection/10. Mac - XProtect.mp4 13.5 MB
4. Anti-Virus and End-Point-Protection/11. Mac - The Best of Anti-Virus and End-Point-Protection.mp4 6.53 MB
4. Anti-Virus and End-Point-Protection/12. Linux - The Best of Anti-Virus and End-Point-Protection.mp4 6.18 MB
4. Anti-Virus and End-Point-Protection/13. Online and Second Opinion - Anti-Virus and End-Point-Protection.mp4 9.97 MB
4. Anti-Virus and End-Point-Protection/14. Is Anti-Virus and End-Point-Protection Dangerous.mp4 13.33 MB
6. End-Point-Protection Technology/1. Goals and Learning Objectives.mp4 5.78 MB
6. End-Point-Protection Technology/4. Windows - Application control - User Account Control (UAC).mp4 15.37 MB
6. End-Point-Protection Technology/5. Windows - Application control - Software Restriction Policies.mp4 11.29 MB
6. End-Point-Protection Technology/6. Windows - Application control - AppLocker.mp4 32.16 MB
6. End-Point-Protection Technology/7. Windows - Application Control - Parental controls.mp4 4.87 MB
6. End-Point-Protection Technology/9. Windows - Exploitation Prevention - EMET.mp4 37.37 MB
6. End-Point-Protection Technology/10. Windows - Exploitation Prevention - Traps, MBEA and HMPA.mp4 11.25 MB
6. End-Point-Protection Technology/11. Windows 10 - Device Guard.mp4 27.85 MB
6. End-Point-Protection Technology/12. Windows - Defender Application Guard for Microsoft Edge.mp4 9.08 MB
6. End-Point-Protection Technology/13. Linux - Access Control Models.mp4 13.36 MB
6. End-Point-Protection Technology/14. Linux - Security frameworks - AppArmor.mp4 4.4 MB
6. End-Point-Protection Technology/15. Linux - Security frameworks - SElinux.mp4 6.68 MB
6. End-Point-Protection Technology/16. Linux - Security frameworks - Grsecurity.mp4 12.79 MB
6. End-Point-Protection Technology/17. Linux - Security frameworks - PaX and more.mp4 3.85 MB
6. End-Point-Protection Technology/18. Linux & Mac - File permissions, POSIX and ACLs.mp4 19.04 MB
6. End-Point-Protection Technology/19. Mac - Application control - Parental controls.mp4 8.01 MB
6. End-Point-Protection Technology/20. Mac - Application control - Gatekeeper.mp4 10.21 MB
6. End-Point-Protection Technology/21. Mac - Application control - System Integrity Protection.mp4 12.03 MB
6. End-Point-Protection Technology/22. Mac - Application control - Santa.mp4 7.05 MB
6. End-Point-Protection Technology/23. Mac - Application control - Xfence (Previously Little Flocker).mp4 20.39 MB
6. End-Point-Protection Technology/24. Mac - Other Stuff!.mp4 3.7 MB
6. End-Point-Protection Technology/25. The New Normal For End-Point-Protection Technology.mp4 22.42 MB
6. End-Point-Protection Technology/26. Cylance.mp4 9.55 MB
7. Threat Detection and Monitoring/1. Goals and Learning Objectives.mp4 7.16 MB
7. Threat Detection and Monitoring/2. A Complete Failure to Detect Threats.mp4 11.45 MB
7. Threat Detection and Monitoring/3. Rethinking Honeypots.mp4 8.9 MB
7. Threat Detection and Monitoring/4. CanaryTokens.mp4 70.27 MB
7. Threat Detection and Monitoring/5. OpenCanary.mp4 38.8 MB
7. Threat Detection and Monitoring/6. Artillery - Binary Defense.mp4 11.11 MB
7. Threat Detection and Monitoring/7. Honey Drive.mp4 2.53 MB
7. Threat Detection and Monitoring/8. Intrusion Detection Systems (IDS) Part 1 - Methods.mp4 13.25 MB
7. Threat Detection and Monitoring/10. Host-Based Intrusion Detection - OSSEC.mp4 17.69 MB
7. Threat Detection and Monitoring/11. Network Analysis - Sguil, Xplico & NetworkMiner.mp4 8.86 MB
7. Threat Detection and Monitoring/12. File Integrity Monitoring (FIM) and Checking Part 1.mp4 7.75 MB
7. Threat Detection and Monitoring/14. Network Security Toolkit (NST).mp4 4.81 MB
7. Threat Detection and Monitoring/15. Security Onion.mp4 5.78 MB
7. Threat Detection and Monitoring/16. Security Information and Event Management Software (SIEM).mp4 6.16 MB
8. Malware and Hacker Hunting on the End-Point/1. Goals and Learning Objectives.mp4 7.21 MB
8. Malware and Hacker Hunting on the End-Point/2. Introduction to Malware and Hacker Hunting.mp4 16.35 MB
8. Malware and Hacker Hunting on the End-Point/3. Windows - Farbar Recovery Scanner.mp4 38.06 MB
8. Malware and Hacker Hunting on the End-Point/4. Automated Malware Removal Tools.mp4 39.97 MB
8. Malware and Hacker Hunting on the End-Point/5. Live Rescue Operating Systems, CDs, and USBs.mp4 18.33 MB
8. Malware and Hacker Hunting on the End-Point/6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.mp4 57.78 MB
8. Malware and Hacker Hunting on the End-Point/7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.mp4 46.72 MB
8. Malware and Hacker Hunting on the End-Point/8. Windows - Malware Seek & Destroy - Process Tools.mp4 8.79 MB
8. Malware and Hacker Hunting on the End-Point/9. Windows - Malware Seek & Destroy - Sigcheck.mp4 4.55 MB
8. Malware and Hacker Hunting on the End-Point/10. Windows - Malware Seek & Destroy - Autoruns.mp4 48.31 MB
1. Introduction/1. Welcome to Volume 4.mp4 7.2 MB
8. Malware and Hacker Hunting on the End-Point/12. Windows - Malware Seek & Destroy - Network Connections.mp4 23.97 MB
8. Malware and Hacker Hunting on the End-Point/13. Malware Seek & Destroy - Networkx.mp4 5.42 MB
8. Malware and Hacker Hunting on the End-Point/14. Linux - Malware Seek & Destroy - Sysdig.mp4 29.65 MB
8. Malware and Hacker Hunting on the End-Point/15. Linux - Seek & Destroy Malware and Hackers - Csysdig.mp4 43.66 MB
8. Malware and Hacker Hunting on the End-Point/18. Linux & Mac OS X - Malware Seek & Destroy - lsof.mp4 22.23 MB
8. Malware and Hacker Hunting on the End-Point/19. Linux - Malware Seek & Destroy - rkhunter.mp4 17.23 MB
8. Malware and Hacker Hunting on the End-Point/21. Linux - Malware Seek & Destroy - Linux - Persistence Part 1.mp4 9.22 MB
8. Malware and Hacker Hunting on the End-Point/22. Linux - Malware Seek & Destroy - Linux - Persistence Part 2.mp4 27.61 MB
8. Malware and Hacker Hunting on the End-Point/23. Linux - Malware Seek & Destroy - Linux - Persistence Part 3.mp4 5.23 MB
8. Malware and Hacker Hunting on the End-Point/26. Mac, Linux & Windows - OSquery.mp4 42.3 MB
8. Malware and Hacker Hunting on the End-Point/27. Firmware Rootkits – Seek and Destroy Part 1.mp4 15.96 MB
8. Malware and Hacker Hunting on the End-Point/28. Firmware Rootkits – Seek and Destroy Part 2.mp4 8.89 MB
8. Malware and Hacker Hunting on the End-Point/29. End-Point-Protection Recovery and Remediation Technology.mp4 10.5 MB
8. Malware and Hacker Hunting on the End-Point/30. Encrypted Backup and Cloud Storage.mp4 14.14 MB
9. Operating System and Application Hardening/1. Goals and Learning Objectives.mp4 7.19 MB
9. Operating System and Application Hardening/2. An Introduction to Hardening.mp4 8.9 MB
9. Operating System and Application Hardening/3. Hardening Standards.mp4 41.53 MB
9. Operating System and Application Hardening/4. OpenSCAP.mp4 31.25 MB
9. Operating System and Application Hardening/5. Baseline Auditing.mp4 12.43 MB
9. Operating System and Application Hardening/6. Windows - Hardening.mp4 9.31 MB
9. Operating System and Application Hardening/7. Windows - Security Compliance Manager (SCM).mp4 44.88 MB
9. Operating System and Application Hardening/8. Mac – Hardening.mp4 3.52 MB
9. Operating System and Application Hardening/9. Linux – Hardening.mp4 9.04 MB
9. Operating System and Application Hardening/10. Security Focused Operating Systems.mp4 9.85 MB
9. Operating System and Application Hardening/11. Monitoring for Security Drift.mp4 2.55 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/1. Goals and Learning Objectives.mp4 6.5 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/2. Secure File Deletion - Mechanical drives.mp4 19.69 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/3. Secure File Deletion - Solid Sate Drives.mp4 12.1 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/5. Evidence Elimination - CCleaner and Bleachit.mp4 18.27 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7. Disk Wiping - Mechanical Drives.mp4 11.44 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/8. Disk Wiping - Solid State Drives (SSD).mp4 23.13 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/9. Scrubbing EXIF & Metadata Part 1 - Introduction.mp4 16.24 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10. Scrubbing EXIF & Metadata Part 2 - Tools.mp4 20.45 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/11. Scrubbing EXIF & Metadata Part 3 - Guidance.mp4 8.42 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/12. Sensor Noise Camera Identification.mp4 9.02 MB
11. Email Security, Privacy and Anonymity/1. Goals and Learning Objectives.mp4 9.5 MB
11. Email Security, Privacy and Anonymity/2. Clients, Protocols and Authentication.mp4 38.18 MB
11. Email Security, Privacy and Anonymity/3. Email Weaknesses.mp4 30.78 MB
11. Email Security, Privacy and Anonymity/4. PGP, GPG & Privacy.mp4 12.99 MB
11. Email Security, Privacy and Anonymity/6. Windows - PGP & GPG.mp4 58.31 MB
11. Email Security, Privacy and Anonymity/7. Tail - PGP & GPG.mp4 9.67 MB
11. Email Security, Privacy and Anonymity/9. Improving OpenPGP Security - Best Practices - Part 1.mp4 5.57 MB
11. Email Security, Privacy and Anonymity/10. Improving OpenPGP Security - Primary and Subkeys - Part 2.mp4 28.71 MB
11. Email Security, Privacy and Anonymity/12. Email Tracking & Exploits.mp4 26.77 MB
11. Email Security, Privacy and Anonymity/13. Email Anonymity & Pseudonymity.mp4 15.9 MB
11. Email Security, Privacy and Anonymity/16. Choosing an Email Provider.mp4 37.38 MB
11. Email Security, Privacy and Anonymity/17. Email Alternatives.mp4 7.42 MB
12. Messengers - Security, Privacy and Anonymity/1. Goals and Learning Objectives.mp4 2.81 MB
12. Messengers - Security, Privacy and Anonymity/2. An Introduction to Instant Messengers.mp4 25.2 MB
12. Messengers - Security, Privacy and Anonymity/3. Instant Messenger - Signal.mp4 5.89 MB
12. Messengers - Security, Privacy and Anonymity/4. Instant Messengers - Chatsecure.mp4 4 MB
12. Messengers - Security, Privacy and Anonymity/5. Instant Messengers - Cryptocat.mp4 1.46 MB
12. Messengers - Security, Privacy and Anonymity/6. Instant Messengers - Ricochet.mp4 1.47 MB
12. Messengers - Security, Privacy and Anonymity/7. Instant Messengers - Other.mp4 1.54 MB
12. Messengers - Security, Privacy and Anonymity/8. Video and Voice Messengers - Linphone.mp4 11.51 MB
12. Messengers - Security, Privacy and Anonymity/9. Video and Voice Messengers - Jitsi.mp4 3.74 MB
12. Messengers - Security, Privacy and Anonymity/10. Video and Voice Messengers - Other.mp4 2.63 MB
13. Wrap Up/1. Congratulations!!.mp4 4.31 MB
13. Wrap Up/3. Qubes OS.mp4 56.32 MB
13. Wrap Up/4. Effective Network Isolation.mp4 28.05 MB
13. Wrap Up/5. Socks5 proxy tunneling.mp4 23 MB
其他位置