Сообщение

[Udemy] The Complete Cyber Security Course : Anonymous Browsing! [2016, ENG]

Сообщение Солнышко » 26 фев 2017, 15:01

The Complete Cyber Security Course : Anonymous Browsing!


Год выпуска: 2016
Производитель: Udemy
Сайт производителя: www.udemy.com
Продолжительность: 13:29:54
Тип раздаваемого материала: Видеоурок
Язык: Английский

Описание: Том 3: Аноним, Скрыть мой IP, Internet Privacy, Hacker OPSEC, Tor, прокси-серверы и виртуальные частные сети Best
Learn a practical skill-set in in staying anonymous online and maintaining total privacy against even a well resourced adversary with global influence.

Covering all major platforms including Windows, MacOS, Linux. IOS and Android. Plus Tails, Whonix and others.

Go from beginner to expert in this easy to follow advanced course.
├── 01 Introduction
│ ├── 001 Welcome to Volume III.mp4
│ ├── 002 Introduction to the Instructor.mp4
│ ├── 003 Security Quick Win.mp4
│ ├── 004 Target Audience.mp4
│ ├── 005 Study Recommendations.mp4
│ ├── 006 Course updates.mp4
│ └── captions
│ ├── 002 Introduction to the Instructor-EN.srt
│ ├── 004 Target Audience-EN.srt
│ ├── 005 Study Recommendations-EN.srt
│ └── 006 Course updates-EN.srt
├── 02 Goals and Objectives for Volume III
│ └── 007 Goals and Learning Objectives.mp4
├── 03 OPSEC Operational Security
│ ├── 008 Goals and Learning Objectives.mp4
│ ├── 009 Introduction to OPSEC.mp4
│ ├── 010 Identities pseudonyms and aliases Identity Strategies.mp4
│ ├── 011 Establishing Cover.mp4
│ ├── 012 Identify Cross Contamination.mp4
│ ├── 013 10 Rules of OPSEC.mp4
│ ├── 014 Authorship Recognition and Evasion Methods.mp4
│ ├── 015 The knock.mp4
│ └── 016 Case Studies of OPSEC Failures.mp4
├── 04 Live Operating Systems Tails Knoppix Puppy linux Jondo live Tiny core linu
│ ├── 017 Goals and Learning Objectives.mp4
│ ├── 018 Introduction to live operating systems.mp4
│ ├── 019 Knoppix Puppy linux Jondo live Tiny core linux Window To Go.mp4
│ ├── 020 Tails.mp4
│ └── 021 Tails Demo.mp4
├── 05 Virtual Private Networks VPNs
│ ├── 022 Goals and Learning Objectives.mp4
│ ├── 023 Introduction to VPNs.mp4
│ ├── 024 Which VPN protocol is best to use and why.mp4
│ ├── 025 VPN Weaknesses.mp4
│ ├── 026 Can you trust VPN providers.mp4
│ ├── 027 VPNs and Domain Name System DNS Leaks.mp4
│ ├── 028 Setting up an OpenVPN client in Windows Mac iPhone and Android.mp4
│ ├── 029 Setting up an OpenVPN client on Linux.mp4
│ ├── 030 Preventing VPN Leaks - Firewalls and kill switches.mp4
│ ├── 031 Choosing the right VPN provider.mp4
│ ├── 032 Setting up an OpenVPN server Part 1 - The fast and easy way.mp4
│ ├── 033 Setting up an OpenVPN server Part 2 - Debian client.mp4
│ └── 034 Setting up an OpenVPN server Part 3 - Home VPN.mp4
├── 06 Tor
│ ├── 035 Goals and Learning Objectives.mp4
│ ├── 036 What is Tor.mp4
│ ├── 037 The Tor Network and Browser.mp4
│ ├── 038 What should Tor be used for.mp4
│ ├── 039 Directory Authorities and Relays.mp4
│ ├── 040 Tor Bridges.mp4
│ ├── 041 Tor Pluggable Transports and Traffic Obfuscation.mp4
│ ├── 042 Torrc Configuration File.mp4
│ ├── 043 Running other applications through Tor.mp4
│ ├── 044 Tor Weaknesses Part 1.mp4
│ ├── 045 Tor Weaknesses Part 2.mp4
│ ├── 046 Conclusions on Tor and mitigation to reduce risk.mp4
│ ├── 047 Attacking Tor how the NSA targets users online anonymity.mp4
│ ├── 048 Hidden services The Tor darknet.mp4
│ ├── 049 Finding Tor hidden services.mp4
│ └── 050 Other Tor Apps.mp4
├── 07 VPN and Tor Routers
│ ├── 051 Goals and Learning Objectives.mp4
│ ├── 052 Introduction to VPN and Tor Routers.mp4
│ ├── 053 Custom Router Firmware for VPN TOR Tunneling.mp4
│ ├── 054 Off the shelf VPN and TOR Routers.mp4
│ ├── 055 DIY Hardware TOR Routers.mp4
│ └── 056 TOR and VPN Gateway Virtual Machines.mp4
├── 08 Proxies HTTP HTTPS SOCKs and Web
│ ├── 057 Goals and Learning Objectives.mp4
│ ├── 058 Proxies HTTP HTTPS and SOCKS Part 1.mp4
│ ├── 059 Proxies HTTP HTTPS and SOCKS Part 2.mp4
│ └── 060 CGI proxies - Web proxy or web form proxy.mp4
├── 09 SSH Secure Shell
│ ├── 061 Goals and Learning Objectives.mp4
│ ├── 062 Introduction How to Login.mp4
│ ├── 063 SSH Remote Port Forwarding.mp4
│ ├── 064 SSH Local Port Forwarding.mp4
│ ├── 065 SSH Socks5 Proxy Tunneling with Dynamic Ports.mp4
│ ├── 066 SSH Public private key authentication.mp4
│ └── 067 SSH Hardening.mp4
├── 10 I2P - The Invisible Internet Project
│ ├── 068 Goals and Learning Objectives.mp4
│ ├── 069 I2P - Introduction.mp4
│ ├── 070 I2P Installing and Secure Configuration Part 1.mp4
│ ├── 071 I2P Installing and Secure Configuration Part 2.mp4
│ └── 072 I2P Strengths and Weaknesses.mp4
├── 11 Other Privacy and Anonymising Services
│ ├── 073 Goals and Learning Objectives.mp4
│ ├── 074 JonDonym - Introduction.mp4
│ ├── 075 JonDonym - Installing and Secure Configuration.mp4
│ ├── 076 Bullet Proof Hosting Services BPHS.mp4
│ └── 077 Botnets and Hacked Boxes.mp4
├── 12 Censorship Circumvention - Bypassing Firewalls Deep Packet Inspection
│ ├── 078 Goals and Learning Objectives.mp4
│ ├── 079 Outbound Firewall Bypassing - The Fundamentals Part 1.mp4
│ ├── 080 Outbound Firewall Bypassing - The Fundamentals Part 2.mp4
│ ├── 081 Outbound Bypassing - Tunneling through HTTP proxies.mp4
│ ├── 082 Outbound Bypassing - Port Sharing and Knocking.mp4
│ ├── 083 Outbound Bypassing Cloaking and Obfuscating.mp4
│ ├── 084 Outbound Bypassing - Remote login - VNC and RDP.mp4
│ └── 085 Inbound Bypassing - Reverse shells SSH remote tunneling and remote login.mp4
├── 13 ChainingNesting Privacy and Anonymising Services
│ ├── 086 Goals and Learning Objectives.mp4
│ ├── 087 Introduction to nesting and chaining - Proxies VPN SSH JonDonym and Tor.mp4
│ ├── 088 Strengths and Weaknesses User - SSH-VPN-JonDonym - Tor - Internet.mp4
│ ├── 089 Strengths and Weaknesses User - Tor - SSH-VPN-JonDonym - Internet.mp4
│ ├── 090 Nested VPNs - Strength and Weaknesses.mp4
│ ├── 091 How to setup nested VPNs.mp4
│ ├── 092 How to setup nested SSH.mp4
│ ├── 093 How to setup proxy chains.mp4
│ ├── 094 How to setup - User - VPN - Tor - Internet.mp4
│ ├── 095 How to setup - User - SSH - Tor - Internet.mp4
│ ├── 096 How to setup - User - JonDonym - Tor - Internet.mp4
│ ├── 097 How to setup - User - Tor - SSHVPNJonDoym - Internet with transproxy.mp4
│ ├── 098 How to setup - User - Tor - SSHVPNJonDoym - Internet with Whonix.mp4
│ └── 099 Setting up nested services 3 hops.mp4
├── 14 Off-site Internet Connections - Hotspots and Cafes
│ ├── 100 Goals and Learning Objectives.mp4
│ ├── 101 Staying safe while on public Wi-Fi hotspots.mp4
│ ├── 103.mp4
│ ├── 103 Using public Wi-Fi hotspots for security privacy and anonymity safely.mp4
│ ├── 104 Finding public Wi-Fi hotspots.mp4
│ ├── 105 Boosting Wi-Fi range.mp4
│ └── 106 How are Wi-Fi users geo located.mp4
├── 15 Mobile Cell Phones Cellular Networks
│ ├── 107 Goals and Learning Objectives.mp4
│ ├── 108 Cellular Network Weaknesses - The Network Operator.mp4
│ ├── 109 Cellular Networks Weaknesses - IMSI catchers.mp4
│ ├── 110 Cellular Networks Weaknesses - Signaling System No7 SS7.mp4
│ ├── 111 Mobile and Cell Phone Weaknesses.mp4
│ ├── 112 How to use a laptop and cellular networks for Internet privacy and anonymity.mp4
│ └── 113 How you are geo located when using a cellular network.mp4
└── 16 BONUS SECTION - Whats next Volume IV
├── 114 BONUS - Important Information.mp4
├── 115 Congratulations.mp4
├── 116 Certificate Of Completion for CPEs.html
├── 117 BONUS - Example Lecture from Volume I- Intro to Isolation Compartmentalization.mp4
├── 118 BONUS - Example Lecture from Volume II - Firefox Hardening.mp4
├── 119 BONUS - Example Lecture from Volume 4 - Email Tracking Exploits.mp4
Файлы примеров: отсутствуют
Формат видео: MP4
Видео : AVC, 1280x720 (16:9), 30.000 fps, ~1 006 Kbps avg, 0.036 bit/pixel
Аудио: 48.0 KHz, AAC LC, 2 ch, ~192 Kbps





























Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 26 фев 2017, 15:01
Размер: 2.89 ГБ
Размер: 3 099 671 718 байт
Сидеров: 0
Личеров: 0
Скачали: 0
Здоровье: 0%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: Нет
Последний личер: Нет
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 28.5 КБ / Просмотров 0 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность