Сообщение

[Udemy] The Complete Cyber Security Course : Hacking Exposed! [2016, ENG]

Сообщение Солнышко » 26 фев 2017, 15:19

The Complete Cyber Security Course : Hacking Exposed!


Год выпуска: 2016
Производитель: Udemy
Сайт производителя: www.udemy.com
Продолжительность: 10:52:08
Тип раздаваемого материала: Видеоурок
Язык: Английский

Описание:
Том 1: Узнайте, как остановить хакеров, предотвратить отслеживание, расширенный анонимный просмотр и с
Learn a practical skill-set in defeating all online threats, including - advanced hackers, trackers, malware, zero days, exploit kits, cyber criminals and more.

Go from a beginner to advanced in this easy to follow expert course.

Covering all major platforms - Windows 7, Windows 8, Windows 10, MacOS and Linux.

This course covers the fundamental building blocks of your required skillset - You will understand the threat and vulnerability landscape through threat modelling and the risk assessment.

We explore the Darknet and mind-set of the cyber criminal. Covering malware, exploit kits, phishing, zero day vulnerabilities and much more.

You will learn about the global tracking and hacking infrastructures that nation states run. Covering the NSA, FBI, CIA, GCHQ, China’s MSS and other intelligence agencies capabilities.

You will understand the foundations of operating system security and privacy functionality. A close look at the new Windows 10 privacy issues and how to best mitigate them.

There is a complete easy to follow crash course on encryption, how encryption can be bypassed and what you can do to mitigate the risks.

Master defences against phishing, SMShing, vishing, identity theft, scam, cons an other social engineering threats.

Finally we cover the extremely important, but underused security control of isolation and compartmentalization. Covering sandboxes, application isolation, virtual machines, Whonix and Qubes OS.

This is volume 1 of 4 of your complete guide to cyber security privacy and anonymity.

- Volume 4 release data November 2016
├── 01 Introduction
│ ├── 001 Welcome and Introduction to the Instructor.mp4
│ ├── 002 Goals and Learning Objectives - Volume 1.mp4
│ ├── 003 Target Audience.mp4
│ ├── 004 Study Recommendations.mp4
│ └── 005 Course updates.mp4
├── 02 know Yourself - The Threat and Vulnerability Landscape
│ ├── 006 Goals and Learning Objectives.mp4
│ ├── 007 Protect What You Value.mp4
│ ├── 008 What is Privacy Anonymity and Pseudonymity.mp4
│ ├── 009 Security Vulnerabilities Threats and Adversaries.mp4
│ ├── 010 Threat Modeling and Risk Assessments.mp4
│ ├── 011 Security vs Privacy vs Anonymity - Can we have it all.mp4
│ ├── 012 Defense In Depth.mp4
│ ├── 013 The Zero Trust Model.mp4
│ └── attached_files
│ └── 009 Security Vulnerabilities Threats and Adversaries
│ └── The-Cyber-Security-Landscape-Diagram.jpg
├── 03 Know Your Enemy - The Current Threat and Vulnerability Landscape
│ ├── 014 Goals and Learning Objectives.mp4
│ ├── 015 Why You Need Security The Value Of A Hack.mp4
│ ├── 016 The Top 3 Things You Need To Stay Safe Online.mp4
│ ├── 017 Security Bugs and Vulnerabilities - The Vulnerability Landscape.mp4
│ ├── 018 Hackers crackers and cyber criminals.mp4
│ ├── 019 Malware viruses rootkits and RATs.mp4
│ ├── 020 Spyware Adware Scareware PUPs Browser hijacking.mp4
│ ├── 021 What is Phishing Vishing and SMShing.mp4
│ ├── 022 Spamming Doxing.mp4
│ ├── 023 Social engineering - Scams cons tricks and fraud.mp4
│ ├── 024 Darknets Dark Markets and Exploit kits.mp4
│ ├── 025 Governments spies and secret stuff part I.mp4
│ ├── 026 Governments spies and secret stuff part II.mp4
│ ├── 027 Regulating encryption mandating insecurity legalizing spying.mp4
│ ├── 028 Trust Backdoors.mp4
│ ├── 029 Censorship.mp4
│ └── 030 Security News and Alerts Stay Informed.mp4
├── 04 Encryption Crash Course
│ ├── 031 Goals and Learning Objectives.mp4
│ ├── 032 Symmetric Encryption.mp4
│ ├── 033 Asymmetric Encryption.mp4
│ ├── 034 Hash Functions.mp4
│ ├── 035 Digital Signatures.mp4
│ ├── 036 Secure Sockets Layer SSL and Transport layer security TLS.mp4
│ ├── 037 SSL Stripping.mp4
│ ├── 038 HTTPS HTTP Secure.mp4
│ ├── 039 Digital Certificates.mp4
│ ├── 040 Certificate Authorities and HTTPS.mp4
│ ├── 041 End-to-End Encryption E2EE.mp4
│ ├── 042 Steganography.mp4
│ └── 043 How Security and Encryption is Really Attacked.mp4
├── 05 Setting up a Testing Environment Using Virtual Machines
│ ├── 044 Goals and Learning Objectives.mp4
│ ├── 045 Introduction to Setting up a Testing Environment Using Virtual Machines.mp4
│ ├── 046 Vmware.mp4
│ ├── 047 Virtual box.mp4
│ └── 048 Kali Linux 2016.mp4
├── 06 Operating System Security Privacy Windows vs Mac OS X vs Linux
│ ├── 049 Goals and Learning Objectives.mp4
│ ├── 050 Security Features and Functionality.mp4
│ ├── 051 Security Bugs and Vulnerabilities.mp4
│ ├── 052 Usage Share.mp4
│ ├── 053 Windows 10 - Privacy Tracking.mp4
│ ├── 054 Windows 10 - Disable tracking automatically.mp4
│ ├── 055 Windows 10 - Tool Disable Windows 10 Tracking.mp4
│ ├── 056 Windows 10 Cortana.mp4
│ ├── 057 Windows 10 Privacy Settings.mp4
│ ├── 058 Windows 10 - WiFi Sense.mp4
│ ├── 059 Windows 7 8 and 8.1 - Privacy Tracking.mp4
│ ├── 060 Mac OS X - Privacy Tracking.mp4
│ ├── 061 Linux and Unix like Operating systems.mp4
│ ├── 062 Linux - Debian.mp4
│ ├── 063 Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp4
│ ├── 064 Linux - OpenBSD and Archlinux.mp4
│ └── 065 Linux - Ubuntu.mp4
├── 07 Security Bugs and Vulnerabilities
│ ├── 066 Goals and Learning Objectives.mp4
│ ├── 067 The Importance of Patching.mp4
│ ├── 068 Windows 7 - Auto Update.mp4
│ ├── 069 Windows 8 8.1 - Auto Update.mp4
│ ├── 070 Windows 10 - Auto Update.mp4
│ ├── 071 Windows - Criticality and Patch Tuesday.mp4
│ ├── 072 Windows 7 8 8.1 10 - Automate the pain away from patching.mp4
│ ├── 073 Linux - Debian - Patching.mp4
│ ├── 074 Mac OS X - Patching.mp4
│ ├── 075 Firefox - Browser and extension updates.mp4
│ ├── 076 Chrome - Browser and extension updates.mp4
│ ├── 077 IE and Edge - Browser and extention updates.mp4
│ └── 078 Auto updates - The Impact to privacy and anonymity.mp4
├── 08 Reducing Threat Privilege
│ ├── 079 Goals and Learning Objectives Removing Privilege.mp4
│ ├── 080 Windows 7 - Not using admin.mp4
│ ├── 081 Windows 8 and 8.1 - Not using admin.mp4
│ └── 082 Windows 10 - Not using admin.mp4
├── 09 Social Engineering and Social Media Offence and Defence
│ ├── 083 Goals and Learning Objectives.mp4
│ ├── 084 Information Disclosure and Identity Strategies for Social Media.mp4
│ ├── 085 Identify Verification and Registration.mp4
│ ├── 086 Behavioural Security Controls Against Social Threats Phishing Spam Part 1.mp4
│ ├── 087 Behavioural Security Controls Against Social Threats Phishing Spam Part 2.mp4
│ └── 088 Technical Security Controls Against Social Threats Phishing Spam Scam Cons.mp4
├── 10 Security Domains
│ ├── 089 Goals and Learning Objectives.mp4
│ └── 090 Security Domains.mp4
├── 11 Security Through Isolation and Compartmentalization
│ ├── 091 Goals and Learning Objectives.mp4
│ ├── 092 Introduction to Isolation and Compartmentalization.mp4
│ ├── 093 Physical and Hardware Isolation - How to change the Mac Address.mp4
│ ├── 094 Physical and Hardware Isolation - Hardware Serials.mp4
│ ├── 095 Virtual Isolation.mp4
│ ├── 096 Dual Boot.mp4
│ ├── 097 Built-in Sandboxes and Application Isolation.mp4
│ ├── 098 Windows - Sandboxes and Application Isolation.mp4
│ ├── 099 Windows - Sandboxes and Application Isolation - Sandboxie.mp4
│ ├── 100 Linux - Sandboxes and Application Isolation.mp4
│ ├── 101 Mac OS X - Sandboxes and Application Isolation.mp4
│ ├── 102 Virtual Machines.mp4
│ ├── 103 Virtual Machine Weaknesses.mp4
│ ├── 104 Virtual Machine Hardening.mp4
│ ├── 105 Whonix OS - Anonymous Operating system.mp4
│ ├── 106 Whonix OS - Weaknesses.mp4
│ ├── 107 Qubes OS.mp4
│ └── 108 Security Domains Isolation and Compartmentalization.mp4
└── 12 BONUS - Whats next... Volume 2 3 and 4
├── 109 BONUS - Important Information.mp4
├── 110 Congratulations.mp4
├── 111 BONUS Lecture from Volume 2 - Router Vulnerability Scanning Shodan Qualys.mp4
├── 112 BONUS Lecture from Volume 2 - Password cracking part 2.mp4
├── 113 BONUS Lecture from Volume 3 - Bypassing firewalls and HTTP proxies part 3.mp4
├── 114 BONUS Lecture from Volume 4 - Email clients protocols and authentication.mp4
└── 115 BONUS DISCOUNT COUPONS
Файлы примеров: отсутствуют
Формат видео: MP4
Видео : AVC, 1280x720, 1920x1080,, (16:9), 29.970 fps, ~471 Kbps avg, 0.008 bit/pixel
Аудио: 44.1 KHz, AAC LC, 2 ch, ~126 Kbps




























Постеры

Соцсети

 

Статистика

Автор: Солнышко
Добавлен: 26 фев 2017, 15:19
Размер: 9.66 ГБ
Размер: 10 375 433 656 байт
Сидеров: 0
Личеров: 0
Скачали: 0
Здоровье: 0%
Скорость скачивания: 0 байт/сек
Скорость раздачи: 0 байт/сек
Последний сидер: Нет
Последний личер: Нет
Приватный: Нет (DHT включён)
Сеть и безопасность Скачать торрент
Скачать торрент
[ Размер 63.11 КБ / Просмотров 0 ]

Поделиться



  • Похожие торренты
    Ответы
    Просмотры
    Последнее сообщение

Вернуться в Сеть и безопасность