本站已收录 番号和无损神作磁力链接/BT种子 

[Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course End Point Protection!

种子简介

种子名称: [Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course End Point Protection!
文件类型: 视频
文件数目: 175个文件
文件大小: 2.84 GB
收录时间: 2021-6-30 17:47
已经下载: 3
资源热度: 154
最近下载: 2024-6-21 13:59

下载BT种子文件

下载Torrent文件(.torrent) 立即下载

磁力链接下载

magnet:?xt=urn:btih:0089657f98676912af8efefe25aae610493493c1&dn=[Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course End Point Protection! 复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。

喜欢这个种子的人也喜欢

种子包含的文件

[Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course End Point Protection!.torrent
  • 1. Introduction/1. Welcome to Volume 4.mp47.19MB
  • 1. Introduction/2. Introduction to the Instructor!.mp417.13MB
  • 1. Introduction/3. Security Quick Win!.mp444.62MB
  • 1. Introduction/4. Target Audience.mp47.33MB
  • 1. Introduction/5. Study Recommendations.mp427.9MB
  • 1. Introduction/6. Course updates.mp42.57MB
  • 10/1. Goals and Learning Objectives.mp46.5MB
  • 10/10. Scrubbing EXIF & Metadata Part 2 - Tools.mp420.45MB
  • 10/11. Scrubbing EXIF & Metadata Part 3 - Guidance.mp48.42MB
  • 10/12. Sensor Noise Camera Identification.mp49.01MB
  • 10/2. Secure File Deletion - Mechanical drives.mp419.69MB
  • 10/3. Secure File Deletion - Solid Sate Drives.mp412.1MB
  • 10/4. Evidence Elimination & Anti-Forensics - An Introduction.mp48.27MB
  • 10/5. Evidence Elimination - CCleaner and Bleachit.mp418.27MB
  • 10/6. Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer.mp414.18MB
  • 10/7. Disk Wiping - Mechanical Drives.mp411.43MB
  • 10/8. Disk Wiping - Solid State Drives (SSD).mp423.13MB
  • 10/9. Scrubbing EXIF & Metadata Part 1 - Introduction.mp416.24MB
  • 11/1. Goals and Learning Objectives.mp49.5MB
  • 11/10. Improving OpenPGP Security - Primary and Subkeys - Part 2.mp428.7MB
  • 11/11. Improving OpenPGP Security - SmartcardsYubikey - Part 3.mp422.15MB
  • 11/12. Email Tracking & Exploits.mp426.78MB
  • 11/13. Email Anonymity & Pseudonymity.mp415.9MB
  • 11/14. TorBirdy.mp421.53MB
  • 11/15. Remailers.mp419.54MB
  • 11/16. Choosing an Email Provider.mp437.38MB
  • 11/17. Email Alternatives.mp47.42MB
  • 11/2. Clients, Protocols and Authentication.mp438.19MB
  • 11/3. Email Weaknesses.mp430.78MB
  • 11/4. PGP, GPG & Privacy.mp412.98MB
  • 11/5. PGP & GPG Clients.mp415.04MB
  • 11/6. Windows - PGP & GPG.mp458.31MB
  • 11/7. Tail - PGP & GPG.mp49.67MB
  • 11/8. PGP & GPG Weaknesses.mp414.72MB
  • 11/9. Improving OpenPGP Security - Best Practices - Part 1.mp45.58MB
  • 12. Messengers - Security, Privacy and Anonymity/1. Goals and Learning Objectives.mp42.82MB
  • 12. Messengers - Security, Privacy and Anonymity/10. Video and Voice Messengers - Other.mp42.64MB
  • 12. Messengers - Security, Privacy and Anonymity/2. An Introduction to Instant Messengers.mp425.2MB
  • 12. Messengers - Security, Privacy and Anonymity/3. Instant Messenger - Signal.mp45.89MB
  • 12. Messengers - Security, Privacy and Anonymity/4. Instant Messengers - Chatsecure.mp44.01MB
  • 12. Messengers - Security, Privacy and Anonymity/5. Instant Messengers - Cryptocat.mp41.46MB
  • 12. Messengers - Security, Privacy and Anonymity/6. Instant Messengers - Ricochet.mp41.47MB
  • 12. Messengers - Security, Privacy and Anonymity/7. Instant Messengers - Other.mp41.54MB
  • 12. Messengers - Security, Privacy and Anonymity/8. Video and Voice Messengers - Linphone.mp411.51MB
  • 12. Messengers - Security, Privacy and Anonymity/9. Video and Voice Messengers - Jitsi.mp43.74MB
  • 13. Wrap Up/1. Congratulations!!.mp44.3MB
  • 13. Wrap Up/2. Certificate Of Completion for CPEs.mp42.21MB
  • 13. Wrap Up/3. Qubes OS.mp456.32MB
  • 13. Wrap Up/4. Effective Network Isolation.mp428.05MB
  • 13. Wrap Up/5. Socks5 proxy tunneling.mp423MB
  • 2. Goals and Learning Objectives - Volume 4/1. What is End Point Protection and why is it important.mp434.32MB
  • 2. Goals and Learning Objectives - Volume 4/2. Goals and Learning Objectives - Volume 4.mp425.4MB
  • 3/1. Goals and Learning Objectives.mp47.19MB
  • 3/10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.mp46.76MB
  • 3/11. Windows, Mac & Linux - Setting up VeraCrypt.mp429.8MB
  • 3/12. Mac - Filevault2.mp413.16MB
  • 3/13. Mac - Setting up Filevault2.mp419.73MB
  • 3/14. Linux Whole Disk Encryption - Dm-crypt and LUKS.mp413.76MB
  • 3/15. Linux - Setting up DMCryptLUKS.mp413.2MB
  • 3/16. Linux - Encrypting the boot partition with Grub2.mp411.72MB
  • 3/17. Self Encrypting Drives (SEDs).mp43.16MB
  • 3/18. Defense Against Disk Decryption Attacks.mp420.86MB
  • 3/19. File Encryption.mp411.12MB
  • 3/2. Disk Encryption – What is it good for.mp421.72MB
  • 3/20. Mandatory Key Disclosure & Plausible Deniability.mp420.53MB
  • 3/21. Nesting Crypto Systems & Obfuscation.mp48.89MB
  • 3/22. Case Studies in Disk Decryption.mp45.87MB
  • 3/3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.mp416.79MB
  • 3/4. Disk Encryption Attacks - Physical.mp438.32MB
  • 3/5. Disk Encryption Attacks - Containers, Volumes and Partitions.mp47.18MB
  • 3/6. Windows - Disk Encryption - An Introduction.mp47.52MB
  • 3/7. Windows - Disk Encryption - Bitlocker.mp430.2MB
  • 3/8. Windows - Setting Up BitLocker.mp423.64MB
  • 3/9. Windows - Disk Encryption - VeraCrypt.mp425.06MB
  • 4/1. Goals and Learning Objectives.mp45.62MB
  • 4/10. Mac - XProtect.mp413.51MB
  • 4/11. Mac - The Best of Anti-Virus and End-Point-Protection.mp46.53MB
  • 4/12. Linux - The Best of Anti-Virus and End-Point-Protection.mp46.17MB
  • 4/13. Online and Second Opinion - Anti-Virus and End-Point-Protection.mp49.97MB
  • 4/14. Is Anti-Virus and End-Point-Protection Dangerous.mp413.32MB
  • 4/2. Is Anti-Virus dead - The Threat Landscape.mp411.34MB
  • 4/3. Is Anti-Virus dead - Protection Methods.mp436.6MB
  • 4/4. Ransomware.mp48.5MB
  • 4/5. Anti-Virus and End-Point-Protection Testing.mp412.9MB
  • 4/6. The Problem With AV and EPP Testing.mp46.66MB
  • 4/7. The Best of Business End-Point-Protection (EPP).mp49.41MB
  • 4/8. Windows - The Best of Anti-Virus and End-Point-Protection.mp410.28MB
  • 4/9. Business End Point Protection (EPP).mp45.15MB
  • 5/1. Goals and Learning Objectives.mp45.09MB
  • 5/2. Next Generation - Anti-Virus (NG-AV) & End-Point-Protection (NG-EPP).mp410.65MB
  • 5/3. End Point Detection and Response (EDR).mp413.81MB
  • 5/4. End-Point-Protection How it works together in layers.mp412.86MB
  • 6/1. Goals and Learning Objectives.mp45.78MB
  • 6/10. Windows - Exploitation Prevention - Traps, MBEA and HMPA.mp411.25MB
  • 6/11. Windows 10 - Device Guard.mp427.84MB
  • 6/12. Windows - Defender Application Guard for Microsoft Edge.mp49.07MB
  • 6/13. Linux - Access Control Models.mp413.36MB
  • 6/14. Linux - Security frameworks - AppArmor.mp44.4MB
  • 6/15. Linux - Security frameworks - SElinux.mp46.68MB
  • 6/16. Linux - Security frameworks - Grsecurity.mp412.78MB
  • 6/17. Linux - Security frameworks - PaX and more.mp43.86MB
  • 6/18. Linux & Mac - File permissions, POSIX and ACLs.mp419.03MB
  • 6/19. Mac - Application control - Parental controls.mp48.01MB
  • 6/2. What is application and execution control.mp420.95MB
  • 6/20. Mac - Application control - Gatekeeper.mp410.21MB
  • 6/21. Mac - Application control - System Integrity Protection.mp412.02MB
  • 6/22. Mac - Application control - Santa.mp47.04MB
  • 6/23. Mac - Application control - Xfence (Previously Little Flocker).mp420.39MB
  • 6/24. Mac - Other Stuff!.mp43.7MB
  • 6/25. The New Normal For End-Point-Protection Technology.mp422.41MB
  • 6/26. Cylance.mp49.55MB
  • 6/3. Windows - Application control - ACLs, Windows Permission Identifier & Accessenum.mp416.28MB
  • 6/4. Windows - Application control - User Account Control (UAC).mp415.36MB
  • 6/5. Windows - Application control - Software Restriction Policies.mp411.29MB
  • 6/6. Windows - Application control - AppLocker.mp432.15MB
  • 6/7. Windows - Application Control - Parental controls.mp44.87MB
  • 6/8. Windows - Third Party App Control – AV, Appguard, VoodooShield, NoVirusThanks.mp412.92MB
  • 6/9. Windows - Exploitation Prevention - EMET.mp437.37MB
  • 7. Threat Detection and Monitoring/1. Goals and Learning Objectives.mp47.16MB
  • 7. Threat Detection and Monitoring/10. Host-Based Intrusion Detection - OSSEC.mp417.69MB
  • 7. Threat Detection and Monitoring/11. Network Analysis - Sguil, Xplico & NetworkMiner.mp48.86MB
  • 7. Threat Detection and Monitoring/12. File Integrity Monitoring (FIM) and Checking Part 1.mp47.75MB
  • 7. Threat Detection and Monitoring/13. File Integrity Monitoring (FIM) and Checking Part 2 - Tripwire and El Jefe.mp46.26MB
  • 7. Threat Detection and Monitoring/14. Network Security Toolkit (NST).mp44.81MB
  • 7. Threat Detection and Monitoring/15. Security Onion.mp45.79MB
  • 7. Threat Detection and Monitoring/16. Security Information and Event Management Software (SIEM).mp46.16MB
  • 7. Threat Detection and Monitoring/2. A Complete Failure to Detect Threats.mp411.45MB
  • 7. Threat Detection and Monitoring/3. Rethinking Honeypots.mp48.89MB
  • 7. Threat Detection and Monitoring/4. CanaryTokens.mp470.28MB
  • 7. Threat Detection and Monitoring/5. OpenCanary.mp438.8MB
  • 7. Threat Detection and Monitoring/6. Artillery - Binary Defense.mp411.11MB
  • 7. Threat Detection and Monitoring/7. Honey Drive.mp42.53MB
  • 7. Threat Detection and Monitoring/8. Intrusion Detection Systems (IDS) Part 1 - Methods.mp413.25MB
  • 7. Threat Detection and Monitoring/9. Intrusion Detection Systems (IDS) Part 2 - Snort, Suricata, Bro IDS & OpenWIPS-n.mp49.24MB
  • 8/1. Goals and Learning Objectives.mp47.21MB
  • 8/10. Windows - Malware Seek & Destroy - Autoruns.mp448.31MB
  • 8/11. Windows - Malware Seek & Destroy - Process Monitor.mp476.22MB
  • 8/12. Windows - Malware Seek & Destroy - Network Connections.mp423.97MB
  • 8/13. Malware Seek & Destroy - Networkx.mp45.42MB
  • 8/14. Linux - Malware Seek & Destroy - Sysdig.mp429.65MB
  • 8/15. Linux - Seek & Destroy Malware and Hackers - Csysdig.mp443.66MB
  • 8/16. Linux - Seek & Destroy Malware and Hackers - debsums & unhide.mp44.7MB
  • 8/17. Linux & Mac OS X - Malware Seek & Destroy - netstat.mp415.29MB
  • 8/18. Linux & Mac OS X - Malware Seek & Destroy - lsof.mp422.22MB
  • 8/19. Linux - Malware Seek & Destroy - rkhunter.mp417.23MB
  • 8/2. Introduction to Malware and Hacker Hunting.mp416.35MB
  • 8/20. Linux - Malware Seek & Destroy - Linux - Chkrootkit, Tiger, Clamav & LMD.mp46.18MB
  • 8/21. Linux - Malware Seek & Destroy - Linux - Persistence Part 1.mp49.22MB
  • 8/22. Linux - Malware Seek & Destroy - Linux - Persistence Part 2.mp427.61MB
  • 8/23. Linux - Malware Seek & Destroy - Linux - Persistence Part 3.mp45.23MB
  • 8/24. Mac - Malware Seek & Destroy - Task Explorer.mp415.03MB
  • 8/25. Mac - Malware Seek & Destroy KnockKnock, BlockBlock & KextViewer.mp420.47MB
  • 8/26. Mac, Linux & Windows - OSquery.mp442.3MB
  • 8/27. Firmware Rootkits – Seek and Destroy Part 1.mp415.96MB
  • 8/28. Firmware Rootkits – Seek and Destroy Part 2.mp48.88MB
  • 8/29. End-Point-Protection Recovery and Remediation Technology.mp410.5MB
  • 8/3. Windows - Farbar Recovery Scanner.mp438.06MB
  • 8/30. Encrypted Backup and Cloud Storage.mp414.14MB
  • 8/4. Automated Malware Removal Tools.mp439.97MB
  • 8/5. Live Rescue Operating Systems, CDs, and USBs.mp418.33MB
  • 8/6. Windows - Malware Seek & Destroy - Process Explorer - Part 1.mp457.77MB
  • 8/7. Windows - Malware Seek & Destroy - Process Explorer - Part 2.mp446.72MB
  • 8/8. Windows - Malware Seek & Destroy - Process Tools.mp48.79MB
  • 8/9. Windows - Malware Seek & Destroy - Sigcheck.mp44.55MB
  • 9/1. Goals and Learning Objectives.mp47.19MB
  • 9/10. Security Focused Operating Systems.mp49.85MB
  • 9/11. Monitoring for Security Drift.mp42.55MB
  • 9/2. An Introduction to Hardening.mp48.9MB
  • 9/3. Hardening Standards.mp441.52MB
  • 9/4. OpenSCAP.mp431.26MB
  • 9/5. Baseline Auditing.mp412.43MB
  • 9/6. Windows - Hardening.mp49.3MB
  • 9/7. Windows - Security Compliance Manager (SCM).mp444.88MB
  • 9/8. Mac – Hardening.mp43.51MB
  • 9/9. Linux – Hardening.mp49.03MB