Filename | Size |
| 01 Introduction/001 Welcome and Introduction to the Instructor.mp4 | 60.8 MB |
| 01 Introduction/002 Goals and Learning Objectives - Volume 1.mp4 | 70.4 MB |
| 01 Introduction/003 Target Audience.mp4 | 49.7 MB |
| 01 Introduction/004 Study Recommendations.mp4 | 95.8 MB |
| 01 Introduction/005 Course updates.mp4 | 18.8 MB |
| 02 know Yourself - The Threat and Vulnerability Landscape/006 Goals and Learning Objectives.mp4 | 19.4 MB |
| 02 know Yourself - The Threat and Vulnerability Landscape/007 Protect What You Value.mp4 | 21.5 MB |
| 02 know Yourself - The Threat and Vulnerability Landscape/008 What is Privacy Anonymity and Pseudonymity.mp4 | 107.7 MB |
| 02 know Yourself - The Threat and Vulnerability Landscape/009 Security Vulnerabilities Threats and Adversaries.mp4 | 88 MB |
| 02 know Yourself - The Threat and Vulnerability Landscape/010 Threat Modeling and Risk Assessments.mp4 | 147.7 MB |
| 02 know Yourself - The Threat and Vulnerability Landscape/011 Security vs Privacy vs Anonymity - Can we have it all.mp4 | 41.2 MB |
| 02 know Yourself - The Threat and Vulnerability Landscape/012 Defense In Depth.mp4 | 6.9 MB |
| 02 know Yourself - The Threat and Vulnerability Landscape/013 The Zero Trust Model.mp4 | 76.7 MB |
| 03 Know Your Enemy - The Current Threat and Vulnerability Lands/014 Goals and Learning Objectives.mp4 | 20.7 MB |
| 03 Know Your Enemy - The Current Threat and Vulnerability Lands/015 Why You Need Security The Value Of A Hack.mp4 | 114.6 MB |
| 03 Know Your Enemy - The Current Threat and Vulnerability Lands/016 The Top 3 Things You Need To Stay Safe Online.mp4 | 10.7 MB |
| 03 Know Your Enemy - The Current Threat and Vulnerability Lands/017 Security Bugs and Vulnerabilities - The Vulnerability La.mp4 | 124.6 MB |
| 03 Know Your Enemy - The Current Threat and Vulnerability Lands/018 Hackers crackers and cyber criminals.mp4 | 61.2 MB |
| 03 Know Your Enemy - The Current Threat and Vulnerability Lands/019 Malware viruses rootkits and RATs.mp4 | 81.3 MB |
| 03 Know Your Enemy - The Current Threat and Vulnerability Lands/020 Spyware Adware Scareware PUPs Browser hijacking.mp4 | 71.9 MB |
| 03 Know Your Enemy - The Current Threat and Vulnerability Lands/021 What is Phishing Vishing and SMShing.mp4 | 54.5 MB |
| 03 Know Your Enemy - The Current Threat and Vulnerability Lands/022 Spamming Doxing.mp4 | 34.3 MB |
| 03 Know Your Enemy - The Current Threat and Vulnerability Lands/023 Social engineering - Scams cons tricks and fraud.mp4 | 93.4 MB |
| 03 Know Your Enemy - The Current Threat and Vulnerability Lands/024 Darknets Dark Markets and Exploit kits.mp4 | 204.2 MB |
| 03 Know Your Enemy - The Current Threat and Vulnerability Lands/025 Governments spies and secret stuff part I.mp4 | 136.3 MB |
| 04 Encryption Crash Course/031 Goals and Learning Objectives.mp4 | 11.5 MB |
| 04 Encryption Crash Course/032 Symmetric Encryption.mp4 | 158.7 MB |
| 04 Encryption Crash Course/033 Asymmetric Encryption.mp4 | 79.3 MB |
| 04 Encryption Crash Course/034 Hash Functions.mp4 | 123.9 MB |
| 04 Encryption Crash Course/035 Digital Signatures.mp4 | 49.7 MB |
| 04 Encryption Crash Course/036 Secure Sockets Layer SSL and Transport layer security TL.mp4 | 194.7 MB |
| 04 Encryption Crash Course/037 SSL Stripping.mp4 | 150.1 MB |
| 04 Encryption Crash Course/038 HTTPS HTTP Secure.mp4 | 132.8 MB |
| 04 Encryption Crash Course/039 Digital Certificates.mp4 | 118.5 MB |
| 04 Encryption Crash Course/040 Certificate Authorities and HTTPS.mp4 | 255.1 MB |
| 04 Encryption Crash Course/041 End-to-End Encryption E2EE.mp4 | 8.5 MB |
| 04 Encryption Crash Course/042 Steganography.mp4 | 172.7 MB |
| 04 Encryption Crash Course/043 How Security and Encryption is Really Attacked.mp4 | 24.5 MB |
| 05 Setting up a Testing Environment Using Virtual Machines/044 Goals and Learning Objectives.mp4 | 13.1 MB |
| 05 Setting up a Testing Environment Using Virtual Machines/045 Introduction to Setting up a Testing Environment Using V.mp4 | 193.3 MB |
| 05 Setting up a Testing Environment Using Virtual Machines/046 Vmware.mp4 | 163.5 MB |
| 05 Setting up a Testing Environment Using Virtual Machines/047 Virtual box.mp4 | 197.7 MB |
| 05 Setting up a Testing Environment Using Virtual Machines/048 Kali Linux 2016.mp4 | 64.7 MB |
| 06 Operating System Security Privacy Windows vs Mac OS X vs Lin/062 Linux - Debian.mp4 | 7.8 MB |
| 06 Operating System Security Privacy Windows vs Mac OS X vs Lin/064 Linux - OpenBSD and Archlinux.mp4 | 40.8 MB |
| 06 Operating System Security Privacy Windows vs Mac OS X vs Lin/065 Linux - Ubuntu.mp4 | 10 MB |
| 07 Security Bugs and Vulnerabilities/066 Goals and Learning Objectives.mp4 | 11.7 MB |
| 07 Security Bugs and Vulnerabilities/067 The Importance of Patching.mp4 | 41.7 MB |
| 07 Security Bugs and Vulnerabilities/068 Windows 7 - Auto Update.mp4 | 26.8 MB |
| 07 Security Bugs and Vulnerabilities/069 Windows 8 8.1 - Auto Update.mp4 | 12.9 MB |
| 07 Security Bugs and Vulnerabilities/070 Windows 10 - Auto Update.mp4 | 22.5 MB |
| 07 Security Bugs and Vulnerabilities/071 Windows - Criticality and Patch Tuesday.mp4 | 78.2 MB |
| 07 Security Bugs and Vulnerabilities/072 Windows 7 8 8.1 10 - Automate the pain away from patchi.mp4 | 130.1 MB |
| 07 Security Bugs and Vulnerabilities/073 Linux - Debian - Patching.mp4 | 133.8 MB |
| 07 Security Bugs and Vulnerabilities/074 Mac OS X - Patching.mp4 | 108 MB |
| 07 Security Bugs and Vulnerabilities/075 Firefox - Browser and extension updates.mp4 | 71.4 MB |
| 07 Security Bugs and Vulnerabilities/076 Chrome - Browser and extension updates.mp4 | 13.8 MB |
| 07 Security Bugs and Vulnerabilities/077 IE and Edge - Browser and extention updates.mp4 | 14.9 MB |
| 07 Security Bugs and Vulnerabilities/078 Auto updates - The Impact to privacy and anonymity.mp4 | 15.6 MB |
| 08 Reducing Threat Privilege/079 Goals and Learning Objectives Removing Privilege.mp4 | 81 MB |
| 08 Reducing Threat Privilege/080 Windows 7 - Not using admin.mp4 | 55.5 MB |
| 08 Reducing Threat Privilege/081 Windows 8 and 8.1 - Not using admin.mp4 | 53.1 MB |
| 08 Reducing Threat Privilege/082 Windows 10 - Not using admin.mp4 | 37.8 MB |
| 09 Social Engineering and Social Media Offence and Defence/083 Goals and Learning Objectives.mp4 | 12.6 MB |
| 09 Social Engineering and Social Media Offence and Defence/084 Information Disclosure and Identity Strategies for Socia.mp4 | 201.4 MB |
| 09 Social Engineering and Social Media Offence and Defence/085 Identify Verification and Registration.mp4 | 56.1 MB |
| 09 Social Engineering and Social Media Offence and Defence/086 Behavioural Security Controls Against Social Threats Phi.mp4 | 54.6 MB |
| 09 Social Engineering and Social Media Offence and Defence/087 Behavioural Security Controls Against Social Threats Phi.mp4 | 136.3 MB |
| 09 Social Engineering and Social Media Offence and Defence/088 Technical Security Controls Against Social Threats Phish.mp4 | 52.4 MB |
| 10 Security Domains/089 Goals and Learning Objectives.mp4 | 9.8 MB |
| 10 Security Domains/090 Security Domains.mp4 | 95.3 MB |
| 11 Security Through Isolation and Compartmentalization/091 Goals and Learning Objectives.mp4 | 17.9 MB |
| 11 Security Through Isolation and Compartmentalization/092 Introduction to Isolation and Compartmentalization.mp4 | 23.6 MB |
| 11 Security Through Isolation and Compartmentalization/093 Physical and Hardware Isolation - How to change the Mac .mp4 | 64.9 MB |
| 11 Security Through Isolation and Compartmentalization/094 Physical and Hardware Isolation - Hardware Serials.mp4 | 138 MB |
| 11 Security Through Isolation and Compartmentalization/095 Virtual Isolation.mp4 | 115 MB |
| 11 Security Through Isolation and Compartmentalization/096 Dual Boot.mp4 | 27.5 MB |
| 11 Security Through Isolation and Compartmentalization/097 Built-in Sandboxes and Application Isolation.mp4 | 38.2 MB |
| 11 Security Through Isolation and Compartmentalization/098 Windows - Sandboxes and Application Isolation.mp4 | 92.2 MB |
| 11 Security Through Isolation and Compartmentalization/099 Windows - Sandboxes and Application Isolation - Sandboxi.mp4 | 173.9 MB |
| 11 Security Through Isolation and Compartmentalization/100 Linux - Sandboxes and Application Isolation.mp4 | 37.8 MB |
| 11 Security Through Isolation and Compartmentalization/101 Mac OS X - Sandboxes and Application Isolation.mp4 | 58.6 MB |
| 11 Security Through Isolation and Compartmentalization/102 Virtual Machines.mp4 | 157.2 MB |
| 11 Security Through Isolation and Compartmentalization/103 Virtual Machine Weaknesses.mp4 | 106.6 MB |
| 11 Security Through Isolation and Compartmentalization/104 Virtual Machine Hardening.mp4 | 107.4 MB |
| 11 Security Through Isolation and Compartmentalization/105 Whonix OS - Anonymous Operating system.mp4 | 285.2 MB |
| 11 Security Through Isolation and Compartmentalization/106 Whonix OS - Weaknesses.mp4 | 78 MB |
| 11 Security Through Isolation and Compartmentalization/107 Qubes OS.mp4 | 263.3 MB |
| 11 Security Through Isolation and Compartmentalization/108 Security Domains Isolation and Compartmentalization.mp4 | 55.6 MB |
| 12 BONUS - Whats next... Volume 2 3 and 4/109 BONUS - Important Information.mp4 | 20.2 MB |
| 12 BONUS - Whats next... Volume 2 3 and 4/110 Congratulations.mp4 | 26.8 MB |
| 12 BONUS - Whats next... Volume 2 3 and 4/111 BONUS Lecture from Volume 2 - Router Vulnerability Scann.mp4 | 204 MB |
| 12 BONUS - Whats next... Volume 2 3 and 4/112 BONUS Lecture from Volume 2 - Password cracking part 2.mp4 | 143 MB |
| 12 BONUS - Whats next... Volume 2 3 and 4/113 BONUS Lecture from Volume 3 - Bypassing firewalls and HT.mp4 | 122.2 MB |
| 12 BONUS - Whats next... Volume 2 3 and 4/114 BONUS Lecture from Volume 4 - Email clients protocols an.mp4 | 181.1 MB |
| oxbridge.nfo | 996 B |
| oxbridge_udemytccscvol1.sfv | 2.6 KB |
| Приватные видеокурсы.pdf | 348.3 KB |
| Это очень важно!.txt | 769 B |