Filename Size 1. Introduction/1. Welcome and Introduction to the Instructor!.mp4 19.9 MB 1. Introduction/2. Security Quick Win!.mp4 43.2 MB 1. Introduction/3. Goals and Learning Objectives - Volume 1.mp4 16.1 MB 1. Introduction/4. Target Audience.mp4 7.3 MB 1. Introduction/5. Study Recommendations.mp4 17.9 MB 1. Introduction/6. Course updates.mp4 4.4 MB 2. know Yourself - The Threat and Vulnerability Landscape/1. Theory and Practical.mp4 2.2 MB 2. know Yourself - The Threat and Vulnerability Landscape/10. Defense In Depth.mp4 3 MB 2. know Yourself - The Threat and Vulnerability Landscape/11. The Zero Trust Model.mp4 10.3 MB 2. know Yourself - The Threat and Vulnerability Landscape/2. Goals and Learning Objectives.mp4 2.7 MB 2. know Yourself - The Threat and Vulnerability Landscape/3. Protect What You Value.mp4 8.9 MB 2. know Yourself - The Threat and Vulnerability Landscape/4. What is Privacy, Anonymity and Pseudonymity.mp4 11.9 MB 2. know Yourself - The Threat and Vulnerability Landscape/5. Security, Vulnerabilities, Threats and Adversaries.mp4 11.2 MB 2. know Yourself - The Threat and Vulnerability Landscape/5.1 The Cyber Security Landscape Diagram.jpg.jpg 777.2 KB 2. know Yourself - The Threat and Vulnerability Landscape/6. Asset Selection.mp4 7.7 MB 2. know Yourself - The Threat and Vulnerability Landscape/7. Threat Modeling and Risk Assessments.mp4 18 MB 2. know Yourself - The Threat and Vulnerability Landscape/8. Security vs Privacy vs Anonymity - Can we have it all.mp4 5.4 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/1. Goals and Learning Objectives.mp4 2.9 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.1 httpwww.consumerfraudreporting.org.html 98 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.2 httpwww.actionfraud.police.uktypes_of_fraud.html 108 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/10.3 Top 10 scams.html 127 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.10 httpsgithub.comhoshsadiqadblock-nocoin-list.html 110 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.8 httpscoinhive.com.html 82 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/11.9 httpsaddons.mozilla.orgen-GBfirefoxaddonno-coin.html 116 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/12. Darknets, Dark Markets and Exploit kits.mp4 32.4 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/13. Governments, spies and secret stuff part I.mp4 27 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14. Governments, spies and secret stuff part II.mp4 30.2 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.1 httpscryptome.org201401nsa-codenames.htm.html 107 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.2 httpstheintercept.com.html 86 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.3 httpwww.nsaplayset.org.html 87 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.4 httpsnsa.gov1.infodninsa-ant-catalog.html 103 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/14.6 httpswikileaks.org-Leaks-.html.html 95 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.11 Clipper chip.html 192 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.3 UK data communications bill.html 121 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.4 Kazakhstans new encryption law.html 185 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.5 WhatsApp was Banned for 48 Hours in Brazil.html 112 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/15.7 A Worldwide Survey of Encryption Products - pdf.html 153 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.mp4 24.5 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16. Trust & Backdoors.vtt 11 KB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.2 Examples of backdoors.html 123 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.3 Apple backdoor order.html 112 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.5 Formal methods.html 105 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/16.7 httpsreproducible-builds.org.html 93 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/17. Censorship.mp4 6.5 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18. Cyber Threat Intelligence – Stay Informed.mp4 2.6 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/18.1 httpwww.stationx.netalerts.html 91 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/2. Why You Need Security – The Value Of A Hack.mp4 28.9 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3. The Top 3 Things You Need To Stay Safe Online.mp4 2.5 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/3.1 httpsresearch.google.compubspub43963.html.html 107 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.1 Exploit Kit Landscape Map.html 99 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.2 httpswww.exploit-db.comsearch.html 95 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/4.3 CVE details.html 88 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/5. Hackers, crackers and cyber criminals.mp4 7.7 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6. Malware, viruses, rootkits and RATs.mp4 12.1 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.1 Malware stats.html 107 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.2 SophosLabs 2018 Malware Forecast.html 162 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.4 Report - Spotlight perils of malvertisements.html 142 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/6.5 7 most common RATs.html 149 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8. What is Phishing, Vishing and SMShing.mp4 26 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8.1 Live phishing links.html 87 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/8.2 XSS example vulnerability.html 136 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9. Spamming & Doxing.mp4 4.8 MB 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9.1 Spam example.html 142 B 3. Know Your Enemy - The Current Threat and Vulnerability Landscape/9.2 Spam stats.html 104 B 4. Encryption Crash Course/1. Goals and Learning Objectives.mp4 1.6 MB 4. Encryption Crash Course/10. Certificate Authorities and HTTPS.mp4 199.3 MB 4. Encryption Crash Course/10.1 CA Ecosystem.html 105 B 4. Encryption Crash Course/10.2 Cert Fingerprints.html 97 B 4. Encryption Crash Course/10.3 Certificate patrol.html 127 B 4. Encryption Crash Course/10.4 CA example mistake.html 180 B 4. Encryption Crash Course/10.5 SSL Sniff.html 107 B 4. Encryption Crash Course/11. End-to-End Encryption (E2EE).mp4 8.2 MB 4. Encryption Crash Course/12. Steganography.mp4 104.3 MB 4. Encryption Crash Course/12.1 OpenPuff Manual.html 107 B 4. Encryption Crash Course/12.2 httpwww.spammimic.com.html 85 B 4. Encryption Crash Course/12.3 OpenPuff.html 116 B 4. Encryption Crash Course/12.4 List of Steg Tools.html 105 B 4. Encryption Crash Course/2. Symmetric Encryption.mp4 32.3 MB 4. Encryption Crash Course/3. Asymmetric Encryption.mp4 72.3 MB 4. Encryption Crash Course/4. Hash Functions.mp4 89.2 MB 4. Encryption Crash Course/4.1 Example hashes.html 104 B 4. Encryption Crash Course/5. Digital Signatures.mp4 42.7 MB 4. Encryption Crash Course/5.1 httpswww.symantec.comenukcode-signing.html 107 B 4. Encryption Crash Course/5.2 Windows 10 Device Guard using Digital Signatures.html 174 B 4. Encryption Crash Course/6. Secure Sockets Layer (SSL) and Transport layer security (TLS).mp4 160.9 MB 4. Encryption Crash Course/6.1 Wikipedia Transport Layer Security (TLS) page.html 115 B 4. Encryption Crash Course/6.2 Weakdh Cipher Suite Recommendations.html 93 B 4. Encryption Crash Course/6.3 Mozilla Cipher Suite Recommendations.html 110 B 4. Encryption Crash Course/6.4 Steve Gibson's Cipher Suite Recommendations.html 117 B 4. Encryption Crash Course/7. SSL Stripping.mp4 114.5 MB 4. Encryption Crash Course/7.1 sniffdet - Remote Sniffer Detection ToolLibrary.html 93 B 4. Encryption Crash Course/7.2 WIFI Pineapple.html 91 B 4. Encryption Crash Course/7.3 Intro to Sniffers.html 127 B 4. Encryption Crash Course/7.4 Cain & Abel.html 89 B 4. Encryption Crash Course/7.5 Arpwatch Tool to Monitor Ethernet Activity in Linux.html 119 B 4. Encryption Crash Course/7.6 SSL Strip tool By Moxie Marlinspike.html 107 B 4. Encryption Crash Course/8. HTTPS (HTTP Secure).mp4 81.9 MB 4. Encryption Crash Course/8.1 Server Name Indication (SNI) Wiki.html 113 B 4. Encryption Crash Course/9. Digital Certificates.mp4 82 MB