17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Cyber Security - VOLUME 4
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Learn a practical skill-set in securing laptops, desktops and mobile devices from all types of threats, including, advanced hackers, trackers, exploit kits, thieves and much more.
On this course we cover end-point-protection, which is an extremely important and hot topic in cyber security right now!
Become a cyber security specialist - Go from a beginner to advanced in this easy to follow expert course.
Covering all the major platforms Windows, MacOS, Linux, iOS and Android.
Master the selection and implementation of solid disk encryption technology to protect devices from disk decryption attacks.
Understand the current and next generation anti-virus solutions, how they work, how to select the best products and how to implement them successfully.
Covering traditional end-point-protection technologies through to next generation and future technology; application control, execution prevention, machine learning and Artificial Intelligence.
Learn how we can detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
We have fun learning how to seek and destroy system resident malware and hackers. Get up to speed on your hacker hunting!
Learn how to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
Explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
Plus there is more. We end by looking the extremely important topic of email and messenger security. Email has natively poor security, but in this course, I teach you how to overcome those weaknesses and fully secure your communication.
This is volume 4 of 4 of your complete guide to cybersecurity, privacy, and anonymity.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
1. Introduction/2. Introduction to the Instructor!.mp4
17.1 MB
1. Introduction/2.1 Nathan's Security Blog.html
99 B
1. Introduction/2.2 Nathan's Twitter.html
91 B
1. Introduction/3. Security Quick Win!.mp4
44.6 MB
1. Introduction/4. Target Audience.mp4
7.3 MB
1. Introduction/5. Study Recommendations.mp4
27.9 MB
1. Introduction/6. Course updates.mp4
2.6 MB
2. Goals and Learning Objectives - Volume 4/1. What is End Point Protection and why is it important.mp4
34.3 MB
2. Goals and Learning Objectives - Volume 4/2. Goals and Learning Objectives - Volume 4.mp4
25.4 MB
3. File and Disk Encryption/1. Goals and Learning Objectives.mp4
7.2 MB
3. File and Disk Encryption/10. Windows - Disk Encryption - CipherShed, Diskcryptor, Symantec and Bestcrypt.mp4
6.8 MB
3. File and Disk Encryption/10.1 httpswww.ciphershed.org.html
88 B
3. File and Disk Encryption/10.2 BestCrypt Volume Encryption.html
136 B
3. File and Disk Encryption/10.3 Comparison of disk encryption software From Wikipedia.html
129 B
3. File and Disk Encryption/10.4 httpsdiskcryptor.net.html
99 B
3. File and Disk Encryption/10.5 Symantec Drive Encryption.html
131 B
3. File and Disk Encryption/11. Windows, Mac & Linux - Setting up VeraCrypt.mp4
29.8 MB
3. File and Disk Encryption/11.1 VeraCrypt - Beginner's Tutorial.html
130 B
3. File and Disk Encryption/12. Mac - Filevault2.mp4
13.2 MB
3. File and Disk Encryption/12.1 Use FileVault to encrypt the startup disk on your Mac - Apple.html
101 B
3. File and Disk Encryption/12.3 OS X Security and Privacy Guide - full disk encryption.html
138 B
3. File and Disk Encryption/13.1 Startup key combinations for Mac.html
101 B
3. File and Disk Encryption/13.2 pmset -- manipulate power management settings - Man Page.html
158 B
3. File and Disk Encryption/13.4 Report - Security Analysis and Decryption of FileVault 2 IFIP WG 11.9.html
123 B
3. File and Disk Encryption/13.5 DeepSleep - Hibernate your Mac.html
97 B
3. File and Disk Encryption/13.6 Apple Technical White Paper - Best Practices for Deploying FileVault 2.html
108 B
3. File and Disk Encryption/14. Linux Whole Disk Encryption - Dm-crypt and LUKS.mp4
13.8 MB
3. File and Disk Encryption/14.1 LUKS support for storing keys in TPM NVRAM.html
99 B
3. File and Disk Encryption/14.2 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html
163 B
3. File and Disk Encryption/14.3 Two factor authentication with Yubikey for harddisk encryption with LUKS.html
167 B
3. File and Disk Encryption/14.4 Plain dm-crypt.html
149 B
3. File and Disk Encryption/15. Linux - Setting up DMCryptLUKS.mp4
13.2 MB
3. File and Disk Encryption/15.1 The Debian Administrator's Handbook.html
132 B
3. File and Disk Encryption/15.2 Arch - Disk encryption.html
113 B
3. File and Disk Encryption/15.3 Cryptsetup & LUKS.html
101 B
3. File and Disk Encryption/15.4 zuluCrypt.html
102 B
3. File and Disk Encryption/15.5 Arch - dm-cryptEncrypting an entire system.html
134 B
3. File and Disk Encryption/16. Linux - Encrypting the boot partition with Grub2.mp4
11.7 MB
3. File and Disk Encryption/16.1 Arch - Encrypted boot partition (GRUB).html
170 B
3. File and Disk Encryption/16.2 Yubikey Two-factor Authentication Full-disk Encryption via LUKS.html
163 B
3. File and Disk Encryption/16.3 Two factor authentication with Yubikey for harddisk encryption with LUKS.html
167 B
3. File and Disk Encryption/17. Self Encrypting Drives (SEDs).mp4
3.2 MB
3. File and Disk Encryption/17.1 Report - Ten Reasons to Buy Self-Encrypting Drives.html
201 B
3. File and Disk Encryption/18. Defense Against Disk Decryption Attacks.mp4
20.9 MB
3. File and Disk Encryption/18.1 Security Requirements and Precautions.html
150 B
3. File and Disk Encryption/18.2 TRESOR Runs Encryption Securely Outside RAM.html
107 B
3. File and Disk Encryption/19. File Encryption.mp4
11.1 MB
3. File and Disk Encryption/19.1 httpwww.kekaosx.comen.html
87 B
3. File and Disk Encryption/19.2 httpswww.aescrypt.com.html
86 B
3. File and Disk Encryption/19.3 httpwww.peazip.org.html
84 B
3. File and Disk Encryption/19.4 httpswww.gnupg.org.html
83 B
3. File and Disk Encryption/20. Mandatory Key Disclosure & Plausible Deniability.mp4
20.5 MB
3. File and Disk Encryption/20.1 veracrypt - Plausible Deniability.html
130 B
3. File and Disk Encryption/3. Disk Encryption Attacks - Cryptoalgorithms, Brute Force Attacks & Implementation.mp4
16.8 MB
3. File and Disk Encryption/3.1 N.S.A. Able to Foil Basic Safeguards of Privacy on Web.html
152 B
3. File and Disk Encryption/4. Disk Encryption Attacks - Physical.mp4
38.3 MB
3. File and Disk Encryption/4.1 Inception.html
96 B
3. File and Disk Encryption/4.10 Evil Maid goes after TrueCrypt!.html
145 B
3. File and Disk Encryption/4.11 Inception over firewire attack - video.html
104 B
3. File and Disk Encryption/4.12 Report - Cold Boot Attack on DDR2 and DDR3 RAM.html
149 B
3. File and Disk Encryption/4.3 Windowsscope.html
204 B
3. File and Disk Encryption/4.4 Choose the Right BitLocker Countermeasure.html
118 B
3. File and Disk Encryption/4.5 Wikipedia - Disk encryption.html
106 B
3. File and Disk Encryption/4.6 Passware Kit Enterprise - Hard Disk Decryption.html
107 B
3. File and Disk Encryption/4.7 nullcon Goa 2015 Cold Boot Attack on DDR2 and DDR3 RAM by Marko Schuba - Video.html
104 B
3. File and Disk Encryption/4.8 Cold Boot Attack Demo - Video.html
104 B
3. File and Disk Encryption/4.9 Security Pitfalls in Cryptography.html
135 B
3. File and Disk Encryption/5. Disk Encryption Attacks - Containers, Volumes and Partitions.mp4
7.2 MB
3. File and Disk Encryption/5.1 Security Pitfalls in Cryptography.html
135 B
3. File and Disk Encryption/6. Windows - Disk Encryption - An Introduction.mp4
7.5 MB
3. File and Disk Encryption/6.1 CipherShed.html
88 B
3. File and Disk Encryption/6.2 DiskCryptor.html
99 B
3. File and Disk Encryption/6.3 Truecrpyt v7.2 (latest full version) - Download.html
109 B
3. File and Disk Encryption/6.4 Windows BitLocker.html
131 B
3. File and Disk Encryption/6.5 BestCrypt Container Encryption.html
139 B
3. File and Disk Encryption/6.6 Symantec Drive Encryption.html
131 B
3. File and Disk Encryption/6.7 Comparison of disk encryption software From Wikipedia.html
129 B
3. File and Disk Encryption/6.8 Veracrypt.html
92 B
3. File and Disk Encryption/7. Windows - Disk Encryption - Bitlocker.mp4
30.2 MB
3. File and Disk Encryption/7.1 What's new in Windows 10, versions 1507 and 1511.html
157 B
3. File and Disk Encryption/7.2 Every Windows 10 in-place Upgrade is a SEVERE Security risk.html
133 B
3. File and Disk Encryption/7.3 Windows BitLocker Drive Encryption Step-by-Step Guide.html
131 B
3. File and Disk Encryption/7.4 YUBIKEYS.html
110 B
3. File and Disk Encryption/8. Windows - Setting Up BitLocker.mp4
23.6 MB
3. File and Disk Encryption/8.1 ENCRYPTING YOUR LAPTOP LIKE YOU MEAN IT.html
125 B
3. File and Disk Encryption/9. Windows - Disk Encryption - VeraCrypt.mp4
25.1 MB
3. File and Disk Encryption/9.1 yubico.com.html
113 B
3. File and Disk Encryption/9.10 Veracrypt.html
92 B
3. File and Disk Encryption/9.11 Nitrokey.com.html
87 B
3. File and Disk Encryption/9.12 VeraCrypt - Operating Systems Supported for System Encryption.html
154 B
3. File and Disk Encryption/9.2 Truecrypt 7 Derived CodeWindows Incorrect Impersonation Token Handling EoP.html
130 B
3. File and Disk Encryption/9.3 httpssourceforge.netpveracryptcodecimastertreesrcBootEFIReadme.txt#l19.html
144 B
3. File and Disk Encryption/9.4 httpwww.openwall.comlistsoss-security201601111.html
116 B
3. File and Disk Encryption/9.5 GERMAN GOVERNMENT AUDITS TRUECRYPT.html
126 B
3. File and Disk Encryption/9.6 IsTrueCryptAuditedYet Yes!.html
94 B
3. File and Disk Encryption/9.7 Report - UEFI SECURE BOOT IN MODERN COMPUTER SECURITY SOLUTIONS.html
174 B
3. File and Disk Encryption/9.8 Truecrypt 7 Derived CodeWindows Drive Letter Symbolic Link Creation EoP.html
130 B
3. File and Disk Encryption/9.9 Veracrypt FAQ.html
110 B
8. Malware and Hacker Hunting on the End-Point/11. Windows - Malware Seek & Destroy - Process Monitor.mp4