4-Endpoint-Protection-19FKv
- 01 Introduction\\/001 Welcome to Volume 4.mp47.19MB
- 01 Introduction\\/002 Introduction to the Instructor.mp417.13MB
- 01 Introduction\\/003 Security Quick Win.mp444.61MB
- 01 Introduction\\/004 Target Audience.mp47.32MB
- 01 Introduction\\/005 Study Recommendations.mp420.81MB
- 01 Introduction\\/006 Course updates.mp42.56MB
- 02 Goals and Learning ob<x>jectives - Volume 4\\/007 What is End Point Protection and why is it important.mp434.31MB
- 02 Goals and Learning ob<x>jectives - Volume 4\\/008 Goals and Learning ob<x>jectives - Volume 4.mp425.39MB
- 03 File and Disk Encryption\\/009 Goals and Learning ob<x>jectives.mp47.19MB
- 03 File and Disk Encryption\\/010 Disk Encryption What is it good for.mp421.72MB
- 03 File and Disk Encryption\\/011 Disk Encryption Attacks - Cryptoalgorithms Brute Force Attacks Implementation.mp416.78MB
- 03 File and Disk Encryption\\/012 Disk Encryption Attacks - Physical.mp438.31MB
- 03 File and Disk Encryption\\/013 Disk Encryption Attacks - Containers Volumes and Partitions.mp47.18MB
- 03 File and Disk Encryption\\/014 Windows - Disk Encryption - An Introduction.mp47.51MB
- 03 File and Disk Encryption\\/015 Windows - Disk Encryption - Bitlocker.mp430.20MB
- 03 File and Disk Encryption\\/016 Windows - Setting Up BitLocker.mp423.63MB
- 03 File and Disk Encryption\\/017 Windows - Disk Encryption - VeraCrypt.mp425.05MB
- 03 File and Disk Encryption\\/018 Windows - Disk Encryption - CipherShed Diskcryptor Syntec and Bestcrypt.mp46.75MB
- 03 File and Disk Encryption\\/019 Windows c Linux - Setting up VeraCrypt.mp429.80MB
- 03 File and Disk Encryption\\/020 c - Filevault2.mp413.16MB
- 03 File and Disk Encryption\\/021 c - Setting up Filevault2.mp419.72MB
- 03 File and Disk Encryption\\/022 Linux Whole Disk Encryption - Dm-crypt and LUKS.mp413.75MB
- 03 File and Disk Encryption\\/023 Linux - Setting up DMCryptLUKS.mp413.19MB
- 03 File and Disk Encryption\\/024 Linux - Encrypting the boot partition with Grub2.mp411.71MB
- 03 File and Disk Encryption\\/025 Self Encrypting Drives SEDs.mp43.16MB
- 03 File and Disk Encryption\\/026 Defense Against Disk Decryption Attacks.mp420.86MB
- 03 File and Disk Encryption\\/027 File Encryption.mp411.11MB
- 03 File and Disk Encryption\\/028 ndatory Key Disclosure Plausible Deniability.mp420.53MB
- 03 File and Disk Encryption\\/029 Nesting Crypto Systems Obfuscation.mp48.88MB
- 03 File and Disk Encryption\\/030 Case Studies in Disk Decryption.mp45.87MB
- 04 Anti-Virus and End-Point-Protection\\/031 Goals and Learning ob<x>jectives.mp45.61MB
- 04 Anti-Virus and End-Point-Protection\\/032 Is Anti-Virus dead - The Threat Landscape.mp411.33MB
- 04 Anti-Virus and End-Point-Protection\\/033 Is Anti-Virus dead - Protection Methods.mp436.60MB
- 04 Anti-Virus and End-Point-Protection\\/034 Ransomware.mp48.49MB
- 04 Anti-Virus and End-Point-Protection\\/035 Anti-Virus and End-Point-Protection Testing.mp412.89MB
- 04 Anti-Virus and End-Point-Protection\\/036 The Problem With and EPP Testing.mp46.65MB
- 04 Anti-Virus and End-Point-Protection\\/037 The Best of Business End-Point-Protection EPP.mp49.40MB
- 04 Anti-Virus and End-Point-Protection\\/038 Windows - The Best of Anti-Virus and End-Point-Protection.mp410.28MB
- 04 Anti-Virus and End-Point-Protection\\/039 Business End Point Protection EPP.mp45.14MB
- 04 Anti-Virus and End-Point-Protection\\/040 c - XProtect.mp413.50MB
- 04 Anti-Virus and End-Point-Protection\\/041 c - The Best of Anti-Virus and End-Point-Protection.mp46.52MB
- 04 Anti-Virus and End-Point-Protection\\/042 Linux - The Best of Anti-Virus and End-Point-Protection.mp46.17MB
- 04 Anti-Virus and End-Point-Protection\\/043 Online and Second Opinion - Anti-Virus and End-Point-Protection.mp49.96MB
- 04 Anti-Virus and End-Point-Protection\\/044 Is Anti-Virus and End-Point-Protection Dangerous.mp413.32MB
- 05 Next Generation - Anti-Virus End-Point-Protection Detection Response EDR\\/045 Goals and Learning ob<x>jectives.mp45.08MB
- 05 Next Generation - Anti-Virus End-Point-Protection Detection Response EDR\\/046 Next Generation - Anti-Virus NG- End-Point-Protection NG-EPP.mp410.64MB
- 05 Next Generation - Anti-Virus End-Point-Protection Detection Response EDR\\/047 End Point Detection and Response EDR.mp413.80MB
- 05 Next Generation - Anti-Virus End-Point-Protection Detection Response EDR\\/048 End-Point-Protection How it works together in la<x>yers.mp412.86MB
- 06 End-Point-Protection Technology\\/049 Goals and Learning ob<x>jectives.mp45.78MB
- 06 End-Point-Protection Technology\\/050 What is application and execution control.mp420.95MB
- 06 End-Point-Protection Technology\\/051 Windows - Application control - ACLs Windows Permission Identifier Accessenum.mp416.27MB
- 06 End-Point-Protection Technology\\/052 Windows - Application control - User Account Control UAC.mp415.36MB
- 06 End-Point-Protection Technology\\/053 Windows - Application control - Software Restriction Policies.mp411.29MB
- 06 End-Point-Protection Technology\\/054 Windows - Application control - AppLocker.mp432.15MB
- 06 End-Point-Protection Technology\\/055 Windows - Application Control - Parental controls.mp44.87MB
- 06 End-Point-Protection Technology\\/056 Windows - Third Party App Control Appguard VoodooShield NoVirusThanks.mp412.91MB
- 06 End-Point-Protection Technology\\/057 Windows - Exploitation Prevention - EMET.mp437.37MB
- 06 End-Point-Protection Technology\\/058 Windows - Exploitation Prevention - Traps MBEA and HMPA.mp411.24MB
- 06 End-Point-Protection Technology\\/059 Windows 10 - Device Guard.mp427.84MB
- 06 End-Point-Protection Technology\\/060 Windows - Defender Application Guard for Microsoft Edge.mp49.07MB
- 06 End-Point-Protection Technology\\/061 Linux - Access Control Models.mp413.35MB
- 06 End-Point-Protection Technology\\/062 Linux - Security fr<x>ameworks - AppArmor.mp44.39MB
- 06 End-Point-Protection Technology\\/063 Linux - Security fr<x>ameworks - SElinux.mp46.67MB
- 06 End-Point-Protection Technology\\/0 Linux - Security fr<x>ameworks - Grsecurity.mp412.78MB
- 06 End-Point-Protection Technology\\/065 Linux - Security fr<x>ameworks - PaX and more.mp43.85MB
- 06 End-Point-Protection Technology\\/066 Linux c - File permissions POSIX and ACLs.mp419.03MB
- 06 End-Point-Protection Technology\\/067 c - Application control - Parental controls.mp48.00MB
- 06 End-Point-Protection Technology\\/068 c - Application control - Gatekeeper.mp410.20MB
- 06 End-Point-Protection Technology\\/069 c - Application control - System Integrity Protection.mp412.02MB
- 06 End-Point-Protection Technology\\/070 c - Application control - Santa.mp47.04MB
- 06 End-Point-Protection Technology\\/071 c - Application control - Little Flocker.mp418.82MB
- 06 End-Point-Protection Technology\\/072 c - Other Stuff.mp43.69MB
- 06 End-Point-Protection Technology\\/073 The New Norl For End-Point-Protection Technology.mp422.41MB
- 06 End-Point-Protection Technology\\/074 Cylance.mp49.54MB
- 07 Threat Detection and Monitoring\\/075 Goals and Learning ob<x>jectives.mp47.15MB
- 07 Threat Detection and Monitoring\\/076 A Complete Failure to Detect Threats.mp411.44MB
- 07 Threat Detection and Monitoring\\/077 Rethinking Honeypots.mp48.89MB
- 07 Threat Detection and Monitoring\\/078 CanaryTokens.mp470.27MB
- 07 Threat Detection and Monitoring\\/079 OpenCanary.mp438.79MB
- 07 Threat Detection and Monitoring\\/081 Artillery - Binary Defense.mp411.10MB
- 07 Threat Detection and Monitoring\\/082 Honey Drive.mp42.52MB
- 07 Threat Detection and Monitoring\\/083 Intrusion Detection Systems IDS Part 1 - Methods.mp413.24MB
- 07 Threat Detection and Monitoring\\/084 Intrusion Detection Systems IDS Part 2 - Snort Suricata Bro IDS OpenWIPS-n.mp49.23MB
- 07 Threat Detection and Monitoring\\/085 Host-ba<x>sed Intrusion Detection - OSSEC.mp417.68MB
- 07 Threat Detection and Monitoring\\/086 Network Analysis - Sguil Xplico NetworkMiner.mp48.85MB
- 07 Threat Detection and Monitoring\\/087 File Integrity Monitoring FIM and Checking Part 1.mp47.74MB
- 07 Threat Detection and Monitoring\\/088 File Integrity Monitoring FIM and Checking Part 2 - Tripwire and El Jefe.mp46.25MB
- 07 Threat Detection and Monitoring\\/089 Network Security Toolkit NST.mp44.80MB
- 07 Threat Detection and Monitoring\\/090 Security Onion.mp45.78MB
- 07 Threat Detection and Monitoring\\/091 Security Infortion and Event Management Software SIEM.mp46.15MB
- 08 lware and Hacker Hunting on the End-Point\\/092 Goals and Learning ob<x>jectives.mp47.20MB
- 08 lware and Hacker Hunting on the End-Point\\/093 Introduction to Malware and Hacker Hunting.mp416.34MB
- 08 lware and Hacker Hunting on the End-Point\\/094 Windows - Farbar Recovery Scanner.mp438.05MB
- 08 lware and Hacker Hunting on the End-Point\\/095 Automated Malware Removal Tools.mp439.97MB
- 08 lware and Hacker Hunting on the End-Point\\/096 Live Rescue Operating Systems CDs and Us.mp418.32MB
- 08 lware and Hacker Hunting on the End-Point\\/097 Windows - Malware Seek Destroy - Process Explorer - Part 1.mp457.77MB
- 08 lware and Hacker Hunting on the End-Point\\/098 Windows - Malware Seek Destroy - Process Explorer - Part 2.mp446.71MB
- 08 lware and Hacker Hunting on the End-Point\\/099 Windows - Malware Seek Destroy - Process Tools.mp48.78MB
- 08 lware and Hacker Hunting on the End-Point\\/100 Windows - Malware Seek Destroy - Sigcheck.mp44.55MB
- 08 lware and Hacker Hunting on the End-Point\\/101 Windows - Malware Seek Destroy - Autoruns.mp448.30MB
- 08 lware and Hacker Hunting on the End-Point\\/102 Windows - Malware Seek Destroy - Process Monitor.mp476.21MB
- 08 lware and Hacker Hunting on the End-Point\\/103 Windows - Malware Seek Destroy - Network Connections.mp423.96MB
- 08 lware and Hacker Hunting on the End-Point\\/104 Malware Seek Destroy - Networkx.mp45.41MB
- 08 lware and Hacker Hunting on the End-Point\\/105 Linux - Malware Seek Destroy - Sysdig.mp429.64MB
- 08 lware and Hacker Hunting on the End-Point\\/106 Linux - Seek Destroy Malware and Hackers - Csysdig.mp443.65MB
- 08 lware and Hacker Hunting on the End-Point\\/107 Linux - Seek Destroy Malware and Hackers - debsums unhide.mp44.70MB
- 08 lware and Hacker Hunting on the End-Point\\/108 Linux Mac OS X - Malware Seek Destroy - netstat.mp415.28MB
- 08 lware and Hacker Hunting on the End-Point\\/109 Linux Mac OS X - Malware Seek Destroy - lsof.mp422.22MB
- 08 lware and Hacker Hunting on the End-Point\\/110 Linux - Malware Seek Destroy - rkhunter.mp417.22MB
- 08 lware and Hacker Hunting on the End-Point\\/111 Linux - Malware Seek Destroy - Linux - Chkrootkit Tiger Clam LMD.mp46.18MB
- 08 lware and Hacker Hunting on the End-Point\\/112 Linux - Malware Seek Destroy - Linux - Persistence Part 1.mp49.21MB
- 08 lware and Hacker Hunting on the End-Point\\/113 Linux - Malware Seek Destroy - Linux - Persistence Part 2.mp427.60MB
- 08 lware and Hacker Hunting on the End-Point\\/ Linux - Malware Seek Destroy - Linux - Persistence Part 3.mp45.22MB
- 08 lware and Hacker Hunting on the End-Point\\/115 Mac - Malware Seek Destroy - Task Explorer.mp415.02MB
- 08 lware and Hacker Hunting on the End-Point\\/116 Mac - Malware Seek Destroy KnockKnock BlockBlock KextViewer.mp420.46MB
- 08 lware and Hacker Hunting on the End-Point\\/117 Mac Linux Windows - OSquery.mp442.29MB
- 08 lware and Hacker Hunting on the End-Point\\/118 Firmware Rootkits Seek and Destroy Part 1.mp415.86MB
- 08 lware and Hacker Hunting on the End-Point\\/119 Firmware Rootkits Seek and Destroy Part 2.mp48.88MB
- 08 lware and Hacker Hunting on the End-Point\\/120 End-Point-Protection Recovery and Remediation Technology.mp410.49MB
- 08 lware and Hacker Hunting on the End-Point\\/121 Encrypted Backup and Cloud Storage.mp414.13MB
- 09 Operating System and Application Hardening\\/122 Goals and Learning ob<x>jectives.mp47.18MB
- 09 Operating System and Application Hardening\\/123 An Introduction to Hardening.mp48.90MB
- 09 Operating System and Application Hardening\\/124 Hardening Standards.mp441.52MB
- 09 Operating System and Application Hardening\\/125 OpenSCAP.mp431.25MB
- 09 Operating System and Application Hardening\\/126 ba<x>seline Auditing.mp412.42MB
- 09 Operating System and Application Hardening\\/127 Windows - Hardening.mp49.30MB
- 09 Operating System and Application Hardening\\/128 Windows - Security Compliance nager SCM.mp444.87MB
- 09 Operating System and Application Hardening\\/129 c Hardening.mp43.51MB
- 09 Operating System and Application Hardening\\/130 Linux Hardening.mp49.03MB
- 09 Operating System and Application Hardening\\/131 Security Focused Operating Systems.mp49.84MB
- 09 Operating System and Application Hardening\\/132 Monitoring for Security Drift.mp42.54MB
- 10 Secure Deleting Evidence Elimination and Anti-Forensics\\/133 Goals and Learning ob<x>jectives.mp46.49MB
- 10 Secure Deleting Evidence Elimination and Anti-Forensics\\/134 Secure File Deletion - Mechanical drives.mp419.68MB
- 10 Secure Deleting Evidence Elimination and Anti-Forensics\\/135 Secure File Deletion - Solid Sate Drives.mp412.09MB
- 10 Secure Deleting Evidence Elimination and Anti-Forensics\\/136 Evidence Elimination Anti-Forensics - An Introduction.mp48.27MB
- 10 Secure Deleting Evidence Elimination and Anti-Forensics\\/137 Evidence Elimination - CCleaner and Bleachit.mp418.26MB
- 10 Secure Deleting Evidence Elimination and Anti-Forensics\\/138 Evidence Elimination - Virtual Memory Swap RAM Memory Cache and Buffer.mp414.18MB
- 10 Secure Deleting Evidence Elimination and Anti-Forensics\\/139 Disk Wiping - Mechanical Drives.mp411.43MB
- 10 Secure Deleting Evidence Elimination and Anti-Forensics\\/140 Disk Wiping - Solid State Drives SSD.mp423.12MB
- 10 Secure Deleting Evidence Elimination and Anti-Forensics\\/141 Scrubbing EXIF me<x>tadata Part 1 - Introduction.mp416.23MB
- 10 Secure Deleting Evidence Elimination and Anti-Forensics\\/142 Scrubbing EXIF me<x>tadata Part 2 - Tools.mp420.44MB
- 10 Secure Deleting Evidence Elimination and Anti-Forensics\\/143 Scrubbing EXIF me<x>tadata Part 3 - Guidance.mp48.41MB
- 10 Secure Deleting Evidence Elimination and Anti-Forensics\\/144 Sensor se Camera Identification.mp49.01MB
- 11 Eil Security Privacy and Anonymity\\/145 Goals and Learning ob<x>jectives.mp49.50MB
- 11 Eil Security Privacy and Anonymity\\/146 Clients Protocols and Authentication.mp438.18MB
- 11 Eil Security Privacy and Anonymity\\/147 Email Weaknesses.mp430.77MB
- 11 Eil Security Privacy and Anonymity\\/148 PGP GPG Privacy.mp412.98MB
- 11 Eil Security Privacy and Anonymity\\/149 PGP GPG Clients.mp415.03MB
- 11 Eil Security Privacy and Anonymity\\/150 Windows - PGP GPG.mp458.30MB
- 11 Eil Security Privacy and Anonymity\\/151 Tail - PGP GPG.mp49.66MB
- 11 Eil Security Privacy and Anonymity\\/152 PGP GPG Weaknesses.mp414.71MB
- 11 Eil Security Privacy and Anonymity\\/153 Improving OpenPGP Security - Best Practices - Part 1.mp45.57MB
- 11 Eil Security Privacy and Anonymity\\/154 Improving OpenPGP Security - Primary and Subkeys - Part 2.mp428.70MB
- 11 Eil Security Privacy and Anonymity\\/155 Improving OpenPGP Security - artcardsYubikey - Part 3.mp422.14MB
- 11 Eil Security Privacy and Anonymity\\/156 Email Tracking Exploits.mp426.77MB
- 11 Eil Security Privacy and Anonymity\\/157 Email Anonymity Pseudonymity.mp415.89MB
- 11 Eil Security Privacy and Anonymity\\/158 TorBirdy.mp421.52MB
- 11 Eil Security Privacy and Anonymity\\/159 Remailers.mp419.53MB
- 11 Eil Security Privacy and Anonymity\\/160 Choosing an Email Provider.mp437.37MB
- 11 Eil Security Privacy and Anonymity\\/161 Email Alternatives.mp47.41MB
- 12 Messengers - Security Privacy and Anonymity\\/162 Goals and Learning ob<x>jectives.mp42.81MB
- 12 Messengers - Security Privacy and Anonymity\\/163 An Introduction to Instant Messengers.mp425.19MB
- 12 Messengers - Security Privacy and Anonymity\\/1 Instant Messenger - Signal.mp45.88MB
- 12 Messengers - Security Privacy and Anonymity\\/165 Instant Messengers - Chatsecure.mp44.00MB
- 12 Messengers - Security Privacy and Anonymity\\/166 Instant Messengers - Cryptocat.mp41.46MB
- 12 Messengers - Security Privacy and Anonymity\\/167 Instant Messengers - Ricochet.mp41.47MB
- 12 Messengers - Security Privacy and Anonymity\\/168 Instant Messengers - Other.mp41.54MB
- 12 Messengers - Security Privacy and Anonymity\\/169 Video and Voice Messengers - Linphone.mp411.50MB
- 12 Messengers - Security Privacy and Anonymity\\/170 Video and Voice Messengers - Jitsi.mp43.73MB
- 12 Messengers - Security Privacy and Anonymity\\/171 Video and Voice Messengers - Other.mp42.63MB
- 13 BONUS SECTION\\/172 Congratulations.mp44.30MB
- 13 BONUS SECTION\\/173 BONUS - Important Infortion.mp46.53MB
- 13 BONUS SECTION\\/175 BONUS Sample Lecture from Volume 1 - Qubes OS.mp456.31MB
- 13 BONUS SECTION\\/176 BONUS Sample Lecture from Volume 2 - Effective Network Isolation.mp428.04MB
- 13 BONUS SECTION\\/177 BONUS Sample Lecture from Volume 3 - Socks5 proxy tunneling.mp422.99MB
- CreateTime2021-06-06
- UpdateTime2021-06-12
- FileTotalCount191
- TotalSize5.66GBHotTimes5ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.BF-261 2.KRP-009 3.RKI-173 4.HYAKU-003 5.DAZD-024 6.AAJB-128 7.WSP-067 8.ARMG-124 9.AMG-021 10.MUKD-104 11.SCOP-061 12.LIA-112 13.SDDL-314 14.MILD-695 15.KTSN-06 16.ISD-143 17.SPSA-012 18.QQ-009 19.VENU-091 20.MKCK-019 21.DDT-280 22.DBD-3009 23.ARD-032 24.CXD-005 25.ONSD-387 26.MIBD-737 27.DSMG-02 28.ONSD-710 29.SOE-462 30.ONSD-645 31.UPS-016 32.ONSD-349 33.RBD-173 34.MIBD-548 35.PMP-116 36.XV-103 37.ATOM-137 38.MIBD-607 39.PDV-151 40.MGDV-008 41.LADY-086 42.RKI-204 43.AMD-260 44.SAL-149 45.SCSS-001 46.JUSD-249 47.MADV-137 48.MXSPS-177 49.YRZ-011 50.VNDS-7039 51.STAR-300 52.PSSD-212 53.MAMA-253 54.MAMA-127 55.CJ-047 56.GS-1051 57.MFD-036 58.DBS-005 59.HET-397 60.KS-8023 61.ARMD-360 62.GODR-094 63.BDSR-061R 64.EMAS-060 65.DVH-286 66.DTSC-041 67.CO-104 68.MVF-056D 69.EMAC-007 70.GCLD-012 71.261 72.009 73.173 74.003 75.024 76.128 77.067 78.124 79.021 80.104 81.061 82.112 83.314 84.695 85.06 86.143 87.012 88.009 89.091 90.019 91.280 92.3009 93.032 94.005 95.387 96.737 97.02 98.710 99.462 100.5 101.016 102.349 103.173 104.548 105.116 106.103 107.137 108.607 109.151 110.008 111.086 112.204 113.260 114.149 115.001 116.249 117.137 118.177 119.011 120.7039 121.300 122.212 123.253 124.127 125.047 126.1051 127.036 128.005 129.397 130.8023 131.360 132.094 133.061R 134.060 135.286 136.041 137.104 138.056D 139.007 140.012