Filename Size 1.How Hackers Work/01.The Course Overview.mp4 68.2 MB 1.How Hackers Work/02.Port Scanning.mp4 6.2 MB 1.How Hackers Work/03.Insecure Software.mp4 11.3 MB 1.How Hackers Work/04.Passwords.mp4 79.1 MB 1.How Hackers Work/05.Attacks on Administrator Workstations.mp4 35 MB 1.How Hackers Work/06.Identify Your Attack Surface.mp4 63.4 MB 2.Critical Tasks First/07.Configuring Automated Security Updates.mp4 21.2 MB 2.Critical Tasks First/08.Implementing Password Security.mp4 15.1 MB 2.Critical Tasks First/09.Configuring Firewalling.mp4 67.4 MB 3.Securing the Kernel and Services/10.Configuring the Kernel Against Remote Attacks.mp4 63.5 MB 3.Securing the Kernel and Services/11.Disabling Unnecessary Services.mp4 68.5 MB 3.Securing the Kernel and Services/12.Securely Configuring Services.mp4 11.4 MB 3.Securing the Kernel and Services/13.Hands-on Example – Postfix.mp4 86.9 MB 3.Securing the Kernel and Services/14.Hands-on Example – Apache.mp4 66.5 MB 4.Exploring the Local System Security/15.Securing the Boot Process.mp4 87.4 MB 4.Exploring the Local System Security/16.Using the SUID_SGID.mp4 52.4 MB 4.Exploring the Local System Security/17.Exploring Permissions.mp4 88.8 MB 5.Secure Management/18.Secure Remote Access.mp4 48.4 MB 5.Secure Management/19.Secure Logging and Monitoring.mp4 73.9 MB 5.Secure Management/20.Secure Backups.mp4 29.5 MB 5.Secure Management/21.Configuring Important Security Software.mp4 28.7 MB 6.Verifying the Security Setup/22.Running a Port Scanner.mp4 45.3 MB 6.Verifying the Security Setup/23.Running a Security Scanner.mp4 84.2 MB 6.Verifying the Security Setup/24.Outlook and Closure.mp4 32.2 MB