17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[UdemyCourseDownloader] The Complete Cyber Security Course End Point Protection!
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Learn a practical skill-set in securing laptops, desktops and mobile devices from all types of threats, including, advanced hackers, trackers, exploit kits, thieves and much more.
On this course we cover end-point-protection, which is an extremely important and hot topic in cyber security right now!
Become a cyber security specialist - Go from a beginner to advanced in this easy to follow expert course.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
01 Introduction/001 Welcome to Volume 4.mp4
7.2 MB
01 Introduction/002 Introduction to the Instructor.mp4
17.1 MB
01 Introduction/003 Security Quick Win.mp4
44.6 MB
01 Introduction/004 Target Audience.mp4
7.3 MB
01 Introduction/005 Study Recommendations.mp4
27.9 MB
01 Introduction/006 Course updates.mp4
2.6 MB
02 Goals and Learning Objectives - Volume 4/007 What is End Point Protection and why is it important.mp4
34.3 MB
02 Goals and Learning Objectives - Volume 4/008 Goals and Learning Objectives - Volume 4.mp4
25.4 MB
03 File and Disk Encryption/009 Goals and Learning Objectives.mp4
7.2 MB
03 File and Disk Encryption/010 Disk Encryption What is it good for.mp4
21.7 MB
03 File and Disk Encryption/011 Disk Encryption Attacks - Cryptoalgorithms Brute Force Attacks Implementation.mp4
16.8 MB
03 File and Disk Encryption/012 Disk Encryption Attacks - Physical.mp4
38.3 MB
03 File and Disk Encryption/013 Disk Encryption Attacks - Containers Volumes and Partitions.mp4
7.2 MB
03 File and Disk Encryption/014 Windows - Disk Encryption - An Introduction.mp4
7.5 MB
03 File and Disk Encryption/015 Windows - Disk Encryption - Bitlocker.mp4
30.2 MB
03 File and Disk Encryption/016 Windows - Setting Up BitLocker.mp4
23.6 MB
03 File and Disk Encryption/017 Windows - Disk Encryption - VeraCrypt.mp4
25 MB
03 File and Disk Encryption/018 Windows - Disk Encryption - CipherShed Diskcryptor Symantec and Bestcrypt.mp4
6.8 MB
03 File and Disk Encryption/019 Windows Mac Linux - Setting up VeraCrypt.mp4
29.8 MB
03 File and Disk Encryption/020 Mac - Filevault2.mp4
13.2 MB
03 File and Disk Encryption/021 Mac - Setting up Filevault2.mp4
19.7 MB
03 File and Disk Encryption/022 Linux Whole Disk Encryption - Dm-crypt and LUKS.mp4
13.8 MB
03 File and Disk Encryption/023 Linux - Setting up DMCryptLUKS.mp4
13.2 MB
03 File and Disk Encryption/024 Linux - Encrypting the boot partition with Grub2.mp4
11.7 MB
03 File and Disk Encryption/025 Self Encrypting Drives SEDs.mp4
3.2 MB
03 File and Disk Encryption/026 Defense Against Disk Decryption Attacks.mp4
20.9 MB
03 File and Disk Encryption/027 File Encryption.mp4
11.1 MB
03 File and Disk Encryption/028 Mandatory Key Disclosure Plausible Deniability.mp4
20.5 MB
03 File and Disk Encryption/029 Nesting Crypto Systems Obfuscation.mp4
8.9 MB
03 File and Disk Encryption/030 Case Studies in Disk Decryption.mp4
5.9 MB
04 Anti-Virus and End-Point-Protection/031 Goals and Learning Objectives.mp4
5.6 MB
04 Anti-Virus and End-Point-Protection/032 Is Anti-Virus dead - The Threat Landscape.mp4
11.3 MB
04 Anti-Virus and End-Point-Protection/033 Is Anti-Virus dead - Protection Methods.mp4
36.6 MB
04 Anti-Virus and End-Point-Protection/034 Ransomware.mp4
8.5 MB
04 Anti-Virus and End-Point-Protection/035 Anti-Virus and End-Point-Protection Testing.mp4
12.9 MB
04 Anti-Virus and End-Point-Protection/036 The Problem With AV and EPP Testing.mp4
6.7 MB
04 Anti-Virus and End-Point-Protection/037 The Best of Business End-Point-Protection EPP.mp4
9.4 MB
04 Anti-Virus and End-Point-Protection/038 Windows - The Best of Anti-Virus and End-Point-Protection.mp4
10.3 MB
04 Anti-Virus and End-Point-Protection/039 Business End Point Protection EPP.mp4
5.1 MB
04 Anti-Virus and End-Point-Protection/040 Mac - XProtect.mp4
13.5 MB
04 Anti-Virus and End-Point-Protection/041 Mac - The Best of Anti-Virus and End-Point-Protection.mp4
6.5 MB
04 Anti-Virus and End-Point-Protection/042 Linux - The Best of Anti-Virus and End-Point-Protection.mp4
6.2 MB
04 Anti-Virus and End-Point-Protection/043 Online and Second Opinion - Anti-Virus and End-Point-Protection.mp4
10 MB
04 Anti-Virus and End-Point-Protection/044 Is Anti-Virus and End-Point-Protection Dangerous.mp4
13.3 MB
05 Next Generation - Anti-Virus End-Point-Protection Detection Response EDR/045 Goals and Learning Objectives.mp4
5.1 MB
05 Next Generation - Anti-Virus End-Point-Protection Detection Response EDR/046 Next Generation - Anti-Virus NG-AV End-Point-Protection NG-EPP.mp4
10.6 MB
05 Next Generation - Anti-Virus End-Point-Protection Detection Response EDR/047 End Point Detection and Response EDR.mp4
13.8 MB
05 Next Generation - Anti-Virus End-Point-Protection Detection Response EDR/048 End-Point-Protection How it works together in layers.mp4
12.9 MB
06 End-Point-Protection Technology/049 Goals and Learning Objectives.mp4
5.8 MB
06 End-Point-Protection Technology/050 What is application and execution control.mp4
20.9 MB
06 End-Point-Protection Technology/051 Windows - Application control - ACLs Windows Permission Identifier Accessenum.mp4
16.3 MB
06 End-Point-Protection Technology/052 Windows - Application control - User Account Control UAC.mp4
15.4 MB
06 End-Point-Protection Technology/053 Windows - Application control - Software Restriction Policies.mp4
11.3 MB
06 End-Point-Protection Technology/054 Windows - Application control - AppLocker.mp4
32.2 MB
06 End-Point-Protection Technology/055 Windows - Application Control - Parental controls.mp4
4.9 MB
06 End-Point-Protection Technology/056 Windows - Third Party App Control AV Appguard VoodooShield NoVirusThanks.mp4
12.9 MB
06 End-Point-Protection Technology/057 Windows - Exploitation Prevention - EMET.mp4
37.4 MB
06 End-Point-Protection Technology/058 Windows - Exploitation Prevention - Traps MBEA and HMPA.mp4
11.2 MB
06 End-Point-Protection Technology/059 Windows 10 - Device Guard.mp4
27.8 MB
06 End-Point-Protection Technology/060 Windows - Defender Application Guard for Microsoft Edge.mp4
9.1 MB
06 End-Point-Protection Technology/061 Linux - Access Control Models.mp4
13.3 MB
06 End-Point-Protection Technology/062 Linux - Security frameworks - AppArmor.mp4
4.4 MB
06 End-Point-Protection Technology/063 Linux - Security frameworks - SElinux.mp4
6.7 MB
06 End-Point-Protection Technology/064 Linux - Security frameworks - Grsecurity.mp4
12.8 MB
06 End-Point-Protection Technology/065 Linux - Security frameworks - PaX and more.mp4
3.8 MB
06 End-Point-Protection Technology/066 Linux Mac - File permissions POSIX and ACLs.mp4
19 MB
06 End-Point-Protection Technology/067 Mac - Application control - Parental controls.mp4
8 MB
06 End-Point-Protection Technology/068 Mac - Application control - Gatekeeper.mp4
10.2 MB
06 End-Point-Protection Technology/069 Mac - Application control - System Integrity Protection.mp4
12 MB
06 End-Point-Protection Technology/070 Mac - Application control - Santa.mp4
7 MB
06 End-Point-Protection Technology/071 Mac - Application control - Xfence Previously Little Flocker.mp4
20.4 MB
06 End-Point-Protection Technology/072 Mac - Other Stuff.mp4
3.7 MB
06 End-Point-Protection Technology/073 The New Normal For End-Point-Protection Technology.mp4