17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
[Tutorialsplanet.NET] Udemy - The Complete Cyber Security Course End Point Protection!
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
Udemy - The Complete Cyber Security Course : End Point Protection! [TP]
Learn a practical skill-set in securing laptops, desktops and mobile devices from all types of threats, including, advanced hackers, trackers, exploit kits, thieves and much more.
On this course we cover end-point-protection, which is an extremely important and hot topic in cyber security right now!
Become a cyber security specialist – Go from a beginner to advanced in this easy to follow expert course.
Covering all the major platforms Windows, MacOS, Linux, iOS and Android.
Master the selection and implementation of solid disk encryption technology to protect devices from disk decryption attacks.
Understand the current and next generation anti-virus solutions, how they work, how to select the best products and how to implement them successfully.
Covering traditional end-point-protection technologies through to next generation and future technology; application control, execution prevention, machine learning and Artificial Intelligence.
Learn how we can detect and monitor for threats such as malware and hackers through the use of security through deception and detection technologies.
We have fun learning how to seek and destroy system resident malware and hackers. Get up to speed on your hacker hunting!
Learn how to perform operating system hardening to decrease the attacker surfaces of your devices to make them safer.
Explore the best techniques in anti-forensics to securely delete data and meta-data so that it is unrecoverable by even computer forensics experts.
Plus there is more. We end by looking the extremely important topic of email and messenger security. Email has natively poor security, but in this course, I teach you how to overcome those weaknesses and fully secure your communication.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
1. Introduction/1. Welcome to Volume 4.mp4
7.2 MB
1. Introduction/1. Welcome to Volume 4.vtt
882 B
1. Introduction/2. Introduction to the Instructor!.mp4
17.1 MB
1. Introduction/2. Introduction to the Instructor!.vtt
1.9 KB
1. Introduction/2.1 Nathan's Security Blog.html
99 B
1. Introduction/2.2 Nathan's Twitter.html
91 B
1. Introduction/3. Security Quick Win!.mp4
44.6 MB
1. Introduction/3. Security Quick Win!.vtt
20.8 KB
1. Introduction/4. Target Audience.mp4
7.3 MB
1. Introduction/4. Target Audience.vtt
2.4 KB
1. Introduction/5. Study Recommendations.mp4
27.9 MB
1. Introduction/5. Study Recommendations.vtt
5.3 KB
1. Introduction/6. Course updates.mp4
2.6 MB
1. Introduction/6. Course updates.vtt
759 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/1. Goals and Learning Objectives.mp4
6.5 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/1. Goals and Learning Objectives.vtt
782 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10. Scrubbing EXIF & Metadata Part 2 - Tools.mp4
20.4 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10. Scrubbing EXIF & Metadata Part 2 - Tools.vtt
6 KB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10.1 Hidden Data Detector™.html
119 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10.10 httpswww.toolsrepo.comprivacyremove-exif-from-image-files.html
123 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10.11 BatchPurifier™.html
112 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10.12 httpwww.verexif.comen.html
87 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10.2 ExifTool can Read, Write andor Create files in the following formats.html
116 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10.3 Doc Scrubber Analyze and scrub hidden and potentially embarrassing data in Word documents..html
105 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10.4 Exiv2 is a C++ library and a command line utility to manage image metadata..html
83 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10.5 MAT Metadata Anonymisation Toolkit.html
82 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10.6 ImageOptim.html
84 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10.7 ExifTool by Phil Harvey.html
10. Secure Deleting, Evidence Elimination and Anti-Forensics/10.9 pdfparanoia.html
99 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/11. Scrubbing EXIF & Metadata Part 3 - Guidance.mp4
8.4 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/11. Scrubbing EXIF & Metadata Part 3 - Guidance.vtt
5.3 KB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/11.1 How To Turn off Geotagging in Android.html
121 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/11.2 How to turn off geotagging for photos iphone ipad.html
133 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/11.3 ImageMagick®.html
104 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/11.4 How to Remove The Hidden Personal Information Microsoft Office Adds to Your Documents.html
179 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/11.5 The views of Iraq you weren’t supposed to see.html
108 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/12. Sensor Noise Camera Identification.mp4
9 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/12. Sensor Noise Camera Identification.vtt
4.9 KB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/12.1 Associating cameras with users and objects in a social networking system US 20150124107 A1.html
105 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/12.2 httpwww.cyanogenmod.org.html
10. Secure Deleting, Evidence Elimination and Anti-Forensics/3.1 EXTRA BITS - Data Security and Flash Memory.html
104 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/3.2 Security of Data on Disk - Video.html
104 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/3.3 Recovering Evidence from SSD Drives in 2014 Understanding TRIM, Garbage Collection and Exclusions.html
204 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/3.4 SSD and eMMC Forensics 2016.html
135 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/3.5 Paper - Reliably Erasing Data From Flash-Based Solid State Drives.html
129 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/4. Evidence Elimination & Anti-Forensics - An Introduction.mp4
8.3 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/4. Evidence Elimination & Anti-Forensics - An Introduction.vtt
5.6 KB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/5. Evidence Elimination - CCleaner and Bleachit.mp4
18.3 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/5. Evidence Elimination - CCleaner and Bleachit.vtt
7.9 KB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/5.1 httpbleachbit.sourceforge.net.html
102 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/5.2 httpswww.piriform.comccleaner.html
95 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/5.3 httpwww.winapp2.com.html
84 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/5.4 httpbleachbit.sourceforge.netdocumentationwinapp2_ini.html
119 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/6. Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer.mp4
14.2 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/6. Evidence Elimination - Virtual Memory, Swap, RAM Memory Cache and Buffer.vtt
6.7 KB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/6.1 Mac - How to disable virtual memory swap files.html
122 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/6.2 Windows - Disbale Memory Dump Files.html
128 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/6.3 Linux - How to Clear RAM Memory Cache, Buffer and Swap Space.html
138 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/6.4 Force Windows 7 to Clear Virtual Memory Pagefile at Shutdown.html
156 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/6.5 Paging File Info.html
120 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/6.6 Mac - Instruction to disable swap here.html
116 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/6.7 How to disable virtual memory in Windows 7.html
104 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/6.8 How to disable and re-enable hibernation on a computer that is running Windows.html
106 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7. Disk Wiping - Mechanical Drives.mp4
11.4 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7. Disk Wiping - Mechanical Drives.vtt
4.3 KB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7.1 httperaser.heidi.ie.html
84 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7.10 Drive eRazer Ultra Multi-function device that completely erases all data from a hard drive.html
132 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7.11 httpwww.dban.org.html
81 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7.2 OS X Yosemite Securely erasing your deleted files.html
127 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7.3 httpswww.piriform.comccleaner.html
95 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7.4 HARD DRIVE DEGAUSSER.html
105 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7.5 How To Securely Wipe Your Hard Drive with DBAN – Erase Your Data for Good.html
159 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7.6 httpwww.fileshredder.org.html
89 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7.7 How To Wipe a Hard Drive.html
118 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7.8 httppartedmagic.com.html
84 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/7.9 httpswww.bleachbit.org.html
87 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/8. Disk Wiping - Solid State Drives (SSD).mp4
23.1 MB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/8. Disk Wiping - Solid State Drives (SSD).vtt
11.9 KB
10. Secure Deleting, Evidence Elimination and Anti-Forensics/8.1 Securely Erasing Your SSD with Linux A How-To.html
135 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/8.10 httpgparted.sourceforge.net.html
92 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/8.11 Paper - Reliably Erasing Data From Flash-Based Solid State Drives.html
129 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/8.12 NIST Special Publication 800-88 - Guidelines for Media Sanitization.html
134 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/8.13 What is Crypto Erase.html
136 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/8.14 How to Secure Erase your Solid State Drive (SSD) with Parted Magic.html
106 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/8.2 Commonly Asked Questions and Answers on Self-encrypting Drives.html
170 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/8.3 Thermaltake BlacX Hot-Swap SATA External Hard Drive Docking Station for Windows & Mac Os Compatible.html
143 B
10. Secure Deleting, Evidence Elimination and Anti-Forensics/8.4 httpsen.wikipedia.orgwikiParallel_ATA#HDD_passwords_and_security.html