Filename Size 1. Introduction/1. Welcome and Introduction to the Instructor!.mp4 19.9 MB 1. Introduction/1. Welcome and Introduction to the Instructor!.vtt 1.9 KB 1. Introduction/1.1 Nathan's Twitter #GotoNathan.html 91 B 1. Introduction/1.2 Nathan's Cyber Security Blog.html 99 B 1. Introduction/2. Security Quick Win!.mp4 43.2 MB 1. Introduction/2. Security Quick Win!.vtt 15.3 KB 1. Introduction/2.1 httpswww.stationx.netcanarytokens.html 99 B 1. Introduction/3. Goals and Learning Objectives - Volume 1.mp4 16.1 MB 1. Introduction/3. Goals and Learning Objectives - Volume 1.vtt 2.6 KB 1. Introduction/4. Target Audience.mp4 7.3 MB 1. Introduction/4. Target Audience.vtt 3.2 KB 1. Introduction/5. Study Recommendations.mp4 17.9 MB 1. Introduction/5. Study Recommendations.vtt 6.5 KB 1. Introduction/6. Course updates.mp4 4.4 MB 1. Introduction/6. Course updates.vtt 787 B 10. Security Domains/1. Goals and Learning Objectives.mp4 1.4 MB 10. Security Domains/1. Goals and Learning Objectives.vtt 463 B 10. Security Domains/2. Security Domains.mp4 21.8 MB 10. Security Domains/2. Security Domains.vtt 15.1 KB 11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.mp4 2.3 MB 11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.vtt 758 B 11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.mp4 13.9 MB 11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.vtt 3.6 KB 11. Security Through Isolation and Compartmentalization/10.1 Apparmor.html 105 B 11. Security Through Isolation and Compartmentalization/10.2 Script Sandfox.html 118 B 11. Security Through Isolation and Compartmentalization/10.3 Firejail.html 92 B 11. Security Through Isolation and Compartmentalization/10.4 Linux Sandbox.html 96 B 11. Security Through Isolation and Compartmentalization/10.5 Trusted BSD.html 87 B 11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.mp4 23.8 MB 11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.vtt 7.5 KB 11. Security Through Isolation and Compartmentalization/11.1 Sandbox Man page.html 165 B 11. Security Through Isolation and Compartmentalization/11.2 Apple Sandbox Guide.html 139 B 11. Security Through Isolation and Compartmentalization/11.3 OSX-Sandbox--Seatbelt--Profiles.html 119 B 11. Security Through Isolation and Compartmentalization/11.4 Mac OS X - App Sandbox.html 193 B 11. Security Through Isolation and Compartmentalization/11.5 SuperDuper.html 127 B 11. Security Through Isolation and Compartmentalization/11.6 Firefox profile.html 132 B 11. Security Through Isolation and Compartmentalization/11.7 Buckle Up.html 97 B 11. Security Through Isolation and Compartmentalization/11.8 How to run your Applications in a Mac OS X sandbox to enhance security.html 176 B 11. Security Through Isolation and Compartmentalization/12. Virtual Machines.mp4 44.4 MB 11. Security Through Isolation and Compartmentalization/12. Virtual Machines.vtt 17.1 KB 11. Security Through Isolation and Compartmentalization/12.1 Virt Manager.html 86 B 11. Security Through Isolation and Compartmentalization/12.2 Wikipedia - Hypervisor.html 101 B 11. Security Through Isolation and Compartmentalization/12.3 KVM Debian Jessie.html 98 B 11. Security Through Isolation and Compartmentalization/12.4 Wikipedia - Kernel-based Virtual Machine.html 119 B 11. Security Through Isolation and Compartmentalization/12.5 Wikipedia - Comparison of platform virtualization software.html 137 B 11. Security Through Isolation and Compartmentalization/12.6 OpenVZ.html 90 B 11. Security Through Isolation and Compartmentalization/12.7 Turnkey Linux - Openvpn.html 97 B 11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.mp4 22.7 MB 11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.vtt 14.9 KB 11. Security Through Isolation and Compartmentalization/13.1 Example VMware security bug.html 123 B 11. Security Through Isolation and Compartmentalization/13.2 Venom.html 90 B 11. Security Through Isolation and Compartmentalization/13.3 A look at malware with VM detection.html 161 B 11. Security Through Isolation and Compartmentalization/13.4 httpsen.wikipedia.orgwikiX86_virtualization.html 109 B 11. Security Through Isolation and Compartmentalization/13.5 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html 110 B 11. Security Through Isolation and Compartmentalization/13.6 Exploiting dram rowhammer (Could be used on VMs in the future).html 152 B 11. Security Through Isolation and Compartmentalization/13.7 httpsen.wikipedia.orgwikiCovert_channel.html 105 B 11. Security Through Isolation and Compartmentalization/13.8 httpsen.wikipedia.orgwikiTiming_channel.html 105 B 11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.mp4 37 MB 11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.vtt 13.1 KB 11. Security Through Isolation and Compartmentalization/14.1 Convert VM to ISO.html 109 B 11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4 88.6 MB 11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.vtt 27.5 KB 11. Security Through Isolation and Compartmentalization/15.1 httpswww.whonix.org.html 84 B 11. Security Through Isolation and Compartmentalization/15.2 Whonix Stream Isolation.html 105 B 11. Security Through Isolation and Compartmentalization/15.3 Whonix and virtualbox.html 99 B 11. Security Through Isolation and Compartmentalization/15.4 ARM - Anonymizing relay monitor.html 108 B 11. Security Through Isolation and Compartmentalization/15.5 Whonix Check.html 100 B 11. Security Through Isolation and Compartmentalization/15.6 Whonix Features.html 97 B 11. Security Through Isolation and Compartmentalization/15.7 How to implement physical isolation.html 131 B 11. Security Through Isolation and Compartmentalization/15.8 Whonix VM snapshots.html 116 B 11. Security Through Isolation and Compartmentalization/15.9 If setting up your own workstations - MUST READ.html 112 B 11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.mp4 15.8 MB 11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.vtt 6.2 KB 11. Security Through Isolation and Compartmentalization/16.1 Whonix's lack of an Amnesic feature.html 190 B 11. Security Through Isolation and Compartmentalization/16.2 Whonix - Warnings.html 96 B 11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4 78.7 MB 11. Security Through Isolation and Compartmentalization/17. Qubes OS.vtt 26.3 KB 11. Security Through Isolation and Compartmentalization/17.1 Disposable VMs (DispVMs).html 97 B 11. Security Through Isolation and Compartmentalization/17.10 Hardware Compatibility List (HCL).html 90 B 11. Security Through Isolation and Compartmentalization/17.2 Qubes docs.html 90 B 11. Security Through Isolation and Compartmentalization/17.3 Debian template(s).html 107 B 11. Security Through Isolation and Compartmentalization/17.4 Qubes Download.html 96 B 11. Security Through Isolation and Compartmentalization/17.5 Windows templates.html 108 B 11. Security Through Isolation and Compartmentalization/17.6 Whonix templates.html 105 B 11. Security Through Isolation and Compartmentalization/17.7 Split GPG.html 100 B 11. Security Through Isolation and Compartmentalization/17.8 Librem 13 laptop.html 105 B 11. Security Through Isolation and Compartmentalization/17.9 Video Tour of Qubes.html 91 B 11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.mp4 15 MB 11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.vtt 6.6 KB 11. Security Through Isolation and Compartmentalization/18.1 Partitioning my digital life into security domains.html 145 B 11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.mp4 5.7 MB 11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.vtt 3 KB 11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.mp4 25.6 MB 11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.vtt 9.9 KB 11. Security Through Isolation and Compartmentalization/3.1 Diagram of Mac.html 131 B 11. Security Through Isolation and Compartmentalization/3.2 Windows - Tmac.html 89 B 11. Security Through Isolation and Compartmentalization/3.3 Linux - How to use macchanger.html 132 B 11. Security Through Isolation and Compartmentalization/3.4 Mac OS X - How to change the mac address.html 141 B 11. Security Through Isolation and Compartmentalization/3.5 Mac OS X - Macdaddyx.html 109 B