Filename Size 1. Introduction/1. Welcome and Introduction to the Instructor!.mp4 19.9 MB 1. Introduction/1. Welcome and Introduction to the Instructor!.vtt 1.9 KB 1. Introduction/1.1 Nathan's Cyber Security Blog.html 99 B 1. Introduction/1.2 Nathan's Twitter #GotoNathan.html 91 B 1. Introduction/2. Security Quick Win!.mp4 43.2 MB 1. Introduction/2. Security Quick Win!.vtt 15.3 KB 1. Introduction/2.1 httpswww.stationx.netcanarytokens.html 99 B 1. Introduction/3. Goals and Learning Objectives - Volume 1.mp4 16.1 MB 1. Introduction/3. Goals and Learning Objectives - Volume 1.vtt 2.6 KB 1. Introduction/4. Target Audience.mp4 7.3 MB 1. Introduction/4. Target Audience.vtt 3.2 KB 1. Introduction/5. Study Recommendations.mp4 17.9 MB 1. Introduction/5. Study Recommendations.vtt 6.5 KB 1. Introduction/6. Course updates.mp4 4.4 MB 1. Introduction/6. Course updates.vtt 787 B 10. Security Domains/1. Goals and Learning Objectives.mp4 1.4 MB 10. Security Domains/1. Goals and Learning Objectives.vtt 463 B 10. Security Domains/2. Security Domains.mp4 21.8 MB 10. Security Domains/2. Security Domains.vtt 15.1 KB 11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.mp4 2.3 MB 11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.vtt 758 B 11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.mp4 13.9 MB 11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.vtt 3.6 KB 11. Security Through Isolation and Compartmentalization/10.1 Script Sandfox.html 118 B 11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.mp4 23.8 MB 11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.vtt 7.5 KB 11. Security Through Isolation and Compartmentalization/11.1 Mac OS X - App Sandbox.html 193 B 11. Security Through Isolation and Compartmentalization/11.3 OSX-Sandbox--Seatbelt--Profiles.html 119 B 11. Security Through Isolation and Compartmentalization/11.4 Sandbox Man page.html 165 B 11. Security Through Isolation and Compartmentalization/11.5 Firefox profile.html 132 B 11. Security Through Isolation and Compartmentalization/11.6 Apple Sandbox Guide.html 139 B 11. Security Through Isolation and Compartmentalization/11.7 SuperDuper.html 127 B 11. Security Through Isolation and Compartmentalization/11.8 How to run your Applications in a Mac OS X sandbox to enhance security.html 176 B 11. Security Through Isolation and Compartmentalization/12. Virtual Machines.mp4 44.4 MB 11. Security Through Isolation and Compartmentalization/12. Virtual Machines.vtt 17.1 KB 11. Security Through Isolation and Compartmentalization/12.2 Wikipedia - Kernel-based Virtual Machine.html 119 B 11. Security Through Isolation and Compartmentalization/12.7 Wikipedia - Comparison of platform virtualization software.html 137 B 11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.mp4 22.7 MB 11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.vtt 14.9 KB 11. Security Through Isolation and Compartmentalization/13.1 Exploiting dram rowhammer (Could be used on VMs in the future).html 152 B 11. Security Through Isolation and Compartmentalization/13.2 Example VMware security bug.html 123 B 11. Security Through Isolation and Compartmentalization/13.3 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html 110 B 11. Security Through Isolation and Compartmentalization/13.5 httpsen.wikipedia.orgwikiCovert_channel.html 105 B 11. Security Through Isolation and Compartmentalization/13.6 httpsen.wikipedia.orgwikiX86_virtualization.html 109 B 11. Security Through Isolation and Compartmentalization/13.8 A look at malware with VM detection.html 161 B 11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.mp4 37 MB 11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.vtt 13.1 KB 11. Security Through Isolation and Compartmentalization/14.1 Convert VM to ISO.html 109 B 11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4 88.6 MB 11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.vtt 27.5 KB 11. Security Through Isolation and Compartmentalization/15.5 ARM - Anonymizing relay monitor.html 108 B 11. Security Through Isolation and Compartmentalization/15.6 If setting up your own workstations - MUST READ.html 112 B 11. Security Through Isolation and Compartmentalization/15.7 How to implement physical isolation.html 131 B 11. Security Through Isolation and Compartmentalization/15.9 Whonix VM snapshots.html 116 B 11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.mp4 15.8 MB 11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.vtt 6.2 KB 11. Security Through Isolation and Compartmentalization/16.2 Whonix's lack of an Amnesic feature.html 190 B 11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4 78.7 MB 11. Security Through Isolation and Compartmentalization/17. Qubes OS.vtt 26.3 KB 11. Security Through Isolation and Compartmentalization/17.1 Debian template(s).html 107 B 11. Security Through Isolation and Compartmentalization/17.6 Whonix templates.html 105 B 11. Security Through Isolation and Compartmentalization/17.7 Windows templates.html 108 B 11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.mp4 15 MB 11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.vtt 6.6 KB 11. Security Through Isolation and Compartmentalization/18.1 Partitioning my digital life into security domains.html 145 B 11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.mp4 5.7 MB 11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.vtt 3 KB 11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.mp4 25.6 MB 11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.vtt 9.9 KB 11. Security Through Isolation and Compartmentalization/3.1 Mac OS X - Macdaddyx.html 109 B 11. Security Through Isolation and Compartmentalization/3.4 Diagram of Mac.html 131 B 11. Security Through Isolation and Compartmentalization/3.5 Mac OS X - How to change the mac address.html 141 B 11. Security Through Isolation and Compartmentalization/3.6 Linux - How to use macchanger.html 132 B 11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.mp4 50.3 MB 11. Security Through Isolation and Compartmentalization/4. Physical and Hardware Isolation - Hardware Serials.vtt 16 KB 11. Security Through Isolation and Compartmentalization/4.1 Mac OS X - Installing dmidecode with brew.html 119 B 11. Security Through Isolation and Compartmentalization/4.4 Windows - dmidecode.html 115 B 11. Security Through Isolation and Compartmentalization/4.6 Mac OS X - Mac Cupid.html 120 B 11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.mp4 57.3 MB 11. Security Through Isolation and Compartmentalization/5. Virtual Isolation.vtt 12.8 KB 11. Security Through Isolation and Compartmentalization/5.4 Aegis Secure Key - USB 2.0 Flash Drive.html 108 B 11. Security Through Isolation and Compartmentalization/6. Dual Boot.mp4 7.9 MB 11. Security Through Isolation and Compartmentalization/6. Dual Boot.vtt 4.4 KB 11. Security Through Isolation and Compartmentalization/6.1 Dual Booting explained.html 177 B 11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.mp4 10.4 MB 11. Security Through Isolation and Compartmentalization/7. Built-in Sandboxes and Application Isolation.vtt 4.4 KB 11. Security Through Isolation and Compartmentalization/7.1 Chromium sandbox design.html 121 B 11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.mp4 26.4 MB 11. Security Through Isolation and Compartmentalization/8. Windows - Sandboxes and Application Isolation.vtt 8.8 KB 11. Security Through Isolation and Compartmentalization/8.1 Deepfreeze Cloud Browser and Desktop.html 129 B 11. Security Through Isolation and Compartmentalization/8.2 BufferZone.html 112 B 11. Security Through Isolation and Compartmentalization/8.3 Comodo.html 110 B 11. Security Through Isolation and Compartmentalization/8.6 Returnil.html 118 B 11. Security Through Isolation and Compartmentalization/8.7 Deepfreeze Standard.html 121 B 11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.mp4 70.1 MB 11. Security Through Isolation and Compartmentalization/9. Windows - Sandboxes and Application Isolation - Sandboxie.vtt 15.2 KB 11. Security Through Isolation and Compartmentalization/9.1 Sandboxie How it Works.html 106 B 11. Security Through Isolation and Compartmentalization/9.2 Introduction and quick guide sandboxie.html 143 B 11. Security Through Isolation and Compartmentalization/9.4 Sandboxie guide.html 118 B