Filename Size 1. Let's start!/1. Welcome to the course.html 334 B 1. Let's start!/2. Foreword & FAQ.html 2.6 KB 1. Let's start!/3. Course preview 15 min. long demo lecture. The whole training is 27 hours long..mp4 213.5 MB 1. Let's start!/3. Course preview 15 min. long demo lecture. The whole training is 27 hours long..srt 25.1 KB 10. Wireless Networks Security/1. Wireless Networks.mp4 7 MB 10. Wireless Networks Security/1. Wireless Networks.srt 1.4 KB 10. Wireless Networks Security/10. Standards and Security Solutions - notes for the examination.pdf 1.5 MB 10. Wireless Networks Security/11. Threats of WIFI networks.mp4 30.6 MB 10. Wireless Networks Security/11. Threats of WIFI networks.srt 6.7 KB 10. Wireless Networks Security/12. Client Attacks Launching a rogue access point.mp4 33.6 MB 10. Wireless Networks Security/12. Client Attacks Launching a rogue access point.srt 7.5 KB 10. Wireless Networks Security/13. Client Attacks Evil twin.mp4 22.8 MB 10. Wireless Networks Security/13. Client Attacks Evil twin.srt 5.3 KB 10. Wireless Networks Security/14. Client Attacks Denial of service.mp4 36.5 MB 10. Wireless Networks Security/14. Client Attacks Denial of service.srt 10.3 KB 10. Wireless Networks Security/15. EXERCISE WPA attack.mp4 8.9 MB 10. Wireless Networks Security/15. EXERCISE WPA attack.srt 3.9 KB 10. Wireless Networks Security/16. Wi-Fi Security Threats - notes for the examination.pdf 1.7 MB 10. Wireless Networks Security/2. WIFI security solutions - introduction.mp4 29.2 MB 10. Wireless Networks Security/2. WIFI security solutions - introduction.srt 6.3 KB 10. Wireless Networks Security/3. WIFI - working principles.mp4 29.4 MB 10. Wireless Networks Security/3. WIFI - working principles.srt 6.6 KB 10. Wireless Networks Security/4. Other wireless technologies.mp4 13.2 MB 10. Wireless Networks Security/4. Other wireless technologies.srt 3.3 KB 10. Wireless Networks Security/5. Threats and risks.mp4 18.5 MB 10. Wireless Networks Security/5. Threats and risks.srt 5.1 KB 10. Wireless Networks Security/6. Ineffective solutions.mp4 19 MB 10. Wireless Networks Security/6. Ineffective solutions.srt 4.7 KB 10. Wireless Networks Security/7. Authentication methods.mp4 37.1 MB 10. Wireless Networks Security/7. Authentication methods.srt 9.8 KB 10. Wireless Networks Security/8. 802.11 WEP.mp4 31.4 MB 10. Wireless Networks Security/8. 802.11 WEP.srt 7.7 KB 10. Wireless Networks Security/9. 802.11I WPA.mp4 31.6 MB 10. Wireless Networks Security/9. 802.11I WPA.srt 6.6 KB 11. Operating Systems Security/1. Operating systems security - introduction.mp4 48.1 MB 11. Operating Systems Security/1. Operating systems security - introduction.srt 10.3 KB 11. Operating Systems Security/10. EXERCISE Vulnerability attacks.mp4 47.6 MB 11. Operating Systems Security/10. EXERCISE Vulnerability attacks.srt 10.5 KB 11. Operating Systems Security/11. EXERCISE Identifying suspicious processes.mp4 30 MB 11. Operating Systems Security/11. EXERCISE Identifying suspicious processes.srt 7.7 KB 11. Operating Systems Security/12. Demonstration Process Explorer.mp4 38.1 MB 11. Operating Systems Security/12. Demonstration Process Explorer.srt 9.9 KB 11. Operating Systems Security/13. EXERCISE Removing malware.mp4 45.9 MB 11. Operating Systems Security/13. EXERCISE Removing malware.srt 9.5 KB 11. Operating Systems Security/14. Rootkits.mp4 28.9 MB 11. Operating Systems Security/14. Rootkits.srt 6.7 KB 11. Operating Systems Security/15. EXERCISE Detecting rootkits.mp4 58.3 MB 11. Operating Systems Security/15. EXERCISE Detecting rootkits.srt 12.1 KB 11. Operating Systems Security/16. EXERCISE Security evaluation.mp4 17.8 MB 11. Operating Systems Security/16. EXERCISE Security evaluation.srt 14.2 MB 11. Operating Systems Security/17. Malware - notes for the examination.pdf 2.5 MB 11. Operating Systems Security/2. Security boundaries.mp4 21.2 MB 11. Operating Systems Security/2. Security boundaries.srt 5.3 KB 11. Operating Systems Security/3. Three core.mp4 29.8 MB 11. Operating Systems Security/3. Three core.srt 8.2 KB 11. Operating Systems Security/4. EXERCISE OS boundaries.mp4 39.1 MB 11. Operating Systems Security/4. EXERCISE OS boundaries.srt 7.8 KB 11. Operating Systems Security/5. Process isolation.mp4 26.9 MB 11. Operating Systems Security/5. Process isolation.srt 7.2 KB 11. Operating Systems Security/6. Kernel Mode Code Signing.mp4 25.7 MB 11. Operating Systems Security/6. Kernel Mode Code Signing.srt 6.9 KB 11. Operating Systems Security/7. Java Virtual Machine and code access security.mp4 18.7 MB 11. Operating Systems Security/7. Java Virtual Machine and code access security.srt 4.9 KB 11. Operating Systems Security/8. OS Security Boundaries - notes for the examination.pdf 4.3 MB 11. Operating Systems Security/9. Malware.mp4 44.9 MB 11. Operating Systems Security/9. Malware.srt 14.1 KB 12. Access Control/1. Authentication and authorisation - Introduction.mp4 9.6 MB 12. Access Control/1. Authentication and authorisation - Introduction.srt 2 KB 12. Access Control/10. EXERCISE Offline attacks.mp4 45.6 MB 12. Access Control/10. EXERCISE Offline attacks.srt 12.9 KB 12. Access Control/11. Using online cracking services.mp4 37.6 MB 12. Access Control/11. Using online cracking services.srt 9.5 KB 12. Access Control/12. Identity Theft - notes for the examination.pdf 2.1 MB 12. Access Control/2. Authentication users.mp4 31.4 MB 12. Access Control/2. Authentication users.srt 7.9 KB 12. Access Control/3. How secure is your password.mp4 16 MB 12. Access Control/3. How secure is your password.srt 5.7 KB 12. Access Control/4. Authentication protocols and services.mp4 31.8 MB 12. Access Control/4. Authentication protocols and services.srt 8.7 KB 12. Access Control/5. Authentication - notes for the examination.pdf 2.9 MB 12. Access Control/6. LM Hash.mp4 30.7 MB 12. Access Control/6. LM Hash.srt 7.5 KB 12. Access Control/7. Cached Credentials.mp4 18.1 MB 12. Access Control/7. Cached Credentials.srt 5 KB 12. Access Control/8. KERBEROS.mp4 52.6 MB 12. Access Control/8. KERBEROS.srt 12.2 KB 12. Access Control/9. Identity Theft.mp4 43 MB 12. Access Control/9. Identity Theft.srt 10.5 KB 13. Windows Security/1. Windows Security - what you’ll learn.mp4 7.6 MB 13. Windows Security/1. Windows Security - what you’ll learn.srt 1.4 KB 13. Windows Security/10. BitLocker To Go Reader.mp4 18.4 MB 13. Windows Security/10. BitLocker To Go Reader.srt 5 KB 13. Windows Security/11. File and folder encryption - EFS.mp4 34.5 MB 13. Windows Security/11. File and folder encryption - EFS.srt 8.1 KB 13. Windows Security/12. EXERCISE EFS.mp4 15.4 MB 13. Windows Security/12. EXERCISE EFS.srt 6.1 KB 13. Windows Security/13. Encryption - notes for the examination.pdf 1.6 MB 13. Windows Security/2. User Account Control.mp4 32 MB 13. Windows Security/2. User Account Control.srt 6.8 KB