Filename Size 1. Introduction/1. Welcome and Introduction to the Instructor!.mp4 19.9 MB 1. Introduction/1. Welcome and Introduction to the Instructor!.srt 2.1 KB 1. Introduction/1.1 LinkedIn - Join my network..html 101 B 1. Introduction/1.1 Nathan's Twitter #GotoNathan.html 91 B 1. Introduction/1.2 Nathan's Cyber Security Blog.html 99 B 1. Introduction/1.2 Nathan's Twitter #GotoNathan.html 91 B 1. Introduction/1.3 LinkedIn - Join my network..html 101 B 1. Introduction/1.3 Nathan's Cyber Security Blog.html 99 B 1. Introduction/2. Security Quick Win!.mp4 43.2 MB 1. Introduction/2. Security Quick Win!.srt 17.6 KB 1. Introduction/2.1 httpswww.stationx.netcanarytokens.html 99 B 1. Introduction/3. Goals and Learning Objectives - Volume 1.mp4 16.1 MB 1. Introduction/3. Goals and Learning Objectives - Volume 1.srt 2.9 KB 1. Introduction/4. Target Audience.mp4 7.3 MB 1. Introduction/4. Target Audience.srt 3.5 KB 1. Introduction/5. Study Recommendations.mp4 17.9 MB 1. Introduction/5. Study Recommendations.srt 7.3 KB 1. Introduction/6. Course updates.mp4 4.4 MB 1. Introduction/6. Course updates.srt 886 B 10. Security Domains/1. Goals and Learning Objectives.mp4 1.4 MB 10. Security Domains/1. Goals and Learning Objectives.srt 501 B 10. Security Domains/2. Security Domains.mp4 21.8 MB 10. Security Domains/2. Security Domains.srt 16.6 KB 11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.mp4 2.3 MB 11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.srt 823 B 11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.mp4 13.9 MB 11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.srt 3.9 KB 11. Security Through Isolation and Compartmentalization/10.1 Trusted BSD.html 87 B 11. Security Through Isolation and Compartmentalization/10.2 Apparmor.html 105 B 11. Security Through Isolation and Compartmentalization/10.3 Firejail.html 92 B 11. Security Through Isolation and Compartmentalization/10.4 Linux Sandbox.html 96 B 11. Security Through Isolation and Compartmentalization/10.5 Script Sandfox.html 118 B 11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.mp4 23.8 MB 11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.srt 8.3 KB 11. Security Through Isolation and Compartmentalization/11.1 OSX-Sandbox--Seatbelt--Profiles.html 119 B 11. Security Through Isolation and Compartmentalization/11.2 Firefox profile.html 132 B 11. Security Through Isolation and Compartmentalization/11.3 Buckle Up.html 97 B 11. Security Through Isolation and Compartmentalization/11.4 How to run your Applications in a Mac OS X sandbox to enhance security.html 176 B 11. Security Through Isolation and Compartmentalization/11.5 Sandbox Man page.html 165 B 11. Security Through Isolation and Compartmentalization/11.6 SuperDuper.html 127 B 11. Security Through Isolation and Compartmentalization/11.7 Apple Sandbox Guide.html 139 B 11. Security Through Isolation and Compartmentalization/11.8 Mac OS X - App Sandbox.html 193 B 11. Security Through Isolation and Compartmentalization/12. Virtual Machines.mp4 44.4 MB 11. Security Through Isolation and Compartmentalization/12. Virtual Machines.srt 19 KB 11. Security Through Isolation and Compartmentalization/12.1 KVM Debian Jessie.html 98 B 11. Security Through Isolation and Compartmentalization/12.2 Virt Manager.html 86 B 11. Security Through Isolation and Compartmentalization/12.3 Wikipedia - Kernel-based Virtual Machine.html 119 B 11. Security Through Isolation and Compartmentalization/12.4 Wikipedia - Comparison of platform virtualization software.html 137 B 11. Security Through Isolation and Compartmentalization/12.5 Wikipedia - Hypervisor.html 101 B 11. Security Through Isolation and Compartmentalization/12.6 OpenVZ.html 90 B 11. Security Through Isolation and Compartmentalization/12.7 Turnkey Linux - Openvpn.html 97 B 11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.mp4 22.7 MB 11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.srt 16.4 KB 11. Security Through Isolation and Compartmentalization/13.1 Venom.html 90 B 11. Security Through Isolation and Compartmentalization/13.2 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html 110 B 11. Security Through Isolation and Compartmentalization/13.3 Example VMware security bug.html 123 B 11. Security Through Isolation and Compartmentalization/13.4 A look at malware with VM detection.html 161 B 11. Security Through Isolation and Compartmentalization/13.5 Exploiting dram rowhammer (Could be used on VMs in the future).html 152 B 11. Security Through Isolation and Compartmentalization/13.6 httpsen.wikipedia.orgwikiX86_virtualization.html 109 B 11. Security Through Isolation and Compartmentalization/13.7 httpsen.wikipedia.orgwikiTiming_channel.html 105 B 11. Security Through Isolation and Compartmentalization/13.8 httpsen.wikipedia.orgwikiCovert_channel.html 105 B 11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.mp4 37 MB 11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.srt 14.4 KB 11. Security Through Isolation and Compartmentalization/14.1 Convert VM to ISO.html 109 B 11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4 88.6 MB 11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.srt 30.6 KB 11. Security Through Isolation and Compartmentalization/15.1 Whonix VM snapshots.html 116 B 11. Security Through Isolation and Compartmentalization/15.2 httpswww.whonix.org.html 84 B 11. Security Through Isolation and Compartmentalization/15.3 How to implement physical isolation.html 131 B 11. Security Through Isolation and Compartmentalization/15.4 Whonix Features.html 97 B 11. Security Through Isolation and Compartmentalization/15.5 Whonix Check.html 26.6 MB 11. Security Through Isolation and Compartmentalization/15.6 If setting up your own workstations - MUST READ.html 112 B 11. Security Through Isolation and Compartmentalization/15.7 Whonix and virtualbox.html 99 B 11. Security Through Isolation and Compartmentalization/15.8 ARM - Anonymizing relay monitor.html 108 B 11. Security Through Isolation and Compartmentalization/15.9 Whonix Stream Isolation.html 105 B 11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.mp4 15.8 MB 11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.srt 6.8 KB 11. Security Through Isolation and Compartmentalization/16.1 Whonix's lack of an Amnesic feature.html 190 B 11. Security Through Isolation and Compartmentalization/16.2 Whonix - Warnings.html 96 B 11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4 78.7 MB 11. Security Through Isolation and Compartmentalization/17. Qubes OS.srt 29.1 KB 11. Security Through Isolation and Compartmentalization/17.1 Windows templates.html 108 B 11. Security Through Isolation and Compartmentalization/17.10 Disposable VMs (DispVMs).html 97 B 11. Security Through Isolation and Compartmentalization/17.2 Librem 13 laptop.html 105 B 11. Security Through Isolation and Compartmentalization/17.3 Whonix templates.html 105 B 11. Security Through Isolation and Compartmentalization/17.4 Hardware Compatibility List (HCL).html 90 B 11. Security Through Isolation and Compartmentalization/17.5 Qubes docs.html 90 B 11. Security Through Isolation and Compartmentalization/17.6 Debian template(s).html 107 B 11. Security Through Isolation and Compartmentalization/17.7 Video Tour of Qubes.html 91 B 11. Security Through Isolation and Compartmentalization/17.8 Split GPG.html 100 B 11. Security Through Isolation and Compartmentalization/17.9 Qubes Download.html 96 B 11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.mp4 15 MB 11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.srt 7.1 KB 11. Security Through Isolation and Compartmentalization/18.1 Partitioning my digital life into security domains.html 145 B 11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.mp4 5.7 MB 11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.srt 3.3 KB 11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.mp4 25.6 MB 11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.srt 10.9 KB 11. Security Through Isolation and Compartmentalization/3.1 Diagram of Mac.html 131 B