Filename | Size |
| 1. Introduction/1. Welcome and Introduction to the Instructor!.mp4 | 19.9 MB |
| 1. Introduction/1. Welcome and Introduction to the Instructor!.srt | 2.1 KB |
| 1. Introduction/1.1 LinkedIn - Join my network..html | 101 B |
| 1. Introduction/1.1 Nathan's Twitter #GotoNathan.html | 91 B |
| 1. Introduction/1.2 Nathan's Cyber Security Blog.html | 99 B |
| 1. Introduction/1.2 Nathan's Twitter #GotoNathan.html | 91 B |
| 1. Introduction/1.3 LinkedIn - Join my network..html | 101 B |
| 1. Introduction/1.3 Nathan's Cyber Security Blog.html | 99 B |
| 1. Introduction/2. Security Quick Win!.mp4 | 43.2 MB |
| 1. Introduction/2. Security Quick Win!.srt | 17.6 KB |
| 1. Introduction/2.1 httpswww.stationx.netcanarytokens.html | 99 B |
| 1. Introduction/3. Goals and Learning Objectives - Volume 1.mp4 | 16.1 MB |
| 1. Introduction/3. Goals and Learning Objectives - Volume 1.srt | 2.9 KB |
| 1. Introduction/4. Target Audience.mp4 | 7.3 MB |
| 1. Introduction/4. Target Audience.srt | 3.5 KB |
| 1. Introduction/5. Study Recommendations.mp4 | 17.9 MB |
| 1. Introduction/5. Study Recommendations.srt | 7.3 KB |
| 1. Introduction/6. Course updates.mp4 | 4.4 MB |
| 1. Introduction/6. Course updates.srt | 886 B |
| 10. Security Domains/1. Goals and Learning Objectives.mp4 | 1.4 MB |
| 10. Security Domains/1. Goals and Learning Objectives.srt | 501 B |
| 10. Security Domains/2. Security Domains.mp4 | 21.8 MB |
| 10. Security Domains/2. Security Domains.srt | 16.6 KB |
| 11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.mp4 | 2.3 MB |
| 11. Security Through Isolation and Compartmentalization/1. Goals and Learning Objectives.srt | 823 B |
| 11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.mp4 | 13.9 MB |
| 11. Security Through Isolation and Compartmentalization/10. Linux - Sandboxes and Application Isolation.srt | 3.9 KB |
| 11. Security Through Isolation and Compartmentalization/10.1 Trusted BSD.html | 87 B |
| 11. Security Through Isolation and Compartmentalization/10.2 Apparmor.html | 105 B |
| 11. Security Through Isolation and Compartmentalization/10.3 Firejail.html | 92 B |
| 11. Security Through Isolation and Compartmentalization/10.4 Linux Sandbox.html | 96 B |
| 11. Security Through Isolation and Compartmentalization/10.5 Script Sandfox.html | 118 B |
| 11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.mp4 | 23.8 MB |
| 11. Security Through Isolation and Compartmentalization/11. Mac - Sandboxes and Application Isolation.srt | 8.3 KB |
| 11. Security Through Isolation and Compartmentalization/11.1 OSX-Sandbox--Seatbelt--Profiles.html | 119 B |
| 11. Security Through Isolation and Compartmentalization/11.2 Firefox profile.html | 132 B |
| 11. Security Through Isolation and Compartmentalization/11.3 Buckle Up.html | 97 B |
| 11. Security Through Isolation and Compartmentalization/11.4 How to run your Applications in a Mac OS X sandbox to enhance security.html | 176 B |
| 11. Security Through Isolation and Compartmentalization/11.5 Sandbox Man page.html | 165 B |
| 11. Security Through Isolation and Compartmentalization/11.6 SuperDuper.html | 127 B |
| 11. Security Through Isolation and Compartmentalization/11.7 Apple Sandbox Guide.html | 139 B |
| 11. Security Through Isolation and Compartmentalization/11.8 Mac OS X - App Sandbox.html | 193 B |
| 11. Security Through Isolation and Compartmentalization/12. Virtual Machines.mp4 | 44.4 MB |
| 11. Security Through Isolation and Compartmentalization/12. Virtual Machines.srt | 19 KB |
| 11. Security Through Isolation and Compartmentalization/12.1 KVM Debian Jessie.html | 98 B |
| 11. Security Through Isolation and Compartmentalization/12.2 Virt Manager.html | 86 B |
| 11. Security Through Isolation and Compartmentalization/12.3 Wikipedia - Kernel-based Virtual Machine.html | 119 B |
| 11. Security Through Isolation and Compartmentalization/12.4 Wikipedia - Comparison of platform virtualization software.html | 137 B |
| 11. Security Through Isolation and Compartmentalization/12.5 Wikipedia - Hypervisor.html | 101 B |
| 11. Security Through Isolation and Compartmentalization/12.6 OpenVZ.html | 90 B |
| 11. Security Through Isolation and Compartmentalization/12.7 Turnkey Linux - Openvpn.html | 97 B |
| 11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.mp4 | 22.7 MB |
| 11. Security Through Isolation and Compartmentalization/13. Virtual Machine Weaknesses.srt | 16.4 KB |
| 11. Security Through Isolation and Compartmentalization/13.1 Venom.html | 90 B |
| 11. Security Through Isolation and Compartmentalization/13.2 Report - Cross-VM Side Channels and Their Use to Extract Pr ivate Keys.html | 110 B |
| 11. Security Through Isolation and Compartmentalization/13.3 Example VMware security bug.html | 123 B |
| 11. Security Through Isolation and Compartmentalization/13.4 A look at malware with VM detection.html | 161 B |
| 11. Security Through Isolation and Compartmentalization/13.5 Exploiting dram rowhammer (Could be used on VMs in the future).html | 152 B |
| 11. Security Through Isolation and Compartmentalization/13.6 httpsen.wikipedia.orgwikiX86_virtualization.html | 109 B |
| 11. Security Through Isolation and Compartmentalization/13.7 httpsen.wikipedia.orgwikiTiming_channel.html | 105 B |
| 11. Security Through Isolation and Compartmentalization/13.8 httpsen.wikipedia.orgwikiCovert_channel.html | 105 B |
| 11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.mp4 | 37 MB |
| 11. Security Through Isolation and Compartmentalization/14. Virtual Machine Hardening.srt | 14.4 KB |
| 11. Security Through Isolation and Compartmentalization/14.1 Convert VM to ISO.html | 109 B |
| 11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.mp4 | 88.6 MB |
| 11. Security Through Isolation and Compartmentalization/15. Whonix OS - Anonymous Operating system.srt | 30.6 KB |
| 11. Security Through Isolation and Compartmentalization/15.1 Whonix VM snapshots.html | 116 B |
| 11. Security Through Isolation and Compartmentalization/15.2 httpswww.whonix.org.html | 84 B |
| 11. Security Through Isolation and Compartmentalization/15.3 How to implement physical isolation.html | 131 B |
| 11. Security Through Isolation and Compartmentalization/15.4 Whonix Features.html | 97 B |
| 11. Security Through Isolation and Compartmentalization/15.5 Whonix Check.html | 26.6 MB |
| 11. Security Through Isolation and Compartmentalization/15.6 If setting up your own workstations - MUST READ.html | 112 B |
| 11. Security Through Isolation and Compartmentalization/15.7 Whonix and virtualbox.html | 99 B |
| 11. Security Through Isolation and Compartmentalization/15.8 ARM - Anonymizing relay monitor.html | 108 B |
| 11. Security Through Isolation and Compartmentalization/15.9 Whonix Stream Isolation.html | 105 B |
| 11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.mp4 | 15.8 MB |
| 11. Security Through Isolation and Compartmentalization/16. Whonix OS - Weaknesses.srt | 6.8 KB |
| 11. Security Through Isolation and Compartmentalization/16.1 Whonix's lack of an Amnesic feature.html | 190 B |
| 11. Security Through Isolation and Compartmentalization/16.2 Whonix - Warnings.html | 96 B |
| 11. Security Through Isolation and Compartmentalization/17. Qubes OS.mp4 | 78.7 MB |
| 11. Security Through Isolation and Compartmentalization/17. Qubes OS.srt | 29.1 KB |
| 11. Security Through Isolation and Compartmentalization/17.1 Windows templates.html | 108 B |
| 11. Security Through Isolation and Compartmentalization/17.10 Disposable VMs (DispVMs).html | 97 B |
| 11. Security Through Isolation and Compartmentalization/17.2 Librem 13 laptop.html | 105 B |
| 11. Security Through Isolation and Compartmentalization/17.3 Whonix templates.html | 105 B |
| 11. Security Through Isolation and Compartmentalization/17.4 Hardware Compatibility List (HCL).html | 90 B |
| 11. Security Through Isolation and Compartmentalization/17.5 Qubes docs.html | 90 B |
| 11. Security Through Isolation and Compartmentalization/17.6 Debian template(s).html | 107 B |
| 11. Security Through Isolation and Compartmentalization/17.7 Video Tour of Qubes.html | 91 B |
| 11. Security Through Isolation and Compartmentalization/17.8 Split GPG.html | 100 B |
| 11. Security Through Isolation and Compartmentalization/17.9 Qubes Download.html | 96 B |
| 11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.mp4 | 15 MB |
| 11. Security Through Isolation and Compartmentalization/18. Security Domains, Isolation and Compartmentalization.srt | 7.1 KB |
| 11. Security Through Isolation and Compartmentalization/18.1 Partitioning my digital life into security domains.html | 145 B |
| 11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.mp4 | 5.7 MB |
| 11. Security Through Isolation and Compartmentalization/2. Introduction to Isolation and Compartmentalization.srt | 3.3 KB |
| 11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.mp4 | 25.6 MB |
| 11. Security Through Isolation and Compartmentalization/3. Physical and Hardware Isolation - How to change the Mac Address.srt | 10.9 KB |
| 11. Security Through Isolation and Compartmentalization/3.1 Diagram of Mac.html | 131 B |