17 OCT 2024 - Welcome Back to TorrentFunk! Get your pirate hat back out. Streaming is dying and torrents are the new trend. Account Registration works again and so do Torrent Uploads. We invite you all to start uploading torrents again!
TORRENT DETAILS
Cyber Security - VOLUME 2
TORRENT SUMMARY
Status:
All the torrents in this section have been verified by our verification system
After this course, you will be able to discover security vulnerabilities across an entire network, by using network hacking techniques and vulnerability scanning.
You will be able to architect your network for maximum security and prevent local and remote attacks. We also cover the use of custom router firmware to provide you with better network security services.
You will understand the various types of firewalls that are available and what threats each help mitigate.
Including layer 4 firewalls like Iptables on Linux and PF on MacOS and BSD. Virtual firewalls, host-based firewalls and application based firewalls like Pfsence. We cover firewalls on all platforms including Windows, Mac OS X and Linux for all types of use scenarios.
We explore in detail wireless security, the configurations that are required for maximum security and why. How Wi-Fi is hacked and how to mitigate those attacks. Covering everything from encryption weaknesses to evil twins, RF isolation, and Wi-Fi crackers.
You will master network monitoring to discover and identify potential hackers, malware and other adversaries that might be lurking on your network. Using tools like Wireshark, Tcpdump and Syslog.
We then move away from network security and onto the details of how we are tracked online by corporations, nation-states your ISP and others. You will understand the techniques used like zombie super cookies, browser fingerprinting and how browser profiling works so third parties can establish who you are online.
We look at search engine privacy - and how to mitigate the tracking and privacy issues of search engines and their associated services.
Browser security - We cover one of the largest risks online, the browser. The doorway into your system. How to best reduce the attack surface of the browser and harden it for maximum security and privacy. A critical consideration for reducing your risk.
Finally you will fully understand how to best use methods of authentication including passwords and multi-factor authentication - soft tokens and hard tokens.
The best password managers to use and why. How passwords are cracked, and how to mitigate the cracking.
This is volume 2 of 4 of your complete guide to cyber security privacy and anonymity.
VISITOR COMMENTS (0 )
FILE LIST
Filename
Size
01 Introduction/001 Welcome to Volume 2.mp4
2.7 MB
01 Introduction/002 Introduction to the Instructor.mp4
17.1 MB
01 Introduction/003 Security Quick Win.mp4
44.6 MB
01 Introduction/004 Target Audience.mp4
8.7 MB
01 Introduction/005 Study Recommendations.mp4
27.9 MB
01 Introduction/006 Course updates.mp4
2.6 MB
02 Goals and Learning Objectives/007 Goals and Learning Objectives - Volume 2.mp4
15.9 MB
03 Routers - Port and Vulnerability scanning/008 Goals and Learning Objectives.mp4
2.3 MB
03 Routers - Port and Vulnerability scanning/009 The Home Router.mp4
60.6 MB
03 Routers - Port and Vulnerability scanning/012 Open Source Custom Router Firmware.mp4
56 MB
04 Firewalls/013 Goals and Learning Objectives.mp4
2.3 MB
04 Firewalls/014 Firewalls Host-based network-based and virtual Part 1.mp4
44.8 MB
04 Firewalls/015 Firewalls Host-based network-based and virtual Part 2.mp4
16.3 MB
04 Firewalls/016 Windows - Host Based Firewalls - Windows Firewall.mp4
62.7 MB
04 Firewalls/017 Windows - Host Based Firewalls - Windows Firewall Control WFC.mp4
35.7 MB
04 Firewalls/018 Windows - Host Based Firewalls - Third Party.mp4
35.3 MB
04 Firewalls/019 Linux - Host Based Firewalls - iptables.mp4
60.8 MB
04 Firewalls/020 Linux - Host Based Firewalls - UFW gufw nftables.mp4
49.5 MB
04 Firewalls/021 Mac - Host based Firewalls - Application Firewall PF.mp4
43.2 MB
04 Firewalls/022 Mac - Host based Firewalls - pflist Icefloor Murus.mp4
38.1 MB
04 Firewalls/023 Mac - Host based Firewalls - Little Snitch.mp4
25.2 MB
04 Firewalls/024 Network based firewalls - Routers - DD-WRT.mp4
15.1 MB
04 Firewalls/025 Network based firewalls - Hardware.mp4
19.7 MB
04 Firewalls/026 Network based firewalls - pfSense Smoothwall and Vyos.mp4
28.5 MB
04 Firewalls/ReadMe [VIEH OFFICIAL NOTE].docx
39.9 KB
05 Network Attacks Architecture and Isolation/027 Goals and Learning Objectives.mp4
1.6 MB
05 Network Attacks Architecture and Isolation/030 Effective Network Isolation Part 1.mp4
35 MB
05 Network Attacks Architecture and Isolation/031 Effective Network Isolation Part 2.mp4
23.8 MB
06 Wireless and Wi-Fi Security/032 Goals and Learning Objectives.mp4
2.1 MB
06 Wireless and Wi-Fi Security/033 Wi-Fi Weaknesses - WEP.mp4
8.1 MB
06 Wireless and Wi-Fi Security/034 Wi-Fi Weaknesses - WPA WPA2 TKIP and CCMP.mp4
37 MB
06 Wireless and Wi-Fi Security/036 Wi-Fi Security Testing.mp4
21.7 MB
06 Wireless and Wi-Fi Security/037 Wireless Security - Secure Configuration and Network Isolation.mp4
31.6 MB
06 Wireless and Wi-Fi Security/038 Wireless security - RF Isolation and Reduction.mp4
9.4 MB
06 Wireless and Wi-Fi Security/039 Wireless security - Who is on my Wi-Fi Network.mp4
11.7 MB
06 Wireless and Wi-Fi Security/ReadMe [VIEH OFFICIAL NOTE].docx
39.9 KB
07 Network Monitoring for Threats/040 Goals and Learning Objectives.mp4
1.4 MB
07 Network Monitoring for Threats/041 Syslog.mp4
80.1 MB
07 Network Monitoring for Threats/044 Wireshark - Finding malware and hackers - Part 1.mp4
91 MB
07 Network Monitoring for Threats/045 Wireshark - Finding malware and hackers - Part 2.mp4
56 MB
07 Network Monitoring for Threats/046 Network Monitoring - Wincap NST Netminer and NetWorx.mp4
18.8 MB
08 How We Are Tracked Online/047 Goals and Learning Objectives.mp4
2 MB
08 How We Are Tracked Online/048 Types of Tracking.mp4
89.8 MB
08 How We Are Tracked Online/049 IP Address.mp4
46.4 MB
08 How We Are Tracked Online/050 3rd Party Connections.mp4
36.6 MB
08 How We Are Tracked Online/051 HTTP Referer.mp4
14.4 MB
08 How We Are Tracked Online/052 Cookies and Scripts.mp4
33.7 MB
08 How We Are Tracked Online/053 Super Cookies.mp4
28.7 MB
08 How We Are Tracked Online/054 Browser Fingerprinting and Browser Volunteered Information.mp4
37.2 MB
08 How We Are Tracked Online/055 Browser and Browser Functionality.mp4
13 MB
08 How We Are Tracked Online/056 More Tracking.mp4
52 MB
08 How We Are Tracked Online/057 Browser and Internet Profiling.mp4
41.8 MB
09 Search Engines and Privacy/058 Goals and Learning Objectives.mp4
1.6 MB
09 Search Engines and Privacy/059 Search Engine Tracking Censorship and Privacy.mp4
53.6 MB
09 Search Engines and Privacy/060 Ixquick and Startpage.mp4
33.7 MB
09 Search Engines and Privacy/061 DuckDuckGo.mp4
11.9 MB
09 Search Engines and Privacy/062 Disconnect search.mp4
16.4 MB
09 Search Engines and Privacy/063 YaCy.mp4
42.1 MB
09 Search Engines and Privacy/064 Private and Anonymous Searching.mp4
54.3 MB
09 Search Engines and Privacy/ReadMe [VIEH OFFICIAL NOTE].docx
39.9 KB
10 Browser Security and Tracking Prevention/065 Goals and Learning Objectives.mp4
1.9 MB
10 Browser Security and Tracking Prevention/066 Which Browser Choice of Browser.mp4
16.9 MB
10 Browser Security and Tracking Prevention/067 Reducing the Browser Attack Surface.mp4
87.7 MB
10 Browser Security and Tracking Prevention/068 Browser Hacking Demo.mp4
46.7 MB
10 Browser Security and Tracking Prevention/069 Browser Isolation and Compartmentalization.mp4
24.8 MB
10 Browser Security and Tracking Prevention/070 Firefox Security Privacy and Tracking.mp4
41.1 MB
10 Browser Security and Tracking Prevention/072 uMatrix - HTTP Filters ad and track blockers.mp4
29.4 MB
10 Browser Security and Tracking Prevention/075 No-script - HTTP Filters ad and track blockers.mp4
23.1 MB
10 Browser Security and Tracking Prevention/077 History Cookies and Super cookies Part 1.mp4
66.7 MB
10 Browser Security and Tracking Prevention/078 History Cookies and Super cookies Part 2.mp4
66 MB
10 Browser Security and Tracking Prevention/079 HTTP Referer.mp4
7.6 MB
10 Browser Security and Tracking Prevention/080 Browser Fingerprinting.mp4
98 MB
10 Browser Security and Tracking Prevention/081 Certificates and Encryption.mp4
55.5 MB
10 Browser Security and Tracking Prevention/082 Firefox Hardening.mp4
142.3 MB
11 Passwords and Authentication Methods/083 Goals and Learning Objectives.mp4
2.6 MB
11 Passwords and Authentication Methods/084 Password Attacks.mp4
7.5 MB
11 Passwords and Authentication Methods/085 How Passwords are Cracked - Hashes - Part 1.mp4
41.1 MB
11 Passwords and Authentication Methods/086 How Passwords are Cracked - Hashcat - Part 2.mp4
24.2 MB
11 Passwords and Authentication Methods/087 Operating System Passwords.mp4
7 MB
11 Passwords and Authentication Methods/088 Password Managers - An Introduction.mp4
4.1 MB
11 Passwords and Authentication Methods/089 Password Managers - Master Password.mp4
11.5 MB
11 Passwords and Authentication Methods/090 Password Managers - KeePass and KeePassX.mp4
13.5 MB
11 Passwords and Authentication Methods/091 Password Managers - LastPass.mp4
26.5 MB
11 Passwords and Authentication Methods/092 Password Managers - Hardening Lastpass.mp4
15.6 MB
11 Passwords and Authentication Methods/097 Choosing a Method of Multi-Factor Authentication.mp4
6.2 MB
11 Passwords and Authentication Methods/099 The Future of Password and Authentication.mp4
4 MB
12 Wrap Up/100 Congratulations.mp4
11.5 MB
12 Wrap Up/102 Which VPN protocol is best to use and why.mp4
34.6 MB
12 Wrap Up/103 Email Tracking and Hacking.mp4
26.8 MB
12 Wrap Up/104 Security Vulnerabilities Threats and Adversaries.mp4