4. Encryption Crash Course/9. Digital Certificates.mp481.96MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/1. Goals and Learning Objectives.mp41.84MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/2. Introduction to Setting up a Testing Environment Using Virtual Machines.mp4113.36MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/3. Vmware.mp4110.48MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/4. Virtual box.mp4144.15MB
5. Setting up a Testing Environment Using Virtual Machines (Lab)/5. Kali Linux 2018.mp459.62MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/10. Windows 10 - WiFi Sense.mp459.76MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/11. Windows 7, 8 and 8.1 - Privacy & Tracking.mp4105.53MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/12. Mac - Privacy & Tracking.mp457.97MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/13. Linux and Unix “like” Operating systems.mp446.23MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/14. General Use Operating Systems (Windows, MacOS and Linux).mp446.91MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/17. Anonymity Focused Operating Systems (Tails and Whonix OS).mp421.55MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/18. Penetration Testing and Ethical Hacking Focused Operating Systems.mp413.38MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/1. Goals and Learning Objectives.mp42.43MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/20. Linux - Debian 8 Jessie - Virtual box guest additions Issue.mp457.77MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/2. Security Features and Functionality.mp457.89MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/3. Security Bugs and Vulnerabilities.mp483.89MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/4. Usage Share.mp434.28MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/5. Windows 10 - Privacy & Tracking.mp479.95MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/6. Windows 10 - Disable tracking automatically.mp467.89MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/7. Windows 10 - Tool Disable Windows 10 Tracking.mp498.43MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/8. Windows 10 – Cortana.mp441.02MB
6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux)/9. Windows 10 – Privacy Settings.mp486.46MB
7. Security Bugs and Vulnerabilities/10. Firefox - Browser and extension updates.mp434.01MB
7. Security Bugs and Vulnerabilities/11. Chrome - Browser and extension updates.mp43.57MB
7. Security Bugs and Vulnerabilities/12. IE and Edge - Browser and extention updates.mp48.66MB
7. Security Bugs and Vulnerabilities/13. Auto updates - The Impact to privacy and anonymity.mp44.3MB
7. Security Bugs and Vulnerabilities/1. Goals and Learning Objectives.mp41.66MB
7. Security Bugs and Vulnerabilities/2. The Importance of Patching.mp443.71MB
7. Security Bugs and Vulnerabilities/3. Windows 7 - Auto Update.mp44.94MB
7. Security Bugs and Vulnerabilities/4. Windows 8 & 8.1 - Auto Update.mp46.54MB
7. Security Bugs and Vulnerabilities/5. Windows 10 - Auto Update.mp44.93MB
7. Security Bugs and Vulnerabilities/6. Windows - Criticality and Patch Tuesday.mp441.81MB
7. Security Bugs and Vulnerabilities/7. Windows 7, 8, 8.1 & 10 - Automate the pain away from patching.mp419.35MB
7. Security Bugs and Vulnerabilities/8. Linux - Debian - Patching.mp438.5MB
7. Security Bugs and Vulnerabilities/9. Mac - Patching.mp455.58MB
8. Reducing Threat Privilege/2. Windows 7 - Not using admin.mp410.99MB
8. Reducing Threat Privilege/3. Windows 8 and 8.1 - Not using admin.mp418.24MB
8. Reducing Threat Privilege/4. Windows 10 - Not using admin.mp414.15MB
9. Social Engineering and Social Media Offence and Defence/1. Goals and Learning Objectives.mp41.73MB
9. Social Engineering and Social Media Offence and Defence/2. Information Disclosure and Identity Strategies for Social Media.mp483.81MB
9. Social Engineering and Social Media Offence and Defence/3. Identify Verification and Registration.mp423.4MB
9. Social Engineering and Social Media Offence and Defence/4. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 1.mp423.29MB
9. Social Engineering and Social Media Offence and Defence/5. Behavioural Security Controls Against Social Threats (Phishing, Spam) Part 2.mp449.31MB
9. Social Engineering and Social Media Offence and Defence/6. Technical Security Controls Against Social Threats (Phishing, Spam, Scam & Cons).mp414.52MB