Authorship Recognition and Evasion Methods - The knock - Introduction to live operating systems - Tails - Introduction to VPNs - Which VPN protocol is best to use? VPN Weaknesses - Can you trust VPN providers? Choosing the right VPN provider - What is Tor? The Tor Network and Browser - What should Tor be used for? Directory Authorities and Relays - Tor Bridges - Tor Pluggable Transports and Traffic Obfuscation - Torrc Configuration File - Running other applications through Tor - Tor Weaknesses Part 1 - Tor Weaknesses Part 2 - Conclusions on Tor and mitigation to reduce risk - Attacking Tor: how the NSA targets users' online anonymity - Hidden services — The Tor darknet - Finding Tor hidden services - SSH Public private key authentication - I2P - Introduction - JonDonym - Introduction - JonDonym - Installing and Secure Configuration - Outbound Bypassing - Port Sharing and Knocking - Outbound Bypassing — Cloaking and Obfuscating - How to setup nested VPNs - How to setup nested SSH - How to setup proxy chains - Staying safe while on public Wi-Fi hotspots - Using public Wi-Fi hotspots for security, privacy and anonymity safely - Finding public Wi-Fi hotspots - Boosting Wi-Fi range - How are Wi-Fi users geo located?
Mobile and Cell Phone Weaknesses - How to use a laptop and cellular networks for Internet privacy and anonymity - Important information - Congratultions - Course Outline Section 1: Introduction 1. Welcome to Volume 4 - 2. What is End Point Protection? Disk Encryption — What is it good for? Windows - Disk Encryption - An Introduction - Windows - Disk Encryption - Bitlocker - Windows - Setting Up BitLocker - Windows - Disk Encryption - VeraCrypt - Mac - Filevault2 - Mac - Setting up Filevault2 - Linux - Encrypting the boot partition with Grub2 - Defense Against Disk Decryption Attacks - File Encryption - Is Anti-Virus dead?
Ransomware - Mac - XProtect - What is application and execution control? Windows - Application control - Software Restriction Policies - Windows - Application control - AppLocker - Windows - Application Control - Parental controls - Windows 10 - Device Guard - Linux - Access Control Models - Linux - Security frameworks - AppArmor - Linux - Security frameworks - SElinux - Linux - Security frameworks - Grsecurity - Linux - Security frameworks - PaX and more - Mac - Application control - Parental controls - Mac - Application control - Gatekeeper - Mac - Application control - System Integrity Protection - Mac - Application control - Santa - Mac - Application control - Little Flocker - Mac - Other Stuff!
Cylance - Section 7: Threat Detection and Monitoring A Complete Failure to Detect Threats - Rethinking Honeypots - CanaryTokens - OpenCanary - CanaryPi Artillery - Binary Defense - Honey Drive - Security Onion - Introduction to Malware and Hacker Hunting - Windows - Farbar Recovery Scanner - Automated Malware Removal Tools - Firmware Rootkits — Seek and Destroy Part 1 - Firmware Rootkits — Seek and Destroy Part 2 - An Introduction to Hardening - Hardening Standards - OpenSCAP - Baseline Auditing - Windows — Hardening - Mac — Hardening - Linux — Hardening - Security Focused Operating Systems - Evidence Elimination - CCleaner and Bleachit - Disk Wiping - Mechanical Drives - Disk Wiping - Solid State Drives - Clients, Protocols and Authentication - Email Weaknesses - TorBirdy - Remailers - Choosing an Email Provider - An Introduction to Instant Messengers - Instant Messengers - Signal - Instant Messengers - Chatsecure - Instant Messengers - Cryptocat - Instant Messengers - Ricochet - Instant Messengers - Other - Video and Voice Messengers - Linphone - Video and Voice Messengers - Jitsi - Mashrur Hossain Technology Professional and Entrepreneur 4.
Joe Parys Best-Selling Instructor 4. Privilege Escalation - Misc. Terms Unredeemed licenses can be returned for store credit within 30 days of purchase. Once your license is redeemed, all sales are final. See More Reviews.
Deny Got it! In Ukraine, the alleged ringleader of the Avalanche malware spam botnet was arrested after eluding authorities in the wake of a global cybercrime crackdown there in Separately, a case that was hailed as a test of whether programmers can be held accountable for how customers use their product turned out poorly for year-old programmer Taylor Huddleston, who was sentenced to almost three years in prison for making and marketing a complex spyware program.
Adobe has released updates to fix at least 67 vulnerabilities in its Acrobat, Reader and Flash Player software. Separately, Microsoft today issued patches to plug 48 security holes in Windows and other Microsoft products. It remains unclear exactly how this ransomware strain is being disseminated and why it appears to have spread so quickly, but there are indications the malware may be spreading to vulnerable systems through a security hole in Windows that was recently patched by Microsoft.
But many Internet users are unaware that ransomware also can just as easily seize control over files stored on cloud services.
0コメント