Download link
File List
-
Это очень важно!.txt 769 B
Приватные видеокурсы.pdf 348.32 KB
oxbridge_udemytccscvol1.sfv 2.6 KB
oxbridge.nfo 996 B
01 Introduction/002 Goals and Learning Objectives - Volume 1.mp4 70.37 MB
01 Introduction/001 Welcome and Introduction to the Instructor.mp4 60.8 MB
01 Introduction/004 Study Recommendations.mp4 95.83 MB
01 Introduction/003 Target Audience.mp4 49.67 MB
01 Introduction/005 Course updates.mp4 18.85 MB
10 Security Domains/090 Security Domains.mp4 95.29 MB
10 Security Domains/089 Goals and Learning Objectives.mp4 9.81 MB
04 Encryption Crash Course/037 SSL Stripping.mp4 150.07 MB
04 Encryption Crash Course/036 Secure Sockets Layer SSL and Transport layer security TL.mp4 194.74 MB
04 Encryption Crash Course/035 Digital Signatures.mp4 49.71 MB
04 Encryption Crash Course/034 Hash Functions.mp4 123.86 MB
04 Encryption Crash Course/033 Asymmetric Encryption.mp4 79.3 MB
04 Encryption Crash Course/032 Symmetric Encryption.mp4 158.67 MB
04 Encryption Crash Course/031 Goals and Learning Objectives.mp4 11.47 MB
04 Encryption Crash Course/041 End-to-End Encryption E2EE.mp4 8.49 MB
04 Encryption Crash Course/042 Steganography.mp4 172.74 MB
04 Encryption Crash Course/043 How Security and Encryption is Really Attacked.mp4 24.49 MB
04 Encryption Crash Course/039 Digital Certificates.mp4 118.54 MB
04 Encryption Crash Course/040 Certificate Authorities and HTTPS.mp4 255.14 MB
04 Encryption Crash Course/038 HTTPS HTTP Secure.mp4 132.79 MB
08 Reducing Threat Privilege/079 Goals and Learning Objectives Removing Privilege.mp4 81.02 MB
08 Reducing Threat Privilege/080 Windows 7 - Not using admin.mp4 55.46 MB
08 Reducing Threat Privilege/081 Windows 8 and 8.1 - Not using admin.mp4 53.15 MB
08 Reducing Threat Privilege/082 Windows 10 - Not using admin.mp4 37.78 MB
07 Security Bugs and Vulnerabilities/077 IE and Edge - Browser and extention updates.mp4 14.85 MB
07 Security Bugs and Vulnerabilities/076 Chrome - Browser and extension updates.mp4 13.79 MB
07 Security Bugs and Vulnerabilities/078 Auto updates - The Impact to privacy and anonymity.mp4 15.55 MB
07 Security Bugs and Vulnerabilities/074 Mac OS X - Patching.mp4 107.99 MB
07 Security Bugs and Vulnerabilities/066 Goals and Learning Objectives.mp4 11.75 MB
07 Security Bugs and Vulnerabilities/067 The Importance of Patching.mp4 41.73 MB
07 Security Bugs and Vulnerabilities/068 Windows 7 - Auto Update.mp4 26.82 MB
07 Security Bugs and Vulnerabilities/069 Windows 8 8.1 - Auto Update.mp4 12.9 MB
07 Security Bugs and Vulnerabilities/070 Windows 10 - Auto Update.mp4 22.52 MB
07 Security Bugs and Vulnerabilities/071 Windows - Criticality and Patch Tuesday.mp4 78.15 MB
07 Security Bugs and Vulnerabilities/075 Firefox - Browser and extension updates.mp4 71.41 MB
07 Security Bugs and Vulnerabilities/072 Windows 7 8 8.1 10 - Automate the pain away from patchi.mp4 130.11 MB
07 Security Bugs and Vulnerabilities/073 Linux - Debian - Patching.mp4 133.82 MB
12 BONUS - Whats next... Volume 2 3 and 4/114 BONUS Lecture from Volume 4 - Email clients protocols an.mp4 181.09 MB
12 BONUS - Whats next... Volume 2 3 and 4/113 BONUS Lecture from Volume 3 - Bypassing firewalls and HT.mp4 122.21 MB
12 BONUS - Whats next... Volume 2 3 and 4/112 BONUS Lecture from Volume 2 - Password cracking part 2.mp4 143.04 MB
12 BONUS - Whats next... Volume 2 3 and 4/111 BONUS Lecture from Volume 2 - Router Vulnerability Scann.mp4 204 MB
12 BONUS - Whats next... Volume 2 3 and 4/110 Congratulations.mp4 26.81 MB
12 BONUS - Whats next... Volume 2 3 and 4/109 BONUS - Important Information.mp4 20.16 MB
11 Security Through Isolation and Compartmentalization/094 Physical and Hardware Isolation - Hardware Serials.mp4 138.01 MB
11 Security Through Isolation and Compartmentalization/108 Security Domains Isolation and Compartmentalization.mp4 55.6 MB
11 Security Through Isolation and Compartmentalization/091 Goals and Learning Objectives.mp4 17.87 MB
11 Security Through Isolation and Compartmentalization/100 Linux - Sandboxes and Application Isolation.mp4 37.8 MB
11 Security Through Isolation and Compartmentalization/093 Physical and Hardware Isolation - How to change the Mac .mp4 64.92 MB
11 Security Through Isolation and Compartmentalization/092 Introduction to Isolation and Compartmentalization.mp4 23.65 MB
11 Security Through Isolation and Compartmentalization/095 Virtual Isolation.mp4 115.02 MB
11 Security Through Isolation and Compartmentalization/105 Whonix OS - Anonymous Operating system.mp4 285.2 MB
11 Security Through Isolation and Compartmentalization/101 Mac OS X - Sandboxes and Application Isolation.mp4 58.6 MB
11 Security Through Isolation and Compartmentalization/102 Virtual Machines.mp4 157.22 MB
11 Security Through Isolation and Compartmentalization/103 Virtual Machine Weaknesses.mp4 106.61 MB
11 Security Through Isolation and Compartmentalization/096 Dual Boot.mp4 27.48 MB
11 Security Through Isolation and Compartmentalization/104 Virtual Machine Hardening.mp4 107.36 MB
11 Security Through Isolation and Compartmentalization/106 Whonix OS - Weaknesses.mp4 78.03 MB
11 Security Through Isolation and Compartmentalization/107 Qubes OS.mp4 263.29 MB
11 Security Through Isolation and Compartmentalization/099 Windows - Sandboxes and Application Isolation - Sandboxi.mp4 173.85 MB
11 Security Through Isolation and Compartmentalization/098 Windows - Sandboxes and Application Isolation.mp4 92.15 MB
11 Security Through Isolation and Compartmentalization/097 Built-in Sandboxes and Application Isolation.mp4 38.24 MB
02 know Yourself - The Threat and Vulnerability Landscape/006 Goals and Learning Objectives.mp4 19.42 MB
02 know Yourself - The Threat and Vulnerability Landscape/008 What is Privacy Anonymity and Pseudonymity.mp4 107.68 MB
02 know Yourself - The Threat and Vulnerability Landscape/013 The Zero Trust Model.mp4 76.71 MB
02 know Yourself - The Threat and Vulnerability Landscape/012 Defense In Depth.mp4 6.9 MB
02 know Yourself - The Threat and Vulnerability Landscape/011 Security vs Privacy vs Anonymity - Can we have it all.mp4 41.19 MB
02 know Yourself - The Threat and Vulnerability Landscape/010 Threat Modeling and Risk Assessments.mp4 147.69 MB
02 know Yourself - The Threat and Vulnerability Landscape/009 Security Vulnerabilities Threats and Adversaries.mp4 87.98 MB
02 know Yourself - The Threat and Vulnerability Landscape/007 Protect What You Value.mp4 21.49 MB
05 Setting up a Testing Environment Using Virtual Machines/045 Introduction to Setting up a Testing Environment Using V.mp4 193.28 MB
09 Social Engineering and Social Media Offence and Defence/085 Identify Verification and Registration.mp4 56.12 MB
09 Social Engineering and Social Media Offence and Defence/086 Behavioural Security Controls Against Social Threats Phi.mp4 54.58 MB
09 Social Engineering and Social Media Offence and Defence/087 Behavioural Security Controls Against Social Threats Phi.mp4 136.3 MB
09 Social Engineering and Social Media Offence and Defence/088 Technical Security Controls Against Social Threats Phish.mp4 52.38 MB
05 Setting up a Testing Environment Using Virtual Machines/048 Kali Linux 2016.mp4 64.75 MB
05 Setting up a Testing Environment Using Virtual Machines/047 Virtual box.mp4 197.67 MB
05 Setting up a Testing Environment Using Virtual Machines/046 Vmware.mp4 163.53 MB
09 Social Engineering and Social Media Offence and Defence/084 Information Disclosure and Identity Strategies for Socia.mp4 201.38 MB
05 Setting up a Testing Environment Using Virtual Machines/044 Goals and Learning Objectives.mp4 13.13 MB
09 Social Engineering and Social Media Offence and Defence/083 Goals and Learning Objectives.mp4 12.6 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/062 Linux - Debian.mp4 7.79 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/065 Linux - Ubuntu.mp4 10.05 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/064 Linux - OpenBSD and Archlinux.mp4 40.82 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/014 Goals and Learning Objectives.mp4 20.74 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/015 Why You Need Security The Value Of A Hack.mp4 114.64 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/016 The Top 3 Things You Need To Stay Safe Online.mp4 10.71 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/017 Security Bugs and Vulnerabilities - The Vulnerability La.mp4 124.63 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/018 Hackers crackers and cyber criminals.mp4 61.18 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/019 Malware viruses rootkits and RATs.mp4 81.27 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/020 Spyware Adware Scareware PUPs Browser hijacking.mp4 71.88 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/021 What is Phishing Vishing and SMShing.mp4 54.46 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/022 Spamming Doxing.mp4 34.26 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/023 Social engineering - Scams cons tricks and fraud.mp4 93.39 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/024 Darknets Dark Markets and Exploit kits.mp4 204.21 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/025 Governments spies and secret stuff part I.mp4 136.32 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/026 Governments spies and secret stuff part II.mp4 164.01 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/027 Regulating encryption mandating insecurity legalizing s.mp4 330.2 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/028 Trust Backdoors.mp4 166.81 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/029 Censorship.mp4 41.61 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/056 Windows 10 Cortana.mp4 49 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/063 Linux - Debian 8 Jessie - Virtual box guest additions Is.mp4 83.53 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/061 Linux and Unix like Operating systems.mp4 80.91 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/060 Mac OS X - Privacy Tracking.mp4 84.14 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/058 Windows 10 - WiFi Sense.mp4 74.97 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/057 Windows 10 Privacy Settings.mp4 86.86 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/055 Windows 10 - Tool Disable Windows 10 Tracking.mp4 164.7 MB
03 Know Your Enemy - The Current Threat and Vulnerability Lands/030 Security News and Alerts Stay Informed.mp4 10 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/054 Windows 10 - Disable tracking automatically.mp4 98.98 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/053 Windows 10 - Privacy Tracking.mp4 108.03 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/052 Usage Share.mp4 45.39 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/051 Security Bugs and Vulnerabilities.mp4 63.24 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/050 Security Features and Functionality.mp4 41.08 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/049 Goals and Learning Objectives.mp4 17.48 MB
06 Operating System Security Privacy Windows vs Mac OS X vs Lin/059 Windows 7 8 and 8.1 - Privacy Tracking.mp4 134.33 MB
02 know Yourself - The Threat and Vulnerability Landscape/attached_files/009 Security Vulnerabilities Threats and Adversaries/The-Cyber-Security-Landscape-Diagram.jpg 777.15 KB
Download Info
-
Tips
“Udemy.The.Complete.Cyber.Security.Course.Volume.1.Hackers.Exposed.TUTORIAL-OXBRiDGE” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.