-
Section 1. Introduction 7
-
Lecture1.1
-
Lecture1.2
-
Lecture1.3
-
Lecture1.4
-
Lecture1.5
-
Lecture1.6
-
Lecture1.7
-
-
Section 2. Know Yourself - The Threat and Vulnerability Landscape 8
-
Lecture2.1
-
Lecture2.2
-
Lecture2.3
-
Lecture2.4
-
Lecture2.5
-
Lecture2.6
-
Lecture2.7
-
Lecture2.8
-
-
Section 3. Know Your Enemy - The Current Threat and Vulnerability Landscape 17
-
Lecture3.1
-
Lecture3.2
-
Lecture3.3
-
Lecture3.4
-
Lecture3.5
-
Lecture3.6
-
Lecture3.7
-
Lecture3.8
-
Lecture3.9
-
Lecture3.10
-
Lecture3.11
-
Lecture3.12
-
Lecture3.13
-
Lecture3.14
-
Lecture3.15
-
Lecture3.16
-
Lecture3.17
-
-
Section 4. Encryption Crash Course 13
-
Lecture4.1
-
Lecture4.2
-
Lecture4.3
-
Lecture4.4
-
Lecture4.5
-
Lecture4.6
-
Lecture4.7
-
Lecture4.8
-
Lecture4.9
-
Lecture4.10
-
Lecture4.11
-
Lecture4.12
-
Lecture4.13
-
-
Section 5. Setting up a Testing Environment Using Virtual Machines 5
-
Lecture5.1
-
Lecture5.2
-
Lecture5.3
-
Lecture5.4
-
Lecture5.5
-
-
Section 6. Operating System Security & Privacy (Windows vs Mac OS X vs Linux) 17
-
Lecture6.1
-
Lecture6.2
-
Lecture6.3
-
Lecture6.4
-
Lecture6.5
-
Lecture6.6
-
Lecture6.7
-
Lecture6.8
-
Lecture6.9
-
Lecture6.10
-
Lecture6.11
-
Lecture6.12
-
Lecture6.13
-
Lecture6.14
-
Lecture6.15
-
Lecture6.16
-
Lecture6.17
-
-
Section 7. Security Bugs and Vulnerabilities 13
-
Lecture7.1
-
Lecture7.2
-
Lecture7.3
-
Lecture7.4
-
Lecture7.5
-
Lecture7.6
-
Lecture7.7
-
Lecture7.8
-
Lecture7.9
-
Lecture7.10
-
Lecture7.11
-
Lecture7.12
-
Lecture7.13
-
-
Section. 8 Reducing Threat Privilege 4
-
Lecture8.1
-
Lecture8.2
-
Lecture8.3
-
Lecture8.4
-
-
Section 9. Social Engineering and Social Media Offence and Defence 6
-
Lecture9.1
-
Lecture9.2
-
Lecture9.3
-
Lecture9.4
-
Lecture9.5
-
Lecture9.6
-
-
Section 10. Security Domains 2
-
Lecture10.1
-
Lecture10.2
-
-
Section 11. Security Through Isolation and Compartmentalization 18
-
Lecture11.1
-
Lecture11.2
-
Lecture11.3
-
Lecture11.4
-
Lecture11.5
-
Lecture11.6
-
Lecture11.7
-
Lecture11.8
-
Lecture11.9
-
Lecture11.10
-
Lecture11.11
-
Lecture11.12
-
Lecture11.13
-
Lecture11.14
-
Lecture11.15
-
Lecture11.16
-
Lecture11.17
-
Lecture11.18
-
-
Section 12. BONUS - What's next? 7
-
Lecture12.1
-
Lecture12.2
-
Lecture12.3
-
Lecture12.4
-
Lecture12.5
-
Lecture12.6
-
Lecture12.7
-
This content is protected, please login and enroll course to view this content!