Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Text
Use this Text block to tell your course or coaching’s story.
Write anything from one-liners to detailed paragraphs that tell your visitors more about what you’re selling.
This block - along with other blocks that contain text content - supports various text formatting such as header sizes, font styles, alignment, ordered and unordered lists, hyperlinks and colors.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Title
Use this block to showcase testimonials, features, categories, or more. Each column has its own individual text field. You can also leave the text blank to have it display nothing and just showcase an image.
Example Curriculum
- 1. Goals and Learning Objectives-FILE AND DISK ENCRYPTIONSECTION (0:44)
- 2. Disk Encryption _ What is it good for (7:48)
- 3. Disk Encryption Attacks - Cryptoalgorithms_ Brute Force Attacks _ Implementation (5:29)
- 4. Disk Encryption Attacks - Physical (11:17)
- 5. Disk Encryption Attacks - Containers_ Volumes and Partitions (2:21)
- 6. Windows - Disk Encryption - An Introduction (2:39)
- 7. Windows - Disk Encryption - Bitlocker (12:06)
- 8. Windows - Setting Up BitLocker (9:30)
- 9. Windows - Disk Encryption - VeraCrypt (11:28)
- 10. Windows - Disk Encryption - CipherShed_ Diskcryptor_ Symantec and Bestcrypt (3:06)
- 11. Windows_ Mac _ Linux - Setting up VeraCrypt (11:42)
- 12. Mac - Filevault2 (5:39)
- 13. Mac - Setting up Filevault2 (7:35)
- 14. Linux Whole Disk Encryption - Dm-crypt and LUKS (5:54)
- 15. Linux - Setting up DMCryptLUKS (5:09)
- 16. Linux - Encrypting the boot partition with Grub2 (4:47)
- 17. Self Encrypting Drives _SEDs_ (1:47)
- 18. Defense Against Disk Decryption Attacks (7:48)
- 19. File Encryption (4:13)
- 20. Mandatory Key Disclosure _ Plausible Deniability (7:34)
- 21. Nesting Crypto Systems _ Obfuscation (3:20)
- 22. Case Studies in Disk Decryption (2:45)
- 1. Goals and Learning Objectives-ANTI-VIRUS AND END-POINT-PROTECTION (0:37)
- 2. Is Anti-Virus dead - The Threat Landscape (3:55)
- 3. Is Anti-Virus dead - Protection Methods (10:53)
- 4. Ransomware (4:17)
- 5. Anti-Virus and End-Point-Protection Testing (5:40)
- 6. The Problem With AV and EPP Testing (3:38)
- 7. The Best of Business End-Point-Protection _EPP_ (4:04)
- 8. Windows - The Best of Anti-Virus and End-Point-Protection (4:05)
- 9. Business End Point Protection _EPP_ (2:23)
- 10. Mac - XProtect (2:51)
- 11. Mac - The Best of Anti-Virus and End-Point-Protection (2:34)
- 12. Linux - The Best of Anti-Virus and End-Point-Protection (2:41)
- 13. Online and Second Opinion - Anti-Virus and End-Point-Protection (3:12)
- 14. Is Anti-Virus and End-Point-Protection Dangerous (6:35)
- 1. Goals and Learning Objectives-END-POINT-PROTECTION TECHNOLOGY (0:40)
- 2. What is application and execution control (9:49)
- 3. Windows - Application control - ACLs_ Windows Permission Identifier _ Accessenum (6:26)
- 4. Windows - Application control - User Account Control _UAC_ (4:18)
- 5. Windows - Application control - Software Restriction Policies (4:34)
- 6. Windows - Application control - AppLocker (10:23)
- 7. Windows - Application Control - Parental controls (2:43)
- 8. Windows - Third Party App Control _ AV_ Appguard_ VoodooShield_ NoVirusThanks (6:35)
- 9. Windows - Exploitation Prevention - EMET (12:58)
- 10. Windows - Exploitation Prevention - Traps_ MBEA and HMPA (4:49)
- 11. Windows 10 - Device Guard (11:32)
- 12. Windows - Defender Application Guard for Microsoft Edge (2:21)
- 13. Linux - Access Control Models (7:45)
- 14. Linux - Security frameworks - AppArmor (2:13)
- 15. Linux - Security frameworks - SElinux (3:19)
- 16. Linux - Security frameworks - Grsecurity (3:59)
- 17. Linux - Security frameworks - PaX and more (1:40)
- 18. Linux _ Mac - File permissions_ POSIX and ACLs (8:03)
- 19. Mac - Application control - Parental controls (3:03)
- 20. Mac - Application control - Gatekeeper (5:23)
- 21. Mac - Application control - System Integrity Protection (5:42)
- 22. Mac - Application control - Santa (3:47)
- 23. Mac - Application control - Xfence _Previously Little Flocker_ (7:17)
- 24. Mac - Other Stuff_ (1:19)
- 25. The New Normal For End-Point-Protection Technology (7:50)
- 1. Goals and Learning Objectives-THREAT DETECTION AND MONITORING (0:48)
- 2. A Complete Failure to Detect Threats (5:20)
- 3. Rethinking Honeypots (4:37)
- 4. CanaryTokens (18:46)
- 5. OpenCanary (12:19)
- 6. Artillery - Binary Defense (3:32)
- 7. Honey Drive (1:13)
- 8. Intrusion Detection Systems _IDS_ Part 1 - Methods (7:11)
- 9. Intrusion Detection Systems _IDS_ Part 2 - Snort_ Suricata_ Bro IDS _ OpenWIPS-n (4:55)
- 10. Host-Based Intrusion Detection - OSSEC (4:40)
- 11. Network Analysis - Sguil_ Xplico _ NetworkMiner (3:05)
- 12. File Integrity Monitoring _FIM_ and Checking Part 1 (2:58)
- 13. File Integrity Monitoring _FIM_ and Checking Part 2 - Tripwire and El Jefe (2:31)
- 14. Network Security Toolkit _NST_ (2:03)
- 15. Security Onion (1:17)
- 16. Security Information and Event Management Software _SIEM_ (2:51)
- 1. Goals and Learning Objectives-MALWARE AND HACKER HUNTING ON THE END-POINT (0:48)
- 2. Introduction to Malware and Hacker Hunting (8:20)
- 3. Windows - Farbar Recovery Scanner (9:20)
- 4. Automated Malware Removal Tools (10:41)
- 5. Live Rescue Operating Systems_ CDs_ and USBs (6:42)
- 6. Windows - Malware Seek _ Destroy - Process Explorer - Part 1 (11:33)
- 7. Windows - Malware Seek _ Destroy - Process Explorer - Part 2 (10:04)
- 8. Windows - Malware Seek _ Destroy - Process Tools (2:09)
- 9. Windows - Malware Seek _ Destroy - Sigcheck (2:31)
- 10. Windows - Malware Seek _ Destroy - Autoruns (10:09)
- 11. Windows - Malware Seek _ Destroy - Process Monitor (10:47)
- 12. Windows - Malware Seek _ Destroy - Network Connections (8:10)
- 13. Malware Seek _ Destroy - Networkx (2:21)
- 14. Linux - Malware Seek _ Destroy - Sysdig (10:27)
- 15. Linux - Seek _ Destroy Malware and Hackers - Csysdig (11:13)
- 16. Linux - Seek _ Destroy Malware and Hackers - debsums _ unhide (1:53)
- 17. Linux _ Mac OS X - Malware Seek _ Destroy - netstat (7:13)
- 18. Linux _ Mac OS X - Malware Seek _ Destroy - lsof (8:15)
- 19. Linux - Malware Seek _ Destroy - rkhunter (6:13)
- 21. Linux - Malware Seek _ Destroy - Linux - Persistence Part 1 (3:23)
- 22. Linux - Malware Seek _ Destroy - Linux - Persistence Part 2 (10:18)
- 23. Linux - Malware Seek _ Destroy - Linux - Persistence Part 3 (2:55)
- 24. Mac - Malware Seek _ Destroy - Task Explorer (5:21)
- 25. Mac - Malware Seek _ Destroy KnockKnock_ BlockBlock _ KextViewer (7:26)
- 26. Mac_ Linux _ Windows - OSquery (14:47)
- 27. Firmware Rootkits _ Seek and Destroy Part 1 (7:28)
- 28. Firmware Rootkits _ Seek and Destroy Part 2 (4:05)
- 29. End-Point-Protection Recovery and Remediation Technology (3:17)
- 30. Encrypted Backup and Cloud Storage (6:03)
- 1. Goals and Learning Objectives-OPERATING SYSTEM AND APPLICATION HARDENING (0:47)
- 2. An Introduction to Hardening (5:28)
- 3. Hardening Standards (10:01)
- 4. OpenSCAP (12:46)
- 5. Baseline Auditing (3:31)
- 6. Windows - Hardening (1:54)
- 7. Windows - Security Compliance Manager _SCM_ (11:01)
- 8. Mac _ Hardening (1:35)
- 9. Linux _ Hardening (3:31)
- 10. Security Focused Operating Systems (4:49)
- 11. Monitoring for Security Drift (1:16)
- 1. Goals and Learning Objectives-SECURE DELETING_EVIDENCE ELIMINATION AND ANTI-FORENSICS (0:43)
- 2. Secure File Deletion - Mechanical drives (8:10)
- 3. Secure File Deletion - Solid Sate Drives (6:37)
- 4. Evidence Elimination _ Anti-Forensics - An Introduction (4:42)
- 5. Evidence Elimination - CCleaner and Bleachit (7:02)
- 7. Disk Wiping - Mechanical Drives (5:46)
- 8. Disk Wiping - Solid State Drives _SSD_ (10:53)
- 9. Scrubbing EXIF _ Metadata Part 1 - Introduction (6:56)
- 10. Scrubbing EXIF _ Metadata Part 2 - Tools (5:14)
- 11. Scrubbing EXIF _ Metadata Part 3 - Guidance (4:36)
- 12. Sensor Noise Camera Identification (4:06)
- 1. Goals and Learning Objectives-EMAIL SECURITY, PRIVACY AND ANONYMITY (1:05)
- 2. Clients_ Protocols and Authentication (13:17)
- 3. Email Weaknesses (13:02)
- 4. PGP_ GPG _ Privacy (5:50)
- 5. PGP _ GPG Clients (6:27)
- 6. Windows - PGP _ GPG (19:52)
- 7. Tail - PGP _ GPG (4:01)
- 8. PGP _ GPG Weaknesses (6:15)
- 9. Improving OpenPGP Security - Best Practices - Part 1 (2:32)
- 10. Improving OpenPGP Security - Primary and Subkeys - Part 2 (12:20)
- 11. Improving OpenPGP Security - SmartcardsYubikey - Part 3 (7:41)
- 12. Email Tracking _ Exploits (10:33)
- 13. Email Anonymity _ Pseudonymity (6:18)
- 14. TorBirdy (7:36)
- 15. Remailers (7:33)
- 16. Choosing an Email Provider (13:46)
- 17. Email Alternatives (3:17)
- 1. Goals and Learning Objectives-Messengers (0:19)
- 2. An Introduction to Instant Messengers (3:08)
- 3. Instant Messenger - Signal (2:30)
- 4. Instant Messengers - Chatsecure (1:38)
- 5. Instant Messengers - Cryptocat (0:45)
- 6. Instant Messengers - Ricochet (0:46)
- 7. Instant Messengers - Other (0:38)
- 8. Video and Voice Messengers - Linphone (4:28)
- 9. Video and Voice Messengers - Jitsi (1:40)
- 10. Video and Voice Messengers - Other (0:57)
Example Image with Text
Use this Image with Text block to balance out your text content with a complementary visual to strengthen messaging and help your students connect with your product, course, or coaching. You can introduce yourself with a profile picture and author bio, showcase a student testimonial with their smiling face, or highlight an experience with a screenshot.
Example Featured Products
Showcase other available courses, bundles, and coaching products you’re selling with the Featured Products block to provide alternatives to visitors who may not be interested in this specific product.