- Email spoofing + (27 May 2014 20:08:55)
- Data Forensics + (27 May 2014 20:14:25)
- File:Properties5.jpg + (27 May 2014 20:14:45)
- File:Metadata5.jpg + (27 May 2014 20:15:05)
- Profiling + (27 May 2014 20:16:31)
- Mobile profiling and surveillance + (27 May 2014 20:19:03)
- File:Mobileprofiling.png + (27 May 2014 20:19:24)
- File:Distancetotowers5.png + (27 May 2014 20:19:52)
- Choose a name registrar + (27 May 2014 20:55:15)
- Lesson 6 Exercises + (27 May 2014 21:07:42)
- Lesson 6 Further Reading + (27 May 2014 21:09:46)
- Webserver setup + (28 May 2014 19:01:43)
- Choose a hosting provider + (28 May 2014 19:06:39)
- Secure connections + (28 May 2014 19:10:47)
- Lesson 1 Exercises + (28 May 2014 21:34:11)
- Lesson 1 Further Reading + (28 May 2014 21:35:54)
- Lesson 5 Further Reading + (28 May 2014 21:39:31)
- Lesson 3 Further Reading + (28 May 2014 21:40:50)
- Lesson 4 Further Reading + (28 May 2014 21:42:00)
- Lesson 2 Exercises + (28 May 2014 21:47:02)
- Better Passwords + (28 May 2014 21:56:26)