Create Tool:
Create Time:1970-01-01 08:00:00
File Size:73.85 GB
File Count:837
File Hash:c961b960e3136b8248fceb2e111b17dcbe29891d
Windows Registry Forensics/Windows Registry Forensics VM.zip | 19.77 GB |
Introduction to Applied Cryptography and Cryptanalysis/002 - Course Introduction.mp4 | 1.57 MB |
Introduction to Applied Cryptography and Cryptanalysis/003 - Introduction to Cryptography.mp4 | 9.82 MB |
Introduction to Applied Cryptography and Cryptanalysis/004 - Classifying Cryptosystems.mp4 | 13.73 MB |
Introduction to Applied Cryptography and Cryptanalysis/005 - Principles of Cryptography.mp4 | 15.96 MB |
Introduction to Applied Cryptography and Cryptanalysis/006 - Mathematics of Crpytography.mp4 | 12.04 MB |
Introduction to Applied Cryptography and Cryptanalysis/007 - Structures of Cryptography.mp4 | 20.38 MB |
Introduction to Applied Cryptography and Cryptanalysis/008 - Fundamentals of Symmetric Cryptography.mp4 | 8.30 MB |
Introduction to Applied Cryptography and Cryptanalysis/009 - Block Ciphers.mp4 | 25.40 MB |
Introduction to Applied Cryptography and Cryptanalysis/010 - The Advanced Encryption Standard (AES).mp4 | 19.53 MB |
Introduction to Applied Cryptography and Cryptanalysis/011 - Stream Ciphers.mp4 | 10.56 MB |
Introduction to Applied Cryptography and Cryptanalysis/012 - Rivest Cipher 4 (RC4).mp4 | 8.66 MB |
Introduction to Applied Cryptography and Cryptanalysis/013 - Introduction to Asymmetric Cryptography.mp4 | 22.23 MB |
Introduction to Applied Cryptography and Cryptanalysis/014 - Rivest-Shamir-Adleman (RSA).mp4 | 9.51 MB |
Introduction to Applied Cryptography and Cryptanalysis/015 - Diffie-Hellman Key Exchange.mp4 | 6.79 MB |
Introduction to Applied Cryptography and Cryptanalysis/016 - Digital Signatures.mp4 | 12.28 MB |
Introduction to Applied Cryptography and Cryptanalysis/017 - Elliptic Curve Cryptography.mp4 | 6.06 MB |
Introduction to Applied Cryptography and Cryptanalysis/018 - Introduction to Hash Functions.mp4 | 5.45 MB |
Introduction to Applied Cryptography and Cryptanalysis/019 - Collision Resistance.mp4 | 13.82 MB |
Introduction to Applied Cryptography and Cryptanalysis/020 - The SHA Hash Family.mp4 | 7.17 MB |
Introduction to Applied Cryptography and Cryptanalysis/021 - Introduction to PKI.mp4 | 21.42 MB |
Introduction to Applied Cryptography and Cryptanalysis/022 - Security of the PKI Ecosystem.mp4 | 6.72 MB |
Introduction to Applied Cryptography and Cryptanalysis/023 - Introduction to TLSSSL.mp4 | 13.08 MB |
Introduction to Applied Cryptography and Cryptanalysis/024 - Attacking TLSSSL.mp4 | 31.54 MB |
Introduction to Applied Cryptography and Cryptanalysis/025 - Introduction to VPNs.mp4 | 17.27 MB |
Introduction to Applied Cryptography and Cryptanalysis/026 - VPN Limitations.mp4 | 11.11 MB |
Introduction to Applied Cryptography and Cryptanalysis/027 - Introduction to Secure Credential Management.mp4 | 2.86 MB |
Introduction to Applied Cryptography and Cryptanalysis/028 - Securely Managing Credentials.mp4 | 25.12 MB |
Introduction to Applied Cryptography and Cryptanalysis/029 - Case Studies in Poor Password Management.mp4 | 14.78 MB |
Introduction to Applied Cryptography and Cryptanalysis/030 - Introduction to Full Disk Encryption.mp4 | 5.74 MB |
Introduction to Applied Cryptography and Cryptanalysis/031 - Attacking Full Disk Encryption.mp4 | 9.01 MB |
Introduction to Applied Cryptography and Cryptanalysis/032 - Introduction to Blockchain.mp4 | 9.57 MB |
Introduction to Applied Cryptography and Cryptanalysis/033 - Blockchain and Asymmetric Cryptography.mp4 | 8.56 MB |
Introduction to Applied Cryptography and Cryptanalysis/034 - Blockchain and Hash Functions.mp4 | 19.40 MB |
Introduction to Applied Cryptography and Cryptanalysis/035 - Introduction to Cryptanalysis.mp4 | 12.68 MB |
Introduction to Applied Cryptography and Cryptanalysis/036 - Entropy Calculations.mp4 | 4.96 MB |
Introduction to Applied Cryptography and Cryptanalysis/037 - Character Frequency Analysis.mp4 | 10.11 MB |
Introduction to Applied Cryptography and Cryptanalysis/038 - Encryption vs Encoding.mp4 | 13.14 MB |
Introduction to Applied Cryptography and Cryptanalysis/039 - Breaking ROT Ciphers.mp4 | 6.63 MB |
Introduction to Applied Cryptography and Cryptanalysis/040 - Breaking Weak XOR Encryption.mp4 | 7.81 MB |
Introduction to Applied Cryptography and Cryptanalysis/041 - Breaking Misused Stream Ciphers.mp4 | 6.50 MB |
Introduction to Applied Cryptography and Cryptanalysis/042 - TLS Decryption.mp4 | 19.86 MB |
Introduction to Applied Cryptography and Cryptanalysis/043 - Decrypting Malware Command and Control.mp4 | 32.28 MB |
Introduction to Applied Cryptography and Cryptanalysis/044 - Decrypting Downloaded Files.mp4 | 23.93 MB |
Introduction to SDLC/001 - Secure Software Design.mp4 | 83.81 MB |
Introduction to SDLC/002 - Secure SDLC.mp4 | 66.50 MB |
Introduction to SDLC/003 - Change Control.mp4 | 58.50 MB |
Introduction to SDLC/004 - Threat Modeling.mp4 | 38.65 MB |
Introduction to Vulnerability Management/001 - Introduction to Vulnerability Management.mp4 | 38.91 MB |
Introduction to Vulnerability Management/002 - Setting Up Your Environment.mp4 | 48.83 MB |
Introduction to Vulnerability Management/003 - Vulnerability Management Process.mp4 | 16.24 MB |
Introduction to Vulnerability Management/004 - Develop a Plan.mp4 | 43.88 MB |
Introduction to Vulnerability Management/005 - Vulnerability Analysis and Resolution.mp4 | 34.99 MB |
Introduction to Vulnerability Management/006 - Assessing and Improving.mp4 | 11.72 MB |
Introduction to Vulnerability Management/007 - Automated Vulnerability Scanners.mp4 | 27.70 MB |
Introduction to Vulnerability Management/008 - OpenVAS Demonstration.mp4 | 29.94 MB |
Introduction to Vulnerability Management/009 - Vulnerabilities.mp4 | 15.85 MB |
Introduction to Vulnerability Management/010 - Manual Verification.mp4 | 67.37 MB |
Introduction to Vulnerability Management/011 - Manual Verification - Metasploit.mp4 | 80.63 MB |
Introduction to Vulnerability Management/012 - Prioritizing Vulnerabilities.mp4 | 24.42 MB |
Introduction to Vulnerability Management/013 - Remediation.mp4 | 46.62 MB |
Introduction to Vulnerability Management/014 - Web Application Vulnerabilities.mp4 | 119.12 MB |
Introduction to Vulnerability Management/015 - Frameworks.mp4 | 82.59 MB |
Introduction to Vulnerability Management/016 - Vulnerability Management Summary.mp4 | 134.46 MB |
Introduction to x86 Disassembly/001 - Introduction to x86 Assembly What are Computer Instruction Sets (ISA).mp4 | 24.65 MB |
Introduction to x86 Disassembly/002 - x86 History History and Origin of the x86 Instruction Set.mp4 | 7.42 MB |
Introduction to x86 Disassembly/003 - x86 Usage How and Where x86 is Used.mp4 | 3.41 MB |
Introduction to x86 Disassembly/004 - Assembly and Syntax What x86 Assembly Looks Like and the Syntax Used to Write It.mp4 | 8.74 MB |
Introduction to x86 Disassembly/005 - Data Representation How Data is Represented in x86.mp4 | 26.64 MB |
Introduction to x86 Disassembly/006 - Registers What Registers are Available on x86 and How are They Used.mp4 | 21.78 MB |
Introduction to x86 Disassembly/007 - Memory Access How to Access Different Locations and Sizes of Memory.mp4 | 12.38 MB |
Introduction to x86 Disassembly/008 - Addressing Modes How to Address Memory, Data and Registers.mp4 | 16.75 MB |
Introduction to x86 Disassembly/009 - x86 Instructions Overview of the Most Common x86 Instructions.mp4 | 86.09 MB |
Introduction to x86 Disassembly/010 - Your First x86 Program How to Build Your First x86 Program.mp4 | 29.48 MB |
Introduction to x86 Disassembly/011 - Input and Output x86 System Calls.mp4 | 31.09 MB |
Introduction to x86 Disassembly/012 - LAB Hello World! Creating the Usual Hello World in x86.mp4 | 39.64 MB |
Introduction to x86 Disassembly/013 - StringsASCII How to Work with Strings and ASCII in x86.mp4 | 13.54 MB |
Introduction to x86 Disassembly/014 - Condition Codes How x86 Handles Condition Codes Generated by the CPU and Why They Matter.mp4 | 44.50 MB |
Introduction to x86 Disassembly/015 - Debugging Debugging Your First x86 Program with GDB.mp4 | 44.32 MB |
Introduction to x86 Disassembly/016 - ObjDump How to Use the Tool ObjDump with x86.mp4 | 5.50 MB |
Introduction to x86 Disassembly/017 - Segmentation Faults How to Diagnose and Locate Segmentation Faults in x86.mp4 | 7.38 MB |
Introduction to x86 Disassembly/018 - LAB x86 Debugging Lab to Debug an x86 Program.mp4 | 14.30 MB |
Introduction to x86 Disassembly/019 - Control Flow How to Control the Flow of a Program in x86.mp4 | 30.32 MB |
Introduction to x86 Disassembly/020 - Logic Constructs How to Implement Common Logic Constructs such as IfElseLoops in x86.mp4 | 44.93 MB |
Introduction to x86 Disassembly/021 - LAB Programming Lab with x86 Program with Input, Output and Logic Flows.mp4 | 30.73 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/001 - Introduction.mp4 | 193.27 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/002 - Tasks and Knowledge Statement.mp4 | 138.89 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/003 - Self-Assessment Questions.mp4 | 33.40 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/004 - Overview.mp4 | 12.68 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/005 - Risk Identification Frameworks.mp4 | 167.62 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/006 - Methods to Identify Risk.mp4 | 97.32 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/007 - Threats and Vulnerabilities.mp4 | 170.22 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/008 - Assets and Processes.mp4 | 147.49 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/009 - IT Risk Scenarios.mp4 | 122.63 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/010 - Ownership and Accountability.mp4 | 73.74 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/011 - Risk Capacity, Risk Appetite, Risk Tolerance and Risk Awareness.mp4 | 64.54 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/012 - Tasks and Knowledge Statements.mp4 | 61.10 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/013 - Risk Identification vs Risk Assessment.mp4 | 19.24 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/014 - Analyzing Risk Scenarios.mp4 | 144.16 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/015 - Current State of Controls.mp4 | 224.96 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/016 - Risk Analysis Methodologies.mp4 | 198.72 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/017 - Business-Related Risk, Enterprise Architecture and Data Management.mp4 | 111.42 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/018 - New Threats and Vulnerabilities, Emerging Technologies and Industry Trends.mp4 | 29.66 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/019 - Third Party Management.mp4 | 49.01 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/020 - Project and Program Management.mp4 | 48.17 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/021 - Availability and Exception Management.mp4 | 48.28 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/022 - Communicating IT Risk Assessment Results.mp4 | 66.54 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/023 - Aligning Risk Response with Business Objectives.mp4 | 11.51 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/024 - Choosing Risk Response Options.mp4 | 152.73 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/025 - Developing a Risk Action Plan.mp4 | 84.74 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/026 - Business Process Review.mp4 | 40.95 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/027 - Inherent and Residual Risk.mp4 | 53.31 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/028 - Control Activities, Part 1.mp4 | 99.97 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/029 - Control Activities, Part 2.mp4 | 162.00 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/030 - Emerging Technologies, Control Ownership, Procedures and Documentation.mp4 | 65.96 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/031 - Key Risk Indicators.mp4 | 133.08 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/032 - Key Performance Indicators.mp4 | 29.03 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/033 - Data Collection and Extraction.mp4 | 61.81 MB |
ISACA Certified in Risk and Information Systems Control (CRISC)/034 - Changes to IT Risk Profile.mp4 | 108.73 MB |
ISACA Certified Information Security Manager (CISM)/001 - Introduction.mp4 | 94.12 MB |
ISACA Certified Information Security Manager (CISM)/002 - Governance Overview.mp4 | 42.66 MB |
ISACA Certified Information Security Manager (CISM)/003 - Business Goals and Objectives.mp4 | 47.18 MB |
ISACA Certified Information Security Manager (CISM)/005_Roles and Responsibilities.mp4 | 64.60 MB |
ISACA Certified Information Security Manager (CISM)/006 - Risk Management and IS Roles and Responsibilities.mp4 | 30.99 MB |
ISACA Certified Information Security Manager (CISM)/007 - Third-Party Relationships.mp4 | 16.55 MB |
ISACA Certified Information Security Manager (CISM)/008 - Effective Metrics.mp4 | 87.81 MB |
ISACA Certified Information Security Manager (CISM)/009 - Strategy Development.mp4 | 71.83 MB |
ISACA Certified Information Security Manager (CISM)/010 - Strategy Goal, Objective and Desired State.mp4 | 129.30 MB |
ISACA Certified Information Security Manager (CISM)/011 - Current State of Security.mp4 | 23.07 MB |
ISACA Certified Information Security Manager (CISM)/012 - Strategy Elements.mp4 | 63.71 MB |
ISACA Certified Information Security Manager (CISM)/013 - IS Resources.mp4 | 114.02 MB |
ISACA Certified Information Security Manager (CISM)/014 - IS Constraints.mp4 | 68.28 MB |
ISACA Certified Information Security Manager (CISM)/015 - Implementation Action Plan Development.mp4 | 153.32 MB |
ISACA Certified Information Security Manager (CISM)/016 - IS Program Objectives.mp4 | 84.44 MB |
ISACA Certified Information Security Manager (CISM)/017 - Risk Management Overview.mp4 | 39.06 MB |
ISACA Certified Information Security Manager (CISM)/018 - Strategy, Communication, and Risk Awareness.mp4 | 38.22 MB |
ISACA Certified Information Security Manager (CISM)/019 - Effective Information Risk Management.mp4 | 28.97 MB |
ISACA Certified Information Security Manager (CISM)/020 - Risk Management Concepts.mp4 | 80.57 MB |
ISACA Certified Information Security Manager (CISM)/021 - Implementing Risk Management.mp4 | 144.67 MB |
ISACA Certified Information Security Manager (CISM)/022 - Risk Assessment Overview.mp4 | 23.80 MB |
ISACA Certified Information Security Manager (CISM)/023 - Risk Assessment Methodology.mp4 | 332.15 MB |
ISACA Certified Information Security Manager (CISM)/024 - Asset Classification Overview.mp4 | 37.69 MB |
ISACA Certified Information Security Manager (CISM)/025 - BIA Key Metrics.mp4 | 62.31 MB |
ISACA Certified Information Security Manager (CISM)/026 - Third Party Service Providers.mp4 | 42.95 MB |
ISACA Certified Information Security Manager (CISM)/027 - Integration with Life Cycle Processes.mp4 | 22.36 MB |
ISACA Certified Information Security Manager (CISM)/028 - Security Control Baselines.mp4 | 18.56 MB |
ISACA Certified Information Security Manager (CISM)/029 - Risk Monitoring Overview.mp4 | 48.20 MB |
ISACA Certified Information Security Manager (CISM)/030 - Training and Awareness.mp4 | 23.30 MB |
ISACA Certified Information Security Manager (CISM)/031 - Documentation.mp4 | 70.44 MB |
ISACA Certified Information Security Manager (CISM)/032 - IS Program Development and Management Overview.mp4 | 81.67 MB |
ISACA Certified Information Security Manager (CISM)/033 - IS Program Elements.mp4 | 39.52 MB |
ISACA Certified Information Security Manager (CISM)/034 - Defining IS Program Objectives.mp4 | 15.07 MB |
ISACA Certified Information Security Manager (CISM)/035 - Technology Resources.mp4 | 48.55 MB |
ISACA Certified Information Security Manager (CISM)/036 - Scope and Charter.mp4 | 31.14 MB |
ISACA Certified Information Security Manager (CISM)/037 - IS Management Framework.mp4 | 72.07 MB |
ISACA Certified Information Security Manager (CISM)/038 - IS Management Framework Components.mp4 | 61.83 MB |
ISACA Certified Information Security Manager (CISM)/039 - Defining IS Program Road Map.mp4 | 28.45 MB |
ISACA Certified Information Security Manager (CISM)/040 - IS Infrastructure and Architecture.mp4 | 45.92 MB |
ISACA Certified Information Security Manager (CISM)/041 - Architecture Implementation.mp4 | 13.32 MB |
ISACA Certified Information Security Manager (CISM)/043 - Management and Administrative Activities.mp4 | 195.15 MB |
ISACA Certified Information Security Manager (CISM)/044 - Services and Operational Activities.mp4 | 233.45 MB |
ISACA Certified Information Security Manager (CISM)/045 - Controls and Countermeasures.mp4 | 109.81 MB |
ISACA Certified Information Security Manager (CISM)/046 - Metrics and Monitoring.mp4 | 183.70 MB |
ISACA Certified Information Security Manager (CISM)/047 - Program Challenges.mp4 | 90.52 MB |
ISACA Certified Information Security Manager (CISM)/048 - Incident Management Introduction.mp4 | 53.18 MB |
ISACA Certified Information Security Manager (CISM)/049 - Incident Management Overview.mp4 | 38.48 MB |
ISACA Certified Information Security Manager (CISM)/050 - Incident Response Procedures.mp4 | 64.84 MB |
ISACA Certified Information Security Manager (CISM)/051 - Incident Management Organization.mp4 | 53.12 MB |
ISACA Certified Information Security Manager (CISM)/052 - Incident Management Resources.mp4 | 103.16 MB |
ISACA Certified Information Security Manager (CISM)/053 - Incident Management Objectives.mp4 | 33.38 MB |
ISACA Certified Information Security Manager (CISM)/054 - Metrics and Indicators.mp4 | 30.64 MB |
ISACA Certified Information Security Manager (CISM)/055 - Defining Incident Management Procedures.mp4 | 78.61 MB |
ISACA Certified Information Security Manager (CISM)/056 - Current State of IR Capability.mp4 | 18.63 MB |
ISACA Certified Information Security Manager (CISM)/057 - Developing an IR Plan.mp4 | 106.97 MB |
ISACA Certified Information Security Manager (CISM)/058 - BC and DR Procedures.mp4 | 228.73 MB |
ISACA Certified Information Security Manager (CISM)/059 - Testing IR, BC and DR Plans.mp4 | 97.40 MB |
ISACA Certified Information Security Manager (CISM)/060 - Executing Response and Recovery Plans.mp4 | 19.56 MB |
ISACA Certified Information Security Manager (CISM)/061 - Post-Incident Activities and Investigation.mp4 | 106.69 MB |
ISACA Certified Information Security Manager (CISM)/CISM Supplemental Materials - IR and BC Management.pdf | 116.09 KB |
ISACA Certified Information Security Manager (CISM)/CISM Supplemental Materials - IS Governance.pdf | 120.72 KB |
ISACA Certified Information Security Manager (CISM)/CISM Supplemental Materials - Security Program Architecture.pdf | 101.27 KB |
ITIL 4 Foundation/001 - Introduction to ITIL 4.mp4 | 25.33 MB |
ITIL 4 Foundation/002 - Exam Fundamentals.mp4 | 27.95 MB |
ITIL 4 Foundation/003 - 4th Industrial Revolution.mp4 | 14.97 MB |
ITIL 4 Foundation/004_Service Organizations.mp4 | 25.31 MB |
ITIL 4 Foundation/006 - Service Management.mp4 | 12.49 MB |
ITIL 4 Foundation/007 - Value.mp4 | 18.83 MB |
ITIL 4 Foundation/008 - Organizations and People.mp4 | 33.69 MB |
ITIL 4 Foundation/009 - Services and Products.mp4 | 26.06 MB |
ITIL 4 Foundation/010 - Service Offerings.mp4 | 30.97 MB |
ITIL 4 Foundation/011 - Service Relationships.mp4 | 23.34 MB |
ITIL 4 Foundation/012 - Outcomes.mp4 | 46.90 MB |
ITIL 4 Foundation/013 - Costs.mp4 | 12.72 MB |
ITIL 4 Foundation/014 - Risks.mp4 | 27.05 MB |
ITIL 4 Foundation/015 - Utility and Warranty.mp4 | 21.50 MB |
ITIL 4 Foundation/016 - Four Dimensions of Service Management.mp4 | 5.34 MB |
ITIL 4 Foundation/017 - Information and Technology.mp4 | 37.48 MB |
ITIL 4 Foundation/018 - Partners and Suppliers.mp4 | 45.26 MB |
ITIL 4 Foundation/019 - Value Streams and Processes.mp4 | 24.23 MB |
ITIL 4 Foundation/020 - PESTLE.mp4 | 15.93 MB |
ITIL 4 Foundation/021 - Applying the Four Dimensions.mp4 | 24.56 MB |
ITIL 4 Foundation/022 - Service Value System.mp4 | 13.22 MB |
ITIL 4 Foundation/023 - Opportunity, Demand and Value.mp4 | 25.99 MB |
ITIL 4 Foundation/024 - Governance.mp4 | 11.14 MB |
ITIL 4 Foundation/025 - Guiding Principles.mp4 | 16.24 MB |
ITIL 4 Foundation/026 - Focus on Value.mp4 | 18.34 MB |
ITIL 4 Foundation/027 - Start Where You Are.mp4 | 38.19 MB |
ITIL 4 Foundation/028 - Progress Iteratively with Feedback.mp4 | 32.69 MB |
ITIL 4 Foundation/029 - Collaborate and Promote Visibility.mp4 | 26.09 MB |
ITIL 4 Foundation/030 - Think and Work Holistically.mp4 | 25.82 MB |
ITIL 4 Foundation/031 - Keep It Simple and Practical.mp4 | 16.19 MB |
ITIL 4 Foundation/032 - Optimize and Automate.mp4 | 27.63 MB |
ITIL 4 Foundation/033 - Service Value Chain.mp4 | 25.10 MB |
ITIL 4 Foundation/034 - Plan.mp4 | 20.31 MB |
ITIL 4 Foundation/035 - Improve.mp4 | 19.36 MB |
ITIL 4 Foundation/036 - Engage.mp4 | 39.45 MB |
ITIL 4 Foundation/037 - Design and Transition.mp4 | 24.04 MB |
ITIL 4 Foundation/038 - ObtainBuild.mp4 | 32.21 MB |
ITIL 4 Foundation/039 - Deliver and Support.mp4 | 23.41 MB |
ITIL 4 Foundation/040 - Value Streams.mp4 | 9.01 MB |
ITIL 4 Foundation/041 - Continual Improvement.mp4 | 32.94 MB |
ITIL 4 Foundation/042 - Continual Improvement Model.mp4 | 8.12 MB |
ITIL 4 Foundation/043 - What is the Vision.mp4 | 13.11 MB |
ITIL 4 Foundation/044 - Where are We Now.mp4 | 10.21 MB |
ITIL 4 Foundation/045 - Where Do We Want to Be.mp4 | 13.91 MB |
ITIL 4 Foundation/046 - How Do We Get There.mp4 | 6.81 MB |
ITIL 4 Foundation/047 - Take Action.mp4 | 5.98 MB |
ITIL 4 Foundation/048 - Did We Get There.mp4 | 6.84 MB |
ITIL 4 Foundation/049 - How Do We Keep the Momentum Going.mp4 | 10.38 MB |
ITIL 4 Foundation/050 - Continual Improvement and the Guiding Principles.mp4 | 17.72 MB |
ITIL 4 Foundation/051 - Categories of Practices.mp4 | 11.52 MB |
ITIL 4 Foundation/052 - Management Practices.mp4 | 5.85 MB |
ITIL 4 Foundation/053 - Information Security Management.mp4 | 15.57 MB |
ITIL 4 Foundation/054 - Relationship Management.mp4 | 8.54 MB |
ITIL 4 Foundation/055 - Supplier Management.mp4 | 7.50 MB |
ITIL 4 Foundation/056 - Architecture Management.mp4 | 9.76 MB |
ITIL 4 Foundation/057 - Knowledge Management.mp4 | 9.83 MB |
ITIL 4 Foundation/058 - Measurement and Reporting.mp4 | 6.58 MB |
ITIL 4 Foundation/059 - Organizational Change Management.mp4 | 6.97 MB |
ITIL 4 Foundation/060 - Portfolio Management.mp4 | 9.28 MB |
ITIL 4 Foundation/061 - Project Management.mp4 | 8.74 MB |
ITIL 4 Foundation/062 - Risk Management.mp4 | 9.34 MB |
ITIL 4 Foundation/063 - Service Financial Management.mp4 | 5.79 MB |
ITIL 4 Foundation/064 - Strategy Management.mp4 | 8.91 MB |
ITIL 4 Foundation/065 - Workforce and Talent Management.mp4 | 7.68 MB |
ITIL 4 Foundation/066 - Service Management Practices.mp4 | 5.20 MB |
ITIL 4 Foundation/067 - Change Control.mp4 | 35.72 MB |
ITIL 4 Foundation/068 - Incident Management.mp4 | 33.60 MB |
ITIL 4 Foundation/069 - Problem Management.mp4 | 19.44 MB |
ITIL 4 Foundation/070 - Service Desk.mp4 | 32.23 MB |
ITIL 4 Foundation/071 - Service Level Management.mp4 | 24.40 MB |
ITIL 4 Foundation/072 - Service Request Management.mp4 | 30.46 MB |
ITIL 4 Foundation/073 - IT Asset Management.mp4 | 9.05 MB |
ITIL 4 Foundation/074 - Monitoring and Event Management.mp4 | 14.91 MB |
ITIL 4 Foundation/075 - Release Management.mp4 | 4.25 MB |
ITIL 4 Foundation/076 - Service Configuration Management.mp4 | 8.72 MB |
ITIL 4 Foundation/077 - Availability Management.mp4 | 7.66 MB |
ITIL 4 Foundation/078 - Business Analysis.mp4 | 6.63 MB |
ITIL 4 Foundation/079 - Capacity and Performance Management.mp4 | 15.32 MB |
ITIL 4 Foundation/080 - Service Catalog Management.mp4 | 6.90 MB |
ITIL 4 Foundation/081 - Service Continuity Management.mp4 | 10.05 MB |
ITIL 4 Foundation/082 - Service Design.mp4 | 10.96 MB |
ITIL 4 Foundation/083 - Service Validation and Testing.mp4 | 7.21 MB |
ITIL 4 Foundation/084 - Technical Management Practices.mp4 | 4.82 MB |
ITIL 4 Foundation/085 - Deployment Management.mp4 | 6.49 MB |
ITIL 4 Foundation/086 - Infrastructure and Platform Management.mp4 | 6.72 MB |
ITIL 4 Foundation/087 - Software Development and Management.mp4 | 4.58 MB |
ITIL 4 Foundation/088 - Putting It All Together.mp4 | 27.48 MB |
ITIL 4 Foundation/089 - Conclusion.mp4 | 11.92 MB |
ITIL 4 Foundation/090 - ITIL Certification Path.mp4 | 13.27 MB |
ITIL 4 Foundation/Study Guide (ITIL 4 Foundation).pdf | 11.33 MB |
Linux Fundamentals/001 - Backup and Restore Part 1.mp4 | 63.25 MB |
Linux Fundamentals/002 - Backup and Restore Part 2.mp4 | 55.14 MB |
Linux Fundamentals/003 - Tape Archive Files.mp4 | 78.42 MB |
Linux Fundamentals/004 - Scheduling Tasks.mp4 | 73.58 MB |
Linux Fundamentals/005 - Cron Command Part 1.mp4 | 65.84 MB |
Linux Fundamentals/006 - Cron Command Part 2.mp4 | 49.45 MB |
Linux Fundamentals/007 - Performance Monitoring Part 1.mp4 | 47.54 MB |
Linux Fundamentals/008 - Performance Monitoring Part 2.mp4 | 52.47 MB |
Linux Fundamentals/009 - System Monitoring.mp4 | 50.86 MB |
Linux Fundamentals/010 - Logging and Text File Commands Part 1.mp4 | 72.46 MB |
Linux Fundamentals/011 - Logging and Text File Commands Part 2.mp4 | 42.87 MB |
Linux Fundamentals/012 - Text Manipulation Part 1.mp4 | 105.32 MB |
Linux Fundamentals/013 - Text Manipulation Part 2.mp4 | 81.81 MB |
Linux Fundamentals/014 - Text Manipulation Part 3.mp4 | 61.04 MB |
Linux Fundamentals/015 - Linux Overview Part 1.mp4 | 56.32 MB |
Linux Fundamentals/016 - Linux Overview Part 2.mp4 | 58.36 MB |
Linux Fundamentals/017 - Installing Linux.mp4 | 59.41 MB |
Linux Fundamentals/018 - Directory Organization Part 1.mp4 | 46.54 MB |
Linux Fundamentals/019 - Directory Organization Part 2.mp4 | 56.21 MB |
Linux Fundamentals/020 - File Management.mp4 | 102.05 MB |
Linux Fundamentals/021 - VI Editor.mp4 | 77.46 MB |
Linux Fundamentals/022 - Links Part 1.mp4 | 61.26 MB |
Linux Fundamentals/023 - Links Part 2.mp4 | 73.30 MB |
Linux Fundamentals/024 - File Information Part 1.mp4 | 73.31 MB |
Linux Fundamentals/025 - File Information Part 2.mp4 | 51.76 MB |
Linux Fundamentals/026 - Locating Files.mp4 | 77.32 MB |
Linux Fundamentals/027 - Removable Storage Part 1.mp4 | 65.03 MB |
Linux Fundamentals/028 - Removable Storage Part 2.mp4 | 95.69 MB |
Linux Fundamentals/029 - Users and Groups.mp4 | 72.95 MB |
Linux Fundamentals/030 - Privilege Escalation.mp4 | 57.57 MB |
Linux Fundamentals/031 - User Accounts Part 1.mp4 | 53.89 MB |
Linux Fundamentals/032 - User Accounts Part 2.mp4 | 69.26 MB |
Linux Fundamentals/033 - Modifying Users.mp4 | 83.84 MB |
Linux Fundamentals/034 - Creating, Modifying, and Deleting Groups.mp4 | 48.89 MB |
Linux Fundamentals/035 - Deleting and Disabling Accounts.mp4 | 42.73 MB |
Linux Fundamentals/036 - File Ownership Part 1.mp4 | 91.09 MB |
Linux Fundamentals/037 - File Ownership Part 2.mp4 | 94.77 MB |
Linux Fundamentals/038 - File Ownership Part 3.mp4 | 108.82 MB |
Linux Fundamentals/039 - Shell Configuration Part 1.mp4 | 77.78 MB |
Linux Fundamentals/040 - Shell Configuration Part 2.mp4 | 70.79 MB |
Linux Fundamentals/041 - Shell Configuration Part 3.mp4 | 84.01 MB |
Linux Fundamentals/042 - GUI Configuration Part 1.mp4 | 84.55 MB |
Linux Fundamentals/043 - GUI Configuration Part 2.mp4 | 81.29 MB |
Linux Fundamentals/044 - GUI Configuration Part 3.mp4 | 72.18 MB |
Linux Fundamentals/045 - Graphics Information.mp4 | 89.01 MB |
Linux Fundamentals/046 - Package Management Part 1.mp4 | 81.36 MB |
Linux Fundamentals/047 - Package Management Part 2.mp4 | 74.94 MB |
Linux Fundamentals/048 - Package Management Part 3.mp4 | 61.57 MB |
Linux Fundamentals/049 - Package Management Part 4.mp4 | 42.11 MB |
Linux Fundamentals/050 - Managing Libraries Part 1.mp4 | 79.44 MB |
Linux Fundamentals/051 - Managing Libraries Part 2.mp4 | 66.45 MB |
Linux Fundamentals/052 - Disk Management Part 1.mp4 | 95.93 MB |
Linux Fundamentals/053 - Disk Management Part 2.mp4 | 69.60 MB |
Linux Fundamentals/054 - Disk Management Part 3.mp4 | 80.91 MB |
Linux Fundamentals/055 - Mounting File Systems Part 1.mp4 | 88.86 MB |
Linux Fundamentals/056 - Mounting File Systems Part 2.mp4 | 73.08 MB |
Linux Fundamentals/057 - Virtual File Systems.mp4 | 31.37 MB |
Linux Fundamentals/058 - Disk Usage.mp4 | 107.75 MB |
Linux Fundamentals/059 - Disk Quotas.mp4 | 97.23 MB |
Linux Fundamentals/060 - Devices.mp4 | 95.78 MB |
Linux Fundamentals/061 - Processes Part 1.mp4 | 62.35 MB |
Linux Fundamentals/062 - Processes Part 2.mp4 | 68.97 MB |
Linux Fundamentals/063 - Processes Part 3.mp4 | 80.21 MB |
Linux Fundamentals/064 - Processes Priority and Execution Part 1.mp4 | 59.26 MB |
Linux Fundamentals/065 - Processes Priority and Execution Part 2.mp4 | 63.59 MB |
Linux Fundamentals/066 - Kernels Part 1.mp4 | 94.66 MB |
Linux Fundamentals/067 - Kernels Part 2.mp4 | 91.16 MB |
Linux Fundamentals/068 - Networks Part 1.mp4 | 43.19 MB |
Linux Fundamentals/069 - Networks Part 2.mp4 | 67.86 MB |
Linux Fundamentals/070 - Addressing Part 1.mp4 | 70.33 MB |
Linux Fundamentals/071 - Addressing Part 2.mp4 | 61.36 MB |
Linux Fundamentals/072 - Addressing Part 3.mp4 | 63.57 MB |
Linux Fundamentals/073 - Character Based Names.mp4 | 80.89 MB |
Linux Fundamentals/074 - Networking Services Part 1.mp4 | 74.80 MB |
Linux Fundamentals/075 - Networking Services Part 2.mp4 | 84.25 MB |
Linux Fundamentals/076 - Networking Services Part 3.mp4 | 95.22 MB |
Linux Fundamentals/077 - Time Zones Part 1.mp4 | 74.56 MB |
Linux Fundamentals/078 - Time Zones Part 2.mp4 | 56.35 MB |
Linux Fundamentals/079 - Domain Name Services Part 1.mp4 | 64.63 MB |
Linux Fundamentals/080 - Domain Name Services Part 2.mp4 | 78.14 MB |
Linux Fundamentals/081 - Domain Name Services Part 3.mp4 | 88.89 MB |
Linux Fundamentals/082 - Domain Name Services Part 4.mp4 | 50.70 MB |
Linux Fundamentals/083 - Network File Resources Part 1.mp4 | 71.80 MB |
Linux Fundamentals/084 - Network File Resources Part 2.mp4 | 68.07 MB |
Linux Fundamentals/085 - Managing NFS.mp4 | 56.57 MB |
Linux Fundamentals/086 - Printing.mp4 | 69.40 MB |
Linux Fundamentals/087 - Accessibility.mp4 | 69.14 MB |
Linux Fundamentals/088 - Localization Part 1.mp4 | 84.87 MB |
Linux Fundamentals/089 - Localization Part 2.mp4 | 79.63 MB |
Linux Fundamentals/090 - System Security Part 1.mp4 | 83.09 MB |
Linux Fundamentals/091 - System Security Part 2.mp4 | 72.51 MB |
Linux Fundamentals/092 - Network Security Part 1.mp4 | 75.77 MB |
Linux Fundamentals/093 - Network Security Part 2.mp4 | 93.18 MB |
Linux Fundamentals/094 - Network Security Part 3.mp4 | 57.40 MB |
Linux Fundamentals/095 - Network Security Part 4.mp4 | 77.26 MB |
Linux Fundamentals/096 - Network Security Part 5.mp4 | 74.79 MB |
Linux Fundamentals/097 - Network Security Part 6.mp4 | 82.29 MB |
Linux Fundamentals/098 - Network Security Part 7.mp4 | 87.07 MB |
Linux Fundamentals/099 - Web Services Part 1.mp4 | 78.13 MB |
Linux Fundamentals/100 - Web Services Part 2.mp4 | 74.69 MB |
Linux Fundamentals/101 - Web Services Part 3.mp4 | 66.80 MB |
Linux Fundamentals/102 - MySQL.mp4 | 65.49 MB |
Linux Fundamentals/103 - SQL Part 1.mp4 | 74.94 MB |
Linux Fundamentals/104 - SQL Part 2.mp4 | 74.10 MB |
Linux Fundamentals/105 - FTP Services Part 1.mp4 | 71.46 MB |
Linux Fundamentals/106 - FTP Services Part 2.mp4 | 72.62 MB |
Linux Fundamentals/107 - FTP Services Part 3.mp4 | 70.94 MB |
Linux Fundamentals/108 - SSH Part 1.mp4 | 81.76 MB |
Linux Fundamentals/109 - SSH Part 2.mp4 | 70.55 MB |
Linux Fundamentals/110 - Configuring E-Mail Part 1.mp4 | 81.70 MB |
Linux Fundamentals/111 - Configuring E-Mail Part 2.mp4 | 90.58 MB |
Linux Fundamentals/112 - Booting Part 1.mp4 | 76.42 MB |
Linux Fundamentals/113 - Booting Part 2.mp4 | 59.46 MB |
Linux Fundamentals/114 - Run Levels Part 1.mp4 | 92.70 MB |
Linux Fundamentals/115 - Run Levels Part 2.mp4 | 90.75 MB |
Linux Fundamentals/116 - Network Troubleshooting Part 1.mp4 | 66.48 MB |
Linux Fundamentals/117 - Network Troubleshooting Part 2.mp4 | 67.90 MB |
Linux Fundamentals/118 - Scripting Part 1.mp4 | 73.25 MB |
Linux Fundamentals/119 - Scripting Part 2.mp4 | 85.80 MB |
Linux Fundamentals/120 - Scripting Part 3.mp4 | 81.31 MB |
Linux Fundamentals/121 - Scripting Part 4.mp4 | 54.85 MB |
Linux Fundamentals/122 - Text Stream Utilities.mp4 | 36.00 MB |
Linux Fundamentals/123 - Graphical User Interfaces Part 1.mp4 | 60.72 MB |
Linux Fundamentals/124 - Graphical User Interfaces Part 2.mp4 | 61.76 MB |
Linux Fundamentals/125 - Command Line Linux Part 1.mp4 | 76.98 MB |
Linux Fundamentals/126 - Command Line Linux Part 2.mp4 | 69.98 MB |
Linux Fundamentals/127 - Command Line Linux Part 3.mp4 | 93.15 MB |
Linux Fundamentals/128 - Getting Help.mp4 | 86.77 MB |
Machine Learning for Red Team Hackers/1.2_Code Repository.txt | 93 B |
Machine Learning for Red Team Hackers/6.2_DeepfakeCrime.txt | 251 B |
Machine Learning for Red Team Hackers/001_Welcome to Machine Learning for Red Team Hackers!.mp4 | 21.31 MB |
Machine Learning for Red Team Hackers/002_Introduction to Machine Learning for Red Team Hackers.mp4 | 29.09 MB |
Machine Learning for Red Team Hackers/004_CAPTCHA Breaking.mp4 | 1.98 MB |
Machine Learning for Red Team Hackers/005_Reconnaissance.mp4 | 16.08 MB |
Machine Learning for Red Team Hackers/006_Constructing a Dataset.mp4 | 29.57 MB |
Machine Learning for Red Team Hackers/007_Preprocessing the Dataset.mp4 | 54.48 MB |
Machine Learning for Red Team Hackers/008_Training a Deep Neural Network.mp4 | 31.76 MB |
Machine Learning for Red Team Hackers/009_Building a CAPTCHA Breaking Bot.mp4 | 17.18 MB |
Machine Learning for Red Team Hackers/011_What is Fuzzing.mp4 | 4.89 MB |
Machine Learning for Red Team Hackers/012_Basic Fuzzing and Code Coverage.mp4 | 23.86 MB |
Machine Learning for Red Team Hackers/013_Mutation.mp4 | 27.07 MB |
Machine Learning for Red Team Hackers/014_How to Write Your Own Evolutionary Fuzzer.mp4 | 56.76 MB |
Machine Learning for Red Team Hackers/015_Fuzzing with AFL.mp4 | 23.98 MB |
Machine Learning for Red Team Hackers/016_Assignment FuzzMe video.mp4 | 1.42 MB |
Machine Learning for Red Team Hackers/018_Evading Machine Learning Malware Classifiers Overview.mp4 | 5.97 MB |
Machine Learning for Red Team Hackers/019_Meet a Machine Learning Classifier.mp4 | 21.86 MB |
Machine Learning for Red Team Hackers/020_Modifying PE Files the Easy Way.mp4 | 5.72 MB |
Machine Learning for Red Team Hackers/021_Evading a Machine Learning Malware Classifier.mp4 | 23.11 MB |
Machine Learning for Red Team Hackers/022_Assignment EvadeMe video.mp4 | 2.34 MB |
Machine Learning for Red Team Hackers/024_Adversarial Machine Learning.mp4 | 13.19 MB |
Machine Learning for Red Team Hackers/025_White-Box Attacks on Machine Learning.mp4 | 21.87 MB |
Machine Learning for Red Team Hackers/026_Getting Started with Clarif.AI.mp4 | 22.12 MB |
Machine Learning for Red Team Hackers/027_Black-Box Attack on Clarif.AI.mp4 | 61.15 MB |
Machine Learning for Red Team Hackers/028_Assignment TrickMe video.mp4 | 7.87 MB |
Machine Learning for Red Team Hackers/030_What is Deepfake.mp4 | 10.74 MB |
Machine Learning for Red Team Hackers/032_Deepfake Dry Run.mp4 | 54.77 MB |
Machine Learning for Red Team Hackers/033_Setting Up Your Deepfake Rig.mp4 | 37.77 MB |
Machine Learning for Red Team Hackers/034_Assignment Deepfake video.mp4 | 1.63 MB |
Machine Learning for Red Team Hackers/036_Model-Stealing Attacks on Machine Learning.mp4 | 11.71 MB |
Machine Learning for Red Team Hackers/037_Machine Learning Poisoning.mp4 | 21.89 MB |
Machine Learning for Red Team Hackers/038_Backdoor Attacks on Machine Learning Assignment.mp4 | 8.77 MB |
Machine Learning for Red Team Hackers/ML Challenge #1_ CAPTCHA.docx | 6.37 KB |
Machine Learning for Red Team Hackers/ML Challenge #2_ FuzzMe.docx | 6.43 KB |
Machine Learning for Red Team Hackers/ML Challenge #3_ EvadeMe.docx | 6.43 KB |
Machine Learning for Red Team Hackers/ML Challenge #4_ TrickMe.docx | 6.51 KB |
Machine Learning for Red Team Hackers/ML Challenge #5_ DeepFake.docx | 6.29 KB |
Machine Learning for Red Team Hackers/ML Challenge #6_ Backdoor Attack.docx | 6.54 KB |
Mobile Application Pentesting/001 - Introduction.mp4 | 23.10 MB |
Mobile Application Pentesting/002 - Analyzing an iOS App.mp4 | 111.61 MB |
Mobile Application Pentesting/003 - Binary Analysis.mp4 | 90.76 MB |
Mobile Application Pentesting/004 - Setting Up the Device.mp4 | 61.03 MB |
Mobile Application Pentesting/005 - iOS App Security Measures.mp4 | 106.80 MB |
Mobile Application Pentesting/006 - Insecure Data Storage.mp4 | 26.27 MB |
Mobile Application Pentesting/007 - Runtime Manipulation.mp4 | 127.62 MB |
Mobile Application Pentesting/008 - URL Schemes.mp4 | 72.87 MB |
Mobile Application Pentesting/009 - Side Channel Data Leakage.mp4 | 39.88 MB |
Mobile Application Pentesting/010 - Analyzing Network Traffic.mp4 | 49.69 MB |
Mobile Application Pentesting/011 - Broken Cryptography.mp4 | 13.02 MB |
Mobile Application Pentesting/012 - Automated Testing.mp4 | 25.44 MB |
Mobile Application Pentesting/013 - Secure Coding Guidelines.mp4 | 28.09 MB |
Mobile Application Pentesting/014 - Setting up the VM.mp4 | 20.33 MB |
Mobile Application Pentesting/015 - Setting up the Emulator.mp4 | 40.53 MB |
Mobile Application Pentesting/016 - Reversing Android Applications.mp4 | 94.78 MB |
Mobile Application Pentesting/017 - Introduction to Drozer.mp4 | 52.25 MB |
Mobile Application Pentesting/018 - Exploiting Android Components.mp4 | 134.32 MB |
Mobile Application Pentesting/019 - Frida.mp4 | 49.61 MB |
Mobile Forensics/001 - Mobile Forensics a.mp4 | 139.30 MB |
Mobile Forensics/002 - Mobile Forensics b.mp4 | 125.77 MB |
Mobile Forensics/003 - Mobile Forensics c.mp4 | 165.76 MB |
Mobile Forensics/004 - Mobile Forensics d.mp4 | 174.36 MB |
Offensive Bash Scripting/001 - Concise History of Linux.mp4 | 98.78 MB |
Offensive Bash Scripting/002 - Virtual Box and Virtual Machines.mp4 | 6.68 MB |
Offensive Bash Scripting/003 - Downloading Virtual Box and Kali Linux.mp4 | 59.95 MB |
Offensive Bash Scripting/004 - Configure Kali Linux in Virtual Box, Part 1.mp4 | 56.95 MB |
Offensive Bash Scripting/005 - Configure Kali Linux in Virtual Box, Part 2.mp4 | 219.04 MB |
Offensive Bash Scripting/006 - New Installation.mp4 | 24.49 MB |
Offensive Bash Scripting/007 - Commands in Bash.mp4 | 5.62 MB |
Offensive Bash Scripting/008 - Basic Linux Commands.mp4 | 528.07 MB |
Offensive Bash Scripting/009 - Grep.mp4 | 272.33 MB |
Offensive Bash Scripting/010 - Symbols and Characters.mp4 | 298.09 MB |
Offensive Bash Scripting/011 - If Else Elif, Part 1.mp4 | 112.54 MB |
Offensive Bash Scripting/012 - If Else Elif, Part 2.mp4 | 164.72 MB |
Offensive Bash Scripting/013 - Elif Ladder.mp4 | 353.83 MB |
Offensive Bash Scripting/014 - For Loops, Part 1.mp4 | 81.02 MB |
Offensive Bash Scripting/015 - For Loops, Part 2.mp4 | 87.10 MB |
Offensive Bash Scripting/016 - For Loops, Part 3.mp4 | 66.57 MB |
Offensive Bash Scripting/017 - For Loops, Part 4.mp4 | 106.07 MB |
Offensive Bash Scripting/018 - While Loops.mp4 | 270.70 MB |
Offensive Bash Scripting/019 - Generating Passwords, Part 1.mp4 | 57.07 MB |
Offensive Bash Scripting/020 - Generating Passwords, Part 2.mp4 | 86.35 MB |
Offensive Bash Scripting/021 - Strings and Variables.mp4 | 404.20 MB |
Offensive Bash Scripting/022 - If Then, Part 1.mp4 | 281.11 MB |
Offensive Bash Scripting/023 - If Then, Part 2.mp4 | 146.12 MB |
Offensive Bash Scripting/024 - If Else Elif.mp4 | 435.20 MB |
Offensive Bash Scripting/025 - Introduction and Demonstration of For Loops.mp4 | 212.23 MB |
Offensive Bash Scripting/026 - For Loop Demonstration, continued.mp4 | 282.66 MB |
Offensive Bash Scripting/027 - Introduction and Demonstration of While Loops.mp4 | 376.97 MB |
Offensive Bash Scripting/028 - User and Group Management, Part 1.mp4 | 192.67 MB |
Offensive Bash Scripting/029 - User and Group Management, Part 2.mp4 | 142.77 MB |
Offensive Bash Scripting/030 - User and Group Management, Part 3.mp4 | 95.42 MB |
Offensive Bash Scripting/031 - File Permission and Process, Part 1.mp4 | 67.45 MB |
Offensive Bash Scripting/032 - File Permission and Process, Part 2.mp4 | 287.38 MB |
Offensive Bash Scripting/033 - File Permission and Process, Part 3.mp4 | 290.69 MB |
Offensive Bash Scripting/034 - VM Downloads.mp4 | 95.95 MB |
Offensive Bash Scripting/035 - Network Reconnaissance, Part 1.mp4 | 211.17 MB |
Offensive Bash Scripting/036 - Network Reconnaissance, Part 2.mp4 | 47.19 MB |
Offensive Bash Scripting/037 - Network Reconnaissance, Part 3.mp4 | 296.62 MB |
Offensive Bash Scripting/040 - Web Applications, Part 1.mp4 | 149.08 MB |
Offensive Bash Scripting/041 - Web Applications, Part 2.mp4 | 331.67 MB |
Offensive Bash Scripting/042 - Web Applications, Part 3.mp4 | 341.36 MB |
Offensive Bash Scripting/043 - Web Applications, Part 4.mp4 | 424.04 MB |
Offensive Bash Scripting/045 - Privilege Escalation.mp4 | 427.11 MB |
Offensive Bash Scripting/046 - Privilege Escalation - Git.mp4 | 33.84 MB |
Offensive Bash Scripting/049 - Project Walkthrough.mp4 | 631.09 MB |
Offensive Bash Scripting/053 - Project Hints.mp4 | 94.80 MB |
Offensive Bash Scripting/Challenge Questions Kioptrix2.pdf | 41.79 KB |
Offensive Bash Scripting/Course8 Payload links.pdf | 18.48 KB |
Offensive Bash Scripting/Kioptrix2 Challenge Questions with Answers.pdf | 54.33 KB |
Offensive Bash Scripting/OBS Kioptrix Level 4.zip | 298.48 MB |
Offensive Bash Scripting/OBS Kioptrix Level 01.zip | 243.96 MB |
Offensive Bash Scripting/OBS Project KioptrixLevel2.zip | 539.49 MB |
Offensive Bash Scripting/OBS VulnhubVMlinks.pdf | 25.81 KB |
Offensive Bash Scripting/OBS Windows10 link.pdf | 16.38 KB |
Offensive Bash Scripting/Offensive Bash Kioptrix2 Resources.pdf | 37.62 KB |
OWASP Top Ten/001 - Welcome to the OWASP Top Ten Path!.mp4 | 29.75 MB |
OWASP Top Ten/002 - Risk One - Injection.mp4 | 60.84 MB |
OWASP Top Ten/003 - Injection Demo.mp4 | 7.93 MB |
OWASP Top Ten/004 - Risk Two - Broken Authentication.mp4 | 82.88 MB |
OWASP Top Ten/005 - Risk Three - Sensitive Data Exposure.mp4 | 81.74 MB |
OWASP Top Ten/006 - Risk Four - XXE.mp4 | 68.78 MB |
OWASP Top Ten/007 - Risk Five - Broken Access Control.mp4 | 63.00 MB |
OWASP Top Ten/008 - Risk Six - Security Misconfiguration.mp4 | 68.57 MB |
OWASP Top Ten/009 - Risk Seven - XSS.mp4 | 72.32 MB |
OWASP Top Ten/010 - Risk Eight - Insecure Deserialization.mp4 | 53.12 MB |
OWASP Top Ten/011 - Risk Nine - Using Components with Known Vulnerabilities.mp4 | 60.03 MB |
OWASP Top Ten/012 - Risk Ten - Insufficient Logging and Monitoring.mp4 | 49.74 MB |
OWASP Top Ten/013 - OWASP Top Ten - Scenarios.mp4 | 17.08 MB |
OWASP Top Ten/015 - Lab 1 Local File Inclusion (LFI) walkthrough.mp4 | 204.94 MB |
OWASP Top Ten/016 - Lab 2 Secure Coding walkthrough.mp4 | 394.70 MB |
OWASP Top Ten/017 - Lab 3 Web Application Firewall (WAF) walkthrough.mp4 | 234.53 MB |
OWASP Top Ten/IS Skills Purple Team Web App Security Project Solutions.pdf | 192.75 KB |
OWASP Top Ten/Purple Team Web Application Security Project Files.zip | 5.14 GB |
PMI Project Management Professional (PMP)/001 - Project Management Overview Part 1.mp4 | 200.54 MB |
PMI Project Management Professional (PMP)/002 - Project Management Overview Part 2.mp4 | 206.09 MB |
PMI Project Management Professional (PMP)/003 - Project Management Overview Part 3.mp4 | 265.72 MB |
PMI Project Management Professional (PMP)/004 - Project Management Overview Part 4.mp4 | 73.27 MB |
PMI Project Management Professional (PMP)/005 - Role of the Project Manager.mp4 | 69.50 MB |
PMI Project Management Professional (PMP)/006 - Initiating Process Group.mp4 | 21.10 MB |
PMI Project Management Professional (PMP)/007 - Develop Project Charter.mp4 | 122.42 MB |
PMI Project Management Professional (PMP)/008 - Identify Stakeholders.mp4 | 105.21 MB |
PMI Project Management Professional (PMP)/009 - Planning Process Group.mp4 | 18.63 MB |
PMI Project Management Professional (PMP)/010 - Develop Project Management Plan.mp4 | 79.73 MB |
PMI Project Management Professional (PMP)/011 - Plan Scope Management.mp4 | 65.98 MB |
PMI Project Management Professional (PMP)/012 - Collect Requirements.mp4 | 149.21 MB |
PMI Project Management Professional (PMP)/013 - Define Scope.mp4 | 64.57 MB |
PMI Project Management Professional (PMP)/014 - Create WBS.mp4 | 103.47 MB |
PMI Project Management Professional (PMP)/015 - Plan Schedule Management.mp4 | 55.54 MB |
PMI Project Management Professional (PMP)/016 - Define Activities.mp4 | 48.93 MB |
PMI Project Management Professional (PMP)/017 - Sequence Activities.mp4 | 125.48 MB |
PMI Project Management Professional (PMP)/018 - Estimate Activity Durations.mp4 | 153.77 MB |
PMI Project Management Professional (PMP)/019 - Develop Schedule Part 1.mp4 | 196.58 MB |
PMI Project Management Professional (PMP)/020 - Develop Schedule Part 2.mp4 | 125.16 MB |
PMI Project Management Professional (PMP)/021 - Plan Cost Management.mp4 | 63.36 MB |
PMI Project Management Professional (PMP)/022 - Estimate Costs.mp4 | 116.81 MB |
PMI Project Management Professional (PMP)/023 - Determine Budget.mp4 | 98.99 MB |
PMI Project Management Professional (PMP)/024 - Plan Quality Management.mp4 | 124.49 MB |
PMI Project Management Professional (PMP)/025 - Plan Resource Management.mp4 | 73.41 MB |
PMI Project Management Professional (PMP)/026 - Estimate Activity Resources.mp4 | 80.11 MB |
PMI Project Management Professional (PMP)/027 - Plan Communications Management.mp4 | 125.73 MB |
PMI Project Management Professional (PMP)/028 - Plan Risk Management.mp4 | 141.01 MB |
PMI Project Management Professional (PMP)/029 - Plan Stakeholder Engagement.mp4 | 52.51 MB |
PMI Project Management Professional (PMP)/030 - Identify Risks.mp4 | 94.85 MB |
PMI Project Management Professional (PMP)/031 - Perform Qualitative Risk Analysis.mp4 | 71.21 MB |
PMI Project Management Professional (PMP)/032 - Perform Quantitative Risk Analysis.mp4 | 145.14 MB |
PMI Project Management Professional (PMP)/033 - Plan Risk Responses.mp4 | 89.23 MB |
PMI Project Management Professional (PMP)/034 - Plan Procurement Management.mp4 | 184.41 MB |
PMI Project Management Professional (PMP)/035 - Planning Processes Summary.mp4 | 68.79 MB |
PMI Project Management Professional (PMP)/036 - Executing Process Group.mp4 | 20.46 MB |
PMI Project Management Professional (PMP)/037 - Direct and Manage Project Work.mp4 | 78.63 MB |
PMI Project Management Professional (PMP)/038 - Manage Project Knowledge.mp4 | 90.86 MB |
PMI Project Management Professional (PMP)/039 - Manage Quality.mp4 | 89.13 MB |
PMI Project Management Professional (PMP)/040 - Acquire Resources.mp4 | 55.47 MB |
PMI Project Management Professional (PMP)/041 - Develop Team.mp4 | 84.36 MB |
PMI Project Management Professional (PMP)/042 - Manage Team.mp4 | 33.03 MB |
PMI Project Management Professional (PMP)/043 - Manage Communications.mp4 | 43.67 MB |
PMI Project Management Professional (PMP)/044 - Implement Risk Responses.mp4 | 25.62 MB |
PMI Project Management Professional (PMP)/045 - Conduct Procurements.mp4 | 48.29 MB |
PMI Project Management Professional (PMP)/046 - Manage Stakeholder Engagement.mp4 | 56.70 MB |
PMI Project Management Professional (PMP)/047 - Monitoring and Controlling Process Group.mp4 | 15.68 MB |
PMI Project Management Professional (PMP)/048 - Monitor and Control Project Work.mp4 | 55.08 MB |
PMI Project Management Professional (PMP)/049 - Perform integrated Change Control.mp4 | 79.74 MB |
PMI Project Management Professional (PMP)/050 - Validate Scope.mp4 | 46.08 MB |
PMI Project Management Professional (PMP)/051 - Control Scope.mp4 | 31.94 MB |
PMI Project Management Professional (PMP)/052 - Control Schedule.mp4 | 83.09 MB |
PMI Project Management Professional (PMP)/053 - Control Costs.mp4 | 230.40 MB |
PMI Project Management Professional (PMP)/054 - Control Quality.mp4 | 96.53 MB |
PMI Project Management Professional (PMP)/055 - Control Resources.mp4 | 36.05 MB |
PMI Project Management Professional (PMP)/056 - Monitor Communications.mp4 | 38.61 MB |
PMI Project Management Professional (PMP)/057 - Control Procurements.mp4 | 56.88 MB |
PMI Project Management Professional (PMP)/058 - Monitor Risks.mp4 | 42.11 MB |
PMI Project Management Professional (PMP)/059 - Monitor Stakeholder Engagement.mp4 | 44.70 MB |
PMI Project Management Professional (PMP)/060 - Close Project or Phase.mp4 | 64.26 MB |
PMI Project Management Professional (PMP)/061 - Ethics.mp4 | 50.31 MB |
PMI Project Management Professional (PMP)/062 - Preparing for the Exam.mp4 | 97.44 MB |
PMI Project Management Professional (PMP)/063 - Application Process.mp4 | 80.19 MB |
Securing LinuxUNIX/001 - Introduction to Linux Users.mp4 | 14.60 MB |
Securing LinuxUNIX/002 - Setting FileGroup Permissions.mp4 | 16.31 MB |
Securing LinuxUNIX/003 - Special File Permissions and using 'sticky bit'.mp4 | 12.51 MB |
Securing LinuxUNIX/004 - Special File Permissions and using SUID GUID.mp4 | 24.36 MB |
Securing LinuxUNIX/005 - Special File Permissions and using Sudo.mp4 | 20.91 MB |
Securing LinuxUNIX/006 - What is ssh and why is it so important to Linux.mp4 | 27.05 MB |
Securing LinuxUNIX/007 - SSH is great, but how do we make it more secure.mp4 | 42.41 MB |
Securing LinuxUNIX/008 - TCP Wrappers.mp4 | 20.01 MB |
Securing LinuxUNIX/009 - Hiding your SSH (or other daemons) with knockd.mp4 | 25.09 MB |
Securing LinuxUNIX/010 - Linux Ports, Daemons and port scanning.mp4 | 10.63 MB |
Securing LinuxUNIX/011 - More about ports on Linux.mp4 | 24.92 MB |
Securing LinuxUNIX/012 - What is SSL and what is it good for.mp4 | 11.59 MB |
Securing LinuxUNIX/013 - Demo of HTTP vs. HTTPS.mp4 | 10.01 MB |
Securing LinuxUNIX/014 - TLS certs from Let’s Encrypt.mp4 | 23.77 MB |
Securing LinuxUNIX/015 - TLS self-signed cert.mp4 | 12.35 MB |
Securing LinuxUNIX/016 - Firewalls for Linux (Layer 3).mp4 | 16.74 MB |
Securing LinuxUNIX/017 - WAF Firewall (Layer 7).mp4 | 16.49 MB |
Securing LinuxUNIX/018 - Demo of Modescurity.mp4 | 16.03 MB |
Securing LinuxUNIX/019 - Host IDS with OSSEC.mp4 | 12.13 MB |
Securing LinuxUNIX/020 - Demo of OSSEC.mp4 | 18.73 MB |
Securing LinuxUNIX/021 - Host IPS with Fail2Ban.mp4 | 15.06 MB |
Securing LinuxUNIX/022 - Demo of Fail2Ban.mp4 | 15.31 MB |
Securing LinuxUNIX/023 - What is PGPGPG and what is it good for.mp4 | 15.51 MB |
Securing LinuxUNIX/024 - Demo of GPG.mp4 | 24.07 MB |
Securing LinuxUNIX/025 - What is SELinux and what does it do.mp4 | 21.09 MB |
Securing LinuxUNIX/026 - Demo of SELinux.mp4 | 48.12 MB |
Securing LinuxUNIX/027 - Using SCAP and STIGs on Linux.mp4 | 10.40 MB |
Securing LinuxUNIX/028 - Demo of the STIG viewer on Linux.mp4 | 12.13 MB |
Securing LinuxUNIX/029 - Demo of the scap-workbench on Linux.mp4 | 16.42 MB |
Security Engineering/001 - Security Models Part 1.mp4 | 67.94 MB |
Security Engineering/002 - Security Models Part 2.mp4 | 84.49 MB |
Security Engineering/003 - Security Models Part 3.mp4 | 70.57 MB |
Security Engineering/004_Security Modes.mp4 | 30.90 MB |
Security Engineering/005 - Evaluation Models.mp4 | 52.42 MB |
Security Engineering/006 - Rainbow Series.mp4 | 27.31 MB |
Security Engineering/007 - Common Criteria.mp4 | 54.94 MB |
Security Engineering/008 - Certification and Accreditation.mp4 | 29.89 MB |
Security Engineering/009 - Firewalls.mp4 | 74.75 MB |
Security Engineering/010 - DMZ.mp4 | 80.99 MB |
Security Engineering/011 - Honeypots.mp4 | 42.44 MB |
Security Engineering/012 - Endpoint Security.mp4 | 24.66 MB |
Security Engineering/013 - IDS.mp4 | 67.72 MB |
Security Engineering/014 - Authentication Protocols.mp4 | 29.86 MB |
Security Engineering/015 - VPN and VLAN.mp4 | 61.47 MB |
Security Engineering/017 - Distributed and Cloud Computing.mp4 | 60.19 MB |
Security Engineering/018 - Virtualization.mp4 | 76.57 MB |
Security Engineering/019 - Virtualized Networks.mp4 | 52.07 MB |
Security Engineering/020 - Wireless Networks.mp4 | 105.04 MB |
Security Engineering/021 - Mobile Systems.mp4 | 92.38 MB |
Security Engineering/022 - WAN Technologies.mp4 | 74.67 MB |
Security Engineering/023 - Remote Access.mp4 | 61.03 MB |
Security Engineering/024 - Secure Communication Protocols.mp4 | 81.76 MB |
Security Engineering/025 - TCB.mp4 | 17.68 MB |
Security Engineering/026 - Computer Components.mp4 | 62.16 MB |
Security Engineering/027 - Protection Mechanisms.mp4 | 67.60 MB |
Security Engineering/028 - Common Architecture Flaws.mp4 | 86.93 MB |
Security Engineering/029 - Web-Based Vulnerabilities.mp4 | 69.51 MB |
Security Engineering/030 - Covert Channels.mp4 | 48.60 MB |
Security Engineering/031 - Embedded Systems.mp4 | 47.89 MB |
Security Engineering/032 - Facility Design.mp4 | 63.75 MB |
Security Engineering/033 - Facility Construction.mp4 | 36.23 MB |
Security Engineering/034 - Perimeter Defenses.mp4 | 100.98 MB |
Security Engineering/035 - Doors and Locks.mp4 | 70.68 MB |
Security Engineering/036 - Internal Facilities Security.mp4 | 117.72 MB |
Security Engineering/037 - Physical Intrusion Detection.mp4 | 107.72 MB |
Security Engineering/038 - Personnel Safety.mp4 | 33.40 MB |
Security Engineering/039 - Media Storage.mp4 | 33.24 MB |
Security Engineering/040 - Utilities and HVAC.mp4 | 95.57 MB |
Security Engineering/041 - Fire Safety.mp4 | 86.40 MB |
Security Engineering/042 - Change Control.mp4 | 58.50 MB |
Security Engineering/043 - Software Testing.mp4 | 94.80 MB |
Security Engineering/044 - Software Environment.mp4 | 87.22 MB |
Security Engineering/045 - Object-Oriented Programming (OOP).mp4 | 45.58 MB |
Security Engineering/046 - Distributed Computing.mp4 | 38.25 MB |
Security Engineering/047 - Mobile Code.mp4 | 48.24 MB |
Security Engineering/048 - Acquired Software.mp4 | 34.24 MB |
Security Engineering/049 - Application Attacks.mp4 | 80.68 MB |
Security Engineering/050 - Malware.mp4 | 44.80 MB |
Security Engineering/051 - Recovery Strategy.mp4 | 100.81 MB |
Security Engineering/052 - Recovery Process.mp4 | 129.30 MB |
Security Engineering/053 - Disaster Recovery Plan (DRP) Testing.mp4 | 49.52 MB |
Security Engineering/054 - RAID.mp4 | 42.68 MB |
Security Engineering/055 - Backups.mp4 | 75.91 MB |
Security Engineering/056 - Network Redundancy.mp4 | 48.99 MB |
Security Engineering/057 - Incident Response Plan.mp4 | 83.99 MB |
Security Engineering/058 - Business Impact Analysis (BIA).mp4 | 83.10 MB |
Security Engineering/059 - Network Security Device Types.mp4 | 37.99 MB |
Security Engineering/060 - Network Security Component Management.mp4 | 86.19 MB |
Security Engineering/061 - Analyze Network-Enabled Devices.mp4 | 97.22 MB |
Security Engineering/062 - Analyze Advanced Network Design.mp4 | 77.26 MB |
Security Engineering/063 - Network Security Control Topics.mp4 | 73.69 MB |
Security Engineering/064 - Configure Controls for Network Security.mp4 | 61.67 MB |
Security Engineering/065 - Select Host Hardware and Software.mp4 | 74.80 MB |
Security Engineering/066 - Harden Hosts.mp4 | 71.76 MB |
Security Engineering/067 - Protect Boot Loaders.mp4 | 27.33 MB |
Security Engineering/068 - Storage Types.mp4 | 70.15 MB |
Security Engineering/069 - Storage Protocols.mp4 | 83.68 MB |
Security Engineering/070 - Implement Secure Storage Controls.mp4 | 73.76 MB |
Security Engineering/071 - Identify General Application Vulnerabilities.mp4 | 86.90 MB |
Security Engineering/072 - Identify Web Application Vulnerabilities.mp4 | 106.55 MB |
Security Engineering/073 - Application Security Design.mp4 | 42.71 MB |
Security Engineering/074 - Implement Application Security Controls.mp4 | 123.91 MB |
Security Engineering/075 - General Security Principles.mp4 | 44.37 MB |
Security Engineering/076 - Risk Management Principles.mp4 | 15.17 MB |
Security Engineering/077 - System Resilience Principles.mp4 | 21.04 MB |
Security Engineering/078 - Vulnerability Management Principles.mp4 | 25.64 MB |
Security Engineering/079 - Risk Management Process.mp4 | 72.05 MB |
Security Engineering/080 - Operational Risk Management.mp4 | 57.86 MB |
Security Engineering/081 - Stakeholder Requirements Definition.mp4 | 29.75 MB |
Security Engineering/082 - Requirements Analysis.mp4 | 13.48 MB |
Security Engineering/083 - System Security Architecture and Design.mp4 | 23.70 MB |
Security Engineering/084 - Implementation, Integration, and Deployment of Systems or System Modifications.mp4 | 11.70 MB |
Security Engineering/085 - Verification and Validation of Systems or System Modifications.mp4 | 20.95 MB |
Security Engineering/086 - Secure Operations.mp4 | 57.13 MB |
Security Engineering/087 - Secure Maintenance.mp4 | 25.75 MB |
Security Engineering/088 - Secure Disposal.mp4 | 15.05 MB |
Security Engineering/089 - Acquisition Process.mp4 | 32.52 MB |
Security Engineering/090 - System Development Methodologies.mp4 | 7.72 MB |
Security Engineering/091 - Technical Management Processes.mp4 | 64.92 MB |
Security Engineering/IPSec VPN.pdf | 78.69 KB |
SIEM Architecture and Process/001 - Welcome to SIEM Architecture and Process.mp4 | 13.65 MB |
SIEM Architecture and Process/002 - Introduction to SIEM.mp4 | 33.24 MB |
SIEM Architecture and Process/003 - The Adoption of SIEM.mp4 | 23.77 MB |
SIEM Architecture and Process/004 - SIEM Technologies.mp4 | 31.25 MB |
SIEM Architecture and Process/005 - Questions and Answers.mp4 | 16.16 MB |
SIEM Architecture and Process/006 - Installing SIEM.mp4 | 20.58 MB |
SIEM Architecture and Process/007 - SIEM Architecture.mp4 | 51.50 MB |
SIEM Architecture and Process/008 - Navigating SIEM.mp4 | 52.95 MB |
SIEM Architecture and Process/009 - Data Collection.mp4 | 28.71 MB |
SIEM Architecture and Process/010 - My First Log.mp4 | 52.25 MB |
SIEM Architecture and Process/011 - Data Processing.mp4 | 31.52 MB |
SIEM Architecture and Process/012 - Data Processing - Hands On.mp4 | 55.48 MB |
SIEM Architecture and Process/013 - Data Enrichment.mp4 | 20.46 MB |
SIEM Architecture and Process/014 - Data Enrichment - Real Example.mp4 | 37.67 MB |
SIEM Architecture and Process/015 - Data Indexing.mp4 | 27.59 MB |
SIEM Architecture and Process/016 - Use Cases.mp4 | 27.26 MB |
SIEM Architecture and Process/017 - Searching for Data.mp4 | 47.93 MB |
SIEM Architecture and Process/018 - Building Dashboards.mp4 | 22.76 MB |
SIEM Architecture and Process/019 - Filtering Noise.mp4 | 32.14 MB |
SIEM Architecture and Process/020 - Creating Reports.mp4 | 17.18 MB |
SIEM Architecture and Process/021 - Alarms.mp4 | 29.17 MB |
SIEM Architecture and Process/022 - Summation.mp4 | 12.83 MB |
Web Server Protection/001 - Welcome to Web Server Protection!.mp4 | 50.41 MB |
Web Server Protection/002 - Introduction to the Web.mp4 | 15.95 MB |
Web Server Protection/003 - Client-Server Model.mp4 | 15.21 MB |
Web Server Protection/004 - Common Protocols.mp4 | 27.14 MB |
Web Server Protection/005 - TCPIP.mp4 | 24.64 MB |
Web Server Protection/006 - DNS.mp4 | 22.42 MB |
Web Server Protection/007 - HTTP.mp4 | 36.01 MB |
Web Server Protection/008 - HTTPS.mp4 | 32.11 MB |
Web Server Protection/009 - Web Servers.mp4 | 24.61 MB |
Web Server Protection/010 - The Cloud.mp4 | 21.78 MB |
Web Server Protection/011 - CDN.mp4 | 23.06 MB |
Web Server Protection/012 - Web Server Security.mp4 | 35.02 MB |
Web Server Protection/013 - Firewalls.mp4 | 15.34 MB |
Web Server Protection/014 - Load Balancers.mp4 | 19.48 MB |
Web Server Protection/015 - Web Application Firewall.mp4 | 44.37 MB |
Web Server Protection/016 - Intrusion Detection and Prevention Systems (IDPS).mp4 | 44.25 MB |
Web Server Protection/017 - File Integrity Monitoring.mp4 | 16.31 MB |
Web Server Protection/018 - Multitier Architecture.mp4 | 28.66 MB |
Web Server Protection/019 - Business Requirements.mp4 | 15.68 MB |
Web Server Protection/020 - Basic Security Controls.mp4 | 55.66 MB |
Web Server Protection/021 - Build From Scratch or Use Bundle.mp4 | 33.18 MB |
Web Server Protection/022 - Network Hardening.mp4 | 44.25 MB |
Web Server Protection/023 - Host Hardening.mp4 | 54.06 MB |
Web Server Protection/024 - Web Server Configuration Hardening.mp4 | 38.49 MB |
Web Server Protection/025 - Applications Hardening.mp4 | 19.12 MB |
Web Server Protection/026 - Whitelisting.mp4 | 27.16 MB |
Web Server Protection/027 - Logs.mp4 | 29.86 MB |
Web Server Protection/028 - Log Formats.mp4 | 10.84 MB |
Web Server Protection/029 - Using the Logs.mp4 | 21.48 MB |
Web Server Protection/030 - Apache Logs.mp4 | 29.91 MB |
Web Server Protection/031 - NGINX Logs.mp4 | 13.85 MB |
Web Server Protection/032 - IIS Logs.mp4 | 17.25 MB |
Web Server Protection/033 - ModSecurity Logs.mp4 | 32.56 MB |
Web Server Protection/034 - HAProxy Logs.mp4 | 13.22 MB |
Web Server Protection/035 - curl.mp4 | 17.54 MB |
Web Server Protection/036 - OpenSSL.mp4 | 13.88 MB |
Web Server Protection/037 - grep and egrep.mp4 | 12.93 MB |
Web Server Protection/038 - awk.mp4 | 15.09 MB |
Web Server Protection/039 - jq.mp4 | 12.07 MB |
Web Server Protection/040 - cut.mp4 | 8.36 MB |
Web Server Protection/041 - sort.mp4 | 12.54 MB |
Web Server Protection/042 - Summarizing Events.mp4 | 29.14 MB |
Web Server Protection/043 - ss and netstat.mp4 | 9.12 MB |
Web Server Protection/044 - tcpdump.mp4 | 16.33 MB |
Web Server Protection/045 - testssl.sh.mp4 | 9.01 MB |
Web Server Protection/046 - base64.mp4 | 12.76 MB |
Web Server Protection/047 - hexdump and xxd.mp4 | 7.35 MB |
Web Server Protection/048 - gzip.mp4 | 21.56 MB |
Web Server Protection/049 - CyberChef.mp4 | 14.98 MB |
Web Server Protection/050 - Web Application Firewalls for Compliance.mp4 | 18.80 MB |
Web Server Protection/051 - Web Application Firewalls for Security.mp4 | 34.78 MB |
Web Server Protection/052 - Web Application Firewalls False Positives.mp4 | 11.41 MB |
Web Server Protection/053 - ModSecurity and OWASP CRS.mp4 | 46.45 MB |
Web Server Protection/054 - ModSecurity Rules.mp4 | 60.54 MB |
Web Server Protection/055 - Virtual Patching.mp4 | 11.27 MB |
Web Server Protection/056 - Log Life Cycle.mp4 | 28.29 MB |
Web Server Protection/057 - Collecting the Logs.mp4 | 28.52 MB |
Web Server Protection/058 - Time Stamps.mp4 | 15.69 MB |
Web Server Protection/059 - Status Codes.mp4 | 22.81 MB |
Web Server Protection/060 - Profiling the Web Server.mp4 | 29.82 MB |
Web Server Protection/061 - Security Onion.mp4 | 51.36 MB |
Web Server Protection/062 - Anomaly Detection.mp4 | 39.23 MB |
Web Server Protection/063 - Alerting.mp4 | 19.77 MB |
Web Server Protection/064 - WebLabyrinth.mp4 | 29.87 MB |
Web Server Protection/065 - fail2ban.mp4 | 15.88 MB |
Web Server Protection/066 - Active Response with fail2ban.mp4 | 36.73 MB |
Windows Registry Forensics/001 - What is the registry and why it is important.mp4 | 16.89 MB |
Windows Registry Forensics/002 - Structure of the Windows Registry.mp4 | 10.09 MB |
Windows Registry Forensics/005 - Viewing the live registry with RegEdit.mp4 | 16.57 MB |
Windows Registry Forensics/006 - Software needed to examine the Registry.mp4 | 33.34 MB |
Windows Registry Forensics/007 - Locating the Registry Files within the Windows Filesystem.mp4 | 60.16 MB |
Windows Registry Forensics/008 - Locating and Interpreting Registry Values.mp4 | 71.60 MB |
Windows Registry Forensics/009 - Recent Docs.mp4 | 43.85 MB |
Windows Registry Forensics/010 - Typed URLs.mp4 | 25.89 MB |
Windows Registry Forensics/011 - UserAssist.mp4 | 151.88 MB |
Windows Registry Forensics/012 - Recent Apps.mp4 | 49.28 MB |
Windows Registry Forensics/013 - Run and Run Once.mp4 | 13.68 MB |
Windows Registry Forensics/014 - ComDIg32 Subkey.mp4 | 32.40 MB |
Windows Registry Forensics/015 - Run MRU Subkey.mp4 | 24.25 MB |
Windows Registry Forensics/016 - Typed Paths Subkey.mp4 | 22.37 MB |
Windows Registry Forensics/017 - Microsoft Office Applications and the MRU Subkey.mp4 | 18.65 MB |
Windows Registry Forensics/018 - Windows Search Function and the Wordwheel Query.mp4 | 36.13 MB |
Windows Registry Forensics/019 - SAM File Overview.mp4 | 14.00 MB |
Windows Registry Forensics/020 - Security Identifiers.mp4 | 14.05 MB |
Windows Registry Forensics/021 - User Accounts (RIDs).mp4 | 24.87 MB |
Windows Registry Forensics/022 - Password Hashes.mp4 | 7.31 MB |
Windows Registry Forensics/023 - Other Types of User Accounts.mp4 | 42.56 MB |
Windows Registry Forensics/024 - Software File Subkeys of Interest.mp4 | 77.29 MB |
Windows Registry Forensics/025 - Network List Subkey.mp4 | 28.81 MB |
Windows Registry Forensics/026 - Connected Devices.mp4 | 20.35 MB |
Windows Registry Forensics/027 - System File Subkeys of Interest.mp4 | 99.96 MB |
Windows Registry Forensics/028 - USB Device Forensics.mp4 | 56.64 MB |
Windows Registry Forensics/029 - AppCompat Cache and Background Activities Monitor.mp4 | 34.07 MB |
Windows Registry Forensics/030 - ShellBags.mp4 | 34.64 MB |
Windows Registry Forensics/031 - MuiCache and Managed By App Sub-keys.mp4 | 36.28 MB |
Windows Registry Forensics/032 - AmCache Hive File Subkeys of Interest.mp4 | 38.31 MB |
Windows Registry Forensics/033 - AmCache Parser.exe demo.mp4 | 61.93 MB |
Windows Registry Forensics/Windows Registry Forensics Class Tools.pdf | 13.85 KB |
Introduction to Applied Cryptography and Cryptanalysis/001 - Welcome to Introduction to Cryptography!.mp4 | 32.52 MB |
No trackers found |
TorrentBank
Copyright © 2024