[Infosec Institute] IT & Security Courses Collection Part 4 (2020) [En] - TorrentBank

File Name:[Infosec Institute] IT & Security Courses Collection Part 4 (2020) [En]

Create Tool:

Create Time:1970-01-01 08:00:00

File Size:73.85 GB

File Count:837

File Hash:c961b960e3136b8248fceb2e111b17dcbe29891d

Magnet Link:

Magnet Link:

Torrent File:

Windows Registry Forensics/Windows Registry Forensics VM.zip 19.77 GB
Introduction to Applied Cryptography and Cryptanalysis/002 - Course Introduction.mp4 1.57 MB
Introduction to Applied Cryptography and Cryptanalysis/003 - Introduction to Cryptography.mp4 9.82 MB
Introduction to Applied Cryptography and Cryptanalysis/004 - Classifying Cryptosystems.mp4 13.73 MB
Introduction to Applied Cryptography and Cryptanalysis/005 - Principles of Cryptography.mp4 15.96 MB
Introduction to Applied Cryptography and Cryptanalysis/006 - Mathematics of Crpytography.mp4 12.04 MB
Introduction to Applied Cryptography and Cryptanalysis/007 - Structures of Cryptography.mp4 20.38 MB
Introduction to Applied Cryptography and Cryptanalysis/008 - Fundamentals of Symmetric Cryptography.mp4 8.30 MB
Introduction to Applied Cryptography and Cryptanalysis/009 - Block Ciphers.mp4 25.40 MB
Introduction to Applied Cryptography and Cryptanalysis/010 - The Advanced Encryption Standard (AES).mp4 19.53 MB
Introduction to Applied Cryptography and Cryptanalysis/011 - Stream Ciphers.mp4 10.56 MB
Introduction to Applied Cryptography and Cryptanalysis/012 - Rivest Cipher 4 (RC4).mp4 8.66 MB
Introduction to Applied Cryptography and Cryptanalysis/013 - Introduction to Asymmetric Cryptography.mp4 22.23 MB
Introduction to Applied Cryptography and Cryptanalysis/014 - Rivest-Shamir-Adleman (RSA).mp4 9.51 MB
Introduction to Applied Cryptography and Cryptanalysis/015 - Diffie-Hellman Key Exchange.mp4 6.79 MB
Introduction to Applied Cryptography and Cryptanalysis/016 - Digital Signatures.mp4 12.28 MB
Introduction to Applied Cryptography and Cryptanalysis/017 - Elliptic Curve Cryptography.mp4 6.06 MB
Introduction to Applied Cryptography and Cryptanalysis/018 - Introduction to Hash Functions.mp4 5.45 MB
Introduction to Applied Cryptography and Cryptanalysis/019 - Collision Resistance.mp4 13.82 MB
Introduction to Applied Cryptography and Cryptanalysis/020 - The SHA Hash Family.mp4 7.17 MB
Introduction to Applied Cryptography and Cryptanalysis/021 - Introduction to PKI.mp4 21.42 MB
Introduction to Applied Cryptography and Cryptanalysis/022 - Security of the PKI Ecosystem.mp4 6.72 MB
Introduction to Applied Cryptography and Cryptanalysis/023 - Introduction to TLSSSL.mp4 13.08 MB
Introduction to Applied Cryptography and Cryptanalysis/024 - Attacking TLSSSL.mp4 31.54 MB
Introduction to Applied Cryptography and Cryptanalysis/025 - Introduction to VPNs.mp4 17.27 MB
Introduction to Applied Cryptography and Cryptanalysis/026 - VPN Limitations.mp4 11.11 MB
Introduction to Applied Cryptography and Cryptanalysis/027 - Introduction to Secure Credential Management.mp4 2.86 MB
Introduction to Applied Cryptography and Cryptanalysis/028 - Securely Managing Credentials.mp4 25.12 MB
Introduction to Applied Cryptography and Cryptanalysis/029 - Case Studies in Poor Password Management.mp4 14.78 MB
Introduction to Applied Cryptography and Cryptanalysis/030 - Introduction to Full Disk Encryption.mp4 5.74 MB
Introduction to Applied Cryptography and Cryptanalysis/031 - Attacking Full Disk Encryption.mp4 9.01 MB
Introduction to Applied Cryptography and Cryptanalysis/032 - Introduction to Blockchain.mp4 9.57 MB
Introduction to Applied Cryptography and Cryptanalysis/033 - Blockchain and Asymmetric Cryptography.mp4 8.56 MB
Introduction to Applied Cryptography and Cryptanalysis/034 - Blockchain and Hash Functions.mp4 19.40 MB
Introduction to Applied Cryptography and Cryptanalysis/035 - Introduction to Cryptanalysis.mp4 12.68 MB
Introduction to Applied Cryptography and Cryptanalysis/036 - Entropy Calculations.mp4 4.96 MB
Introduction to Applied Cryptography and Cryptanalysis/037 - Character Frequency Analysis.mp4 10.11 MB
Introduction to Applied Cryptography and Cryptanalysis/038 - Encryption vs Encoding.mp4 13.14 MB
Introduction to Applied Cryptography and Cryptanalysis/039 - Breaking ROT Ciphers.mp4 6.63 MB
Introduction to Applied Cryptography and Cryptanalysis/040 - Breaking Weak XOR Encryption.mp4 7.81 MB
Introduction to Applied Cryptography and Cryptanalysis/041 - Breaking Misused Stream Ciphers.mp4 6.50 MB
Introduction to Applied Cryptography and Cryptanalysis/042 - TLS Decryption.mp4 19.86 MB
Introduction to Applied Cryptography and Cryptanalysis/043 - Decrypting Malware Command and Control.mp4 32.28 MB
Introduction to Applied Cryptography and Cryptanalysis/044 - Decrypting Downloaded Files.mp4 23.93 MB
Introduction to SDLC/001 - Secure Software Design.mp4 83.81 MB
Introduction to SDLC/002 - Secure SDLC.mp4 66.50 MB
Introduction to SDLC/003 - Change Control.mp4 58.50 MB
Introduction to SDLC/004 - Threat Modeling.mp4 38.65 MB
Introduction to Vulnerability Management/001 - Introduction to Vulnerability Management.mp4 38.91 MB
Introduction to Vulnerability Management/002 - Setting Up Your Environment.mp4 48.83 MB
Introduction to Vulnerability Management/003 - Vulnerability Management Process.mp4 16.24 MB
Introduction to Vulnerability Management/004 - Develop a Plan.mp4 43.88 MB
Introduction to Vulnerability Management/005 - Vulnerability Analysis and Resolution.mp4 34.99 MB
Introduction to Vulnerability Management/006 - Assessing and Improving.mp4 11.72 MB
Introduction to Vulnerability Management/007 - Automated Vulnerability Scanners.mp4 27.70 MB
Introduction to Vulnerability Management/008 - OpenVAS Demonstration.mp4 29.94 MB
Introduction to Vulnerability Management/009 - Vulnerabilities.mp4 15.85 MB
Introduction to Vulnerability Management/010 - Manual Verification.mp4 67.37 MB
Introduction to Vulnerability Management/011 - Manual Verification - Metasploit.mp4 80.63 MB
Introduction to Vulnerability Management/012 - Prioritizing Vulnerabilities.mp4 24.42 MB
Introduction to Vulnerability Management/013 - Remediation.mp4 46.62 MB
Introduction to Vulnerability Management/014 - Web Application Vulnerabilities.mp4 119.12 MB
Introduction to Vulnerability Management/015 - Frameworks.mp4 82.59 MB
Introduction to Vulnerability Management/016 - Vulnerability Management Summary.mp4 134.46 MB
Introduction to x86 Disassembly/001 - Introduction to x86 Assembly What are Computer Instruction Sets (ISA).mp4 24.65 MB
Introduction to x86 Disassembly/002 - x86 History History and Origin of the x86 Instruction Set.mp4 7.42 MB
Introduction to x86 Disassembly/003 - x86 Usage How and Where x86 is Used.mp4 3.41 MB
Introduction to x86 Disassembly/004 - Assembly and Syntax What x86 Assembly Looks Like and the Syntax Used to Write It.mp4 8.74 MB
Introduction to x86 Disassembly/005 - Data Representation How Data is Represented in x86.mp4 26.64 MB
Introduction to x86 Disassembly/006 - Registers What Registers are Available on x86 and How are They Used.mp4 21.78 MB
Introduction to x86 Disassembly/007 - Memory Access How to Access Different Locations and Sizes of Memory.mp4 12.38 MB
Introduction to x86 Disassembly/008 - Addressing Modes How to Address Memory, Data and Registers.mp4 16.75 MB
Introduction to x86 Disassembly/009 - x86 Instructions Overview of the Most Common x86 Instructions.mp4 86.09 MB
Introduction to x86 Disassembly/010 - Your First x86 Program How to Build Your First x86 Program.mp4 29.48 MB
Introduction to x86 Disassembly/011 - Input and Output x86 System Calls.mp4 31.09 MB
Introduction to x86 Disassembly/012 - LAB Hello World! Creating the Usual Hello World in x86.mp4 39.64 MB
Introduction to x86 Disassembly/013 - StringsASCII How to Work with Strings and ASCII in x86.mp4 13.54 MB
Introduction to x86 Disassembly/014 - Condition Codes How x86 Handles Condition Codes Generated by the CPU and Why They Matter.mp4 44.50 MB
Introduction to x86 Disassembly/015 - Debugging Debugging Your First x86 Program with GDB.mp4 44.32 MB
Introduction to x86 Disassembly/016 - ObjDump How to Use the Tool ObjDump with x86.mp4 5.50 MB
Introduction to x86 Disassembly/017 - Segmentation Faults How to Diagnose and Locate Segmentation Faults in x86.mp4 7.38 MB
Introduction to x86 Disassembly/018 - LAB x86 Debugging Lab to Debug an x86 Program.mp4 14.30 MB
Introduction to x86 Disassembly/019 - Control Flow How to Control the Flow of a Program in x86.mp4 30.32 MB
Introduction to x86 Disassembly/020 - Logic Constructs How to Implement Common Logic Constructs such as IfElseLoops in x86.mp4 44.93 MB
Introduction to x86 Disassembly/021 - LAB Programming Lab with x86 Program with Input, Output and Logic Flows.mp4 30.73 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/001 - Introduction.mp4 193.27 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/002 - Tasks and Knowledge Statement.mp4 138.89 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/003 - Self-Assessment Questions.mp4 33.40 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/004 - Overview.mp4 12.68 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/005 - Risk Identification Frameworks.mp4 167.62 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/006 - Methods to Identify Risk.mp4 97.32 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/007 - Threats and Vulnerabilities.mp4 170.22 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/008 - Assets and Processes.mp4 147.49 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/009 - IT Risk Scenarios.mp4 122.63 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/010 - Ownership and Accountability.mp4 73.74 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/011 - Risk Capacity, Risk Appetite, Risk Tolerance and Risk Awareness.mp4 64.54 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/012 - Tasks and Knowledge Statements.mp4 61.10 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/013 - Risk Identification vs Risk Assessment.mp4 19.24 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/014 - Analyzing Risk Scenarios.mp4 144.16 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/015 - Current State of Controls.mp4 224.96 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/016 - Risk Analysis Methodologies.mp4 198.72 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/017 - Business-Related Risk, Enterprise Architecture and Data Management.mp4 111.42 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/018 - New Threats and Vulnerabilities, Emerging Technologies and Industry Trends.mp4 29.66 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/019 - Third Party Management.mp4 49.01 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/020 - Project and Program Management.mp4 48.17 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/021 - Availability and Exception Management.mp4 48.28 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/022 - Communicating IT Risk Assessment Results.mp4 66.54 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/023 - Aligning Risk Response with Business Objectives.mp4 11.51 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/024 - Choosing Risk Response Options.mp4 152.73 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/025 - Developing a Risk Action Plan.mp4 84.74 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/026 - Business Process Review.mp4 40.95 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/027 - Inherent and Residual Risk.mp4 53.31 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/028 - Control Activities, Part 1.mp4 99.97 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/029 - Control Activities, Part 2.mp4 162.00 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/030 - Emerging Technologies, Control Ownership, Procedures and Documentation.mp4 65.96 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/031 - Key Risk Indicators.mp4 133.08 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/032 - Key Performance Indicators.mp4 29.03 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/033 - Data Collection and Extraction.mp4 61.81 MB
ISACA Certified in Risk and Information Systems Control (CRISC)/034 - Changes to IT Risk Profile.mp4 108.73 MB
ISACA Certified Information Security Manager (CISM)/001 - Introduction.mp4 94.12 MB
ISACA Certified Information Security Manager (CISM)/002 - Governance Overview.mp4 42.66 MB
ISACA Certified Information Security Manager (CISM)/003 - Business Goals and Objectives.mp4 47.18 MB
ISACA Certified Information Security Manager (CISM)/005_Roles and Responsibilities.mp4 64.60 MB
ISACA Certified Information Security Manager (CISM)/006 - Risk Management and IS Roles and Responsibilities.mp4 30.99 MB
ISACA Certified Information Security Manager (CISM)/007 - Third-Party Relationships.mp4 16.55 MB
ISACA Certified Information Security Manager (CISM)/008 - Effective Metrics.mp4 87.81 MB
ISACA Certified Information Security Manager (CISM)/009 - Strategy Development.mp4 71.83 MB
ISACA Certified Information Security Manager (CISM)/010 - Strategy Goal, Objective and Desired State.mp4 129.30 MB
ISACA Certified Information Security Manager (CISM)/011 - Current State of Security.mp4 23.07 MB
ISACA Certified Information Security Manager (CISM)/012 - Strategy Elements.mp4 63.71 MB
ISACA Certified Information Security Manager (CISM)/013 - IS Resources.mp4 114.02 MB
ISACA Certified Information Security Manager (CISM)/014 - IS Constraints.mp4 68.28 MB
ISACA Certified Information Security Manager (CISM)/015 - Implementation Action Plan Development.mp4 153.32 MB
ISACA Certified Information Security Manager (CISM)/016 - IS Program Objectives.mp4 84.44 MB
ISACA Certified Information Security Manager (CISM)/017 - Risk Management Overview.mp4 39.06 MB
ISACA Certified Information Security Manager (CISM)/018 - Strategy, Communication, and Risk Awareness.mp4 38.22 MB
ISACA Certified Information Security Manager (CISM)/019 - Effective Information Risk Management.mp4 28.97 MB
ISACA Certified Information Security Manager (CISM)/020 - Risk Management Concepts.mp4 80.57 MB
ISACA Certified Information Security Manager (CISM)/021 - Implementing Risk Management.mp4 144.67 MB
ISACA Certified Information Security Manager (CISM)/022 - Risk Assessment Overview.mp4 23.80 MB
ISACA Certified Information Security Manager (CISM)/023 - Risk Assessment Methodology.mp4 332.15 MB
ISACA Certified Information Security Manager (CISM)/024 - Asset Classification Overview.mp4 37.69 MB
ISACA Certified Information Security Manager (CISM)/025 - BIA Key Metrics.mp4 62.31 MB
ISACA Certified Information Security Manager (CISM)/026 - Third Party Service Providers.mp4 42.95 MB
ISACA Certified Information Security Manager (CISM)/027 - Integration with Life Cycle Processes.mp4 22.36 MB
ISACA Certified Information Security Manager (CISM)/028 - Security Control Baselines.mp4 18.56 MB
ISACA Certified Information Security Manager (CISM)/029 - Risk Monitoring Overview.mp4 48.20 MB
ISACA Certified Information Security Manager (CISM)/030 - Training and Awareness.mp4 23.30 MB
ISACA Certified Information Security Manager (CISM)/031 - Documentation.mp4 70.44 MB
ISACA Certified Information Security Manager (CISM)/032 - IS Program Development and Management Overview.mp4 81.67 MB
ISACA Certified Information Security Manager (CISM)/033 - IS Program Elements.mp4 39.52 MB
ISACA Certified Information Security Manager (CISM)/034 - Defining IS Program Objectives.mp4 15.07 MB
ISACA Certified Information Security Manager (CISM)/035 - Technology Resources.mp4 48.55 MB
ISACA Certified Information Security Manager (CISM)/036 - Scope and Charter.mp4 31.14 MB
ISACA Certified Information Security Manager (CISM)/037 - IS Management Framework.mp4 72.07 MB
ISACA Certified Information Security Manager (CISM)/038 - IS Management Framework Components.mp4 61.83 MB
ISACA Certified Information Security Manager (CISM)/039 - Defining IS Program Road Map.mp4 28.45 MB
ISACA Certified Information Security Manager (CISM)/040 - IS Infrastructure and Architecture.mp4 45.92 MB
ISACA Certified Information Security Manager (CISM)/041 - Architecture Implementation.mp4 13.32 MB
ISACA Certified Information Security Manager (CISM)/043 - Management and Administrative Activities.mp4 195.15 MB
ISACA Certified Information Security Manager (CISM)/044 - Services and Operational Activities.mp4 233.45 MB
ISACA Certified Information Security Manager (CISM)/045 - Controls and Countermeasures.mp4 109.81 MB
ISACA Certified Information Security Manager (CISM)/046 - Metrics and Monitoring.mp4 183.70 MB
ISACA Certified Information Security Manager (CISM)/047 - Program Challenges.mp4 90.52 MB
ISACA Certified Information Security Manager (CISM)/048 - Incident Management Introduction.mp4 53.18 MB
ISACA Certified Information Security Manager (CISM)/049 - Incident Management Overview.mp4 38.48 MB
ISACA Certified Information Security Manager (CISM)/050 - Incident Response Procedures.mp4 64.84 MB
ISACA Certified Information Security Manager (CISM)/051 - Incident Management Organization.mp4 53.12 MB
ISACA Certified Information Security Manager (CISM)/052 - Incident Management Resources.mp4 103.16 MB
ISACA Certified Information Security Manager (CISM)/053 - Incident Management Objectives.mp4 33.38 MB
ISACA Certified Information Security Manager (CISM)/054 - Metrics and Indicators.mp4 30.64 MB
ISACA Certified Information Security Manager (CISM)/055 - Defining Incident Management Procedures.mp4 78.61 MB
ISACA Certified Information Security Manager (CISM)/056 - Current State of IR Capability.mp4 18.63 MB
ISACA Certified Information Security Manager (CISM)/057 - Developing an IR Plan.mp4 106.97 MB
ISACA Certified Information Security Manager (CISM)/058 - BC and DR Procedures.mp4 228.73 MB
ISACA Certified Information Security Manager (CISM)/059 - Testing IR, BC and DR Plans.mp4 97.40 MB
ISACA Certified Information Security Manager (CISM)/060 - Executing Response and Recovery Plans.mp4 19.56 MB
ISACA Certified Information Security Manager (CISM)/061 - Post-Incident Activities and Investigation.mp4 106.69 MB
ISACA Certified Information Security Manager (CISM)/CISM Supplemental Materials - IR and BC Management.pdf 116.09 KB
ISACA Certified Information Security Manager (CISM)/CISM Supplemental Materials - IS Governance.pdf 120.72 KB
ISACA Certified Information Security Manager (CISM)/CISM Supplemental Materials - Security Program Architecture.pdf 101.27 KB
ITIL 4 Foundation/001 - Introduction to ITIL 4.mp4 25.33 MB
ITIL 4 Foundation/002 - Exam Fundamentals.mp4 27.95 MB
ITIL 4 Foundation/003 - 4th Industrial Revolution.mp4 14.97 MB
ITIL 4 Foundation/004_Service Organizations.mp4 25.31 MB
ITIL 4 Foundation/006 - Service Management.mp4 12.49 MB
ITIL 4 Foundation/007 - Value.mp4 18.83 MB
ITIL 4 Foundation/008 - Organizations and People.mp4 33.69 MB
ITIL 4 Foundation/009 - Services and Products.mp4 26.06 MB
ITIL 4 Foundation/010 - Service Offerings.mp4 30.97 MB
ITIL 4 Foundation/011 - Service Relationships.mp4 23.34 MB
ITIL 4 Foundation/012 - Outcomes.mp4 46.90 MB
ITIL 4 Foundation/013 - Costs.mp4 12.72 MB
ITIL 4 Foundation/014 - Risks.mp4 27.05 MB
ITIL 4 Foundation/015 - Utility and Warranty.mp4 21.50 MB
ITIL 4 Foundation/016 - Four Dimensions of Service Management.mp4 5.34 MB
ITIL 4 Foundation/017 - Information and Technology.mp4 37.48 MB
ITIL 4 Foundation/018 - Partners and Suppliers.mp4 45.26 MB
ITIL 4 Foundation/019 - Value Streams and Processes.mp4 24.23 MB
ITIL 4 Foundation/020 - PESTLE.mp4 15.93 MB
ITIL 4 Foundation/021 - Applying the Four Dimensions.mp4 24.56 MB
ITIL 4 Foundation/022 - Service Value System.mp4 13.22 MB
ITIL 4 Foundation/023 - Opportunity, Demand and Value.mp4 25.99 MB
ITIL 4 Foundation/024 - Governance.mp4 11.14 MB
ITIL 4 Foundation/025 - Guiding Principles.mp4 16.24 MB
ITIL 4 Foundation/026 - Focus on Value.mp4 18.34 MB
ITIL 4 Foundation/027 - Start Where You Are.mp4 38.19 MB
ITIL 4 Foundation/028 - Progress Iteratively with Feedback.mp4 32.69 MB
ITIL 4 Foundation/029 - Collaborate and Promote Visibility.mp4 26.09 MB
ITIL 4 Foundation/030 - Think and Work Holistically.mp4 25.82 MB
ITIL 4 Foundation/031 - Keep It Simple and Practical.mp4 16.19 MB
ITIL 4 Foundation/032 - Optimize and Automate.mp4 27.63 MB
ITIL 4 Foundation/033 - Service Value Chain.mp4 25.10 MB
ITIL 4 Foundation/034 - Plan.mp4 20.31 MB
ITIL 4 Foundation/035 - Improve.mp4 19.36 MB
ITIL 4 Foundation/036 - Engage.mp4 39.45 MB
ITIL 4 Foundation/037 - Design and Transition.mp4 24.04 MB
ITIL 4 Foundation/038 - ObtainBuild.mp4 32.21 MB
ITIL 4 Foundation/039 - Deliver and Support.mp4 23.41 MB
ITIL 4 Foundation/040 - Value Streams.mp4 9.01 MB
ITIL 4 Foundation/041 - Continual Improvement.mp4 32.94 MB
ITIL 4 Foundation/042 - Continual Improvement Model.mp4 8.12 MB
ITIL 4 Foundation/043 - What is the Vision.mp4 13.11 MB
ITIL 4 Foundation/044 - Where are We Now.mp4 10.21 MB
ITIL 4 Foundation/045 - Where Do We Want to Be.mp4 13.91 MB
ITIL 4 Foundation/046 - How Do We Get There.mp4 6.81 MB
ITIL 4 Foundation/047 - Take Action.mp4 5.98 MB
ITIL 4 Foundation/048 - Did We Get There.mp4 6.84 MB
ITIL 4 Foundation/049 - How Do We Keep the Momentum Going.mp4 10.38 MB
ITIL 4 Foundation/050 - Continual Improvement and the Guiding Principles.mp4 17.72 MB
ITIL 4 Foundation/051 - Categories of Practices.mp4 11.52 MB
ITIL 4 Foundation/052 - Management Practices.mp4 5.85 MB
ITIL 4 Foundation/053 - Information Security Management.mp4 15.57 MB
ITIL 4 Foundation/054 - Relationship Management.mp4 8.54 MB
ITIL 4 Foundation/055 - Supplier Management.mp4 7.50 MB
ITIL 4 Foundation/056 - Architecture Management.mp4 9.76 MB
ITIL 4 Foundation/057 - Knowledge Management.mp4 9.83 MB
ITIL 4 Foundation/058 - Measurement and Reporting.mp4 6.58 MB
ITIL 4 Foundation/059 - Organizational Change Management.mp4 6.97 MB
ITIL 4 Foundation/060 - Portfolio Management.mp4 9.28 MB
ITIL 4 Foundation/061 - Project Management.mp4 8.74 MB
ITIL 4 Foundation/062 - Risk Management.mp4 9.34 MB
ITIL 4 Foundation/063 - Service Financial Management.mp4 5.79 MB
ITIL 4 Foundation/064 - Strategy Management.mp4 8.91 MB
ITIL 4 Foundation/065 - Workforce and Talent Management.mp4 7.68 MB
ITIL 4 Foundation/066 - Service Management Practices.mp4 5.20 MB
ITIL 4 Foundation/067 - Change Control.mp4 35.72 MB
ITIL 4 Foundation/068 - Incident Management.mp4 33.60 MB
ITIL 4 Foundation/069 - Problem Management.mp4 19.44 MB
ITIL 4 Foundation/070 - Service Desk.mp4 32.23 MB
ITIL 4 Foundation/071 - Service Level Management.mp4 24.40 MB
ITIL 4 Foundation/072 - Service Request Management.mp4 30.46 MB
ITIL 4 Foundation/073 - IT Asset Management.mp4 9.05 MB
ITIL 4 Foundation/074 - Monitoring and Event Management.mp4 14.91 MB
ITIL 4 Foundation/075 - Release Management.mp4 4.25 MB
ITIL 4 Foundation/076 - Service Configuration Management.mp4 8.72 MB
ITIL 4 Foundation/077 - Availability Management.mp4 7.66 MB
ITIL 4 Foundation/078 - Business Analysis.mp4 6.63 MB
ITIL 4 Foundation/079 - Capacity and Performance Management.mp4 15.32 MB
ITIL 4 Foundation/080 - Service Catalog Management.mp4 6.90 MB
ITIL 4 Foundation/081 - Service Continuity Management.mp4 10.05 MB
ITIL 4 Foundation/082 - Service Design.mp4 10.96 MB
ITIL 4 Foundation/083 - Service Validation and Testing.mp4 7.21 MB
ITIL 4 Foundation/084 - Technical Management Practices.mp4 4.82 MB
ITIL 4 Foundation/085 - Deployment Management.mp4 6.49 MB
ITIL 4 Foundation/086 - Infrastructure and Platform Management.mp4 6.72 MB
ITIL 4 Foundation/087 - Software Development and Management.mp4 4.58 MB
ITIL 4 Foundation/088 - Putting It All Together.mp4 27.48 MB
ITIL 4 Foundation/089 - Conclusion.mp4 11.92 MB
ITIL 4 Foundation/090 - ITIL Certification Path.mp4 13.27 MB
ITIL 4 Foundation/Study Guide (ITIL 4 Foundation).pdf 11.33 MB
Linux Fundamentals/001 - Backup and Restore Part 1.mp4 63.25 MB
Linux Fundamentals/002 - Backup and Restore Part 2.mp4 55.14 MB
Linux Fundamentals/003 - Tape Archive Files.mp4 78.42 MB
Linux Fundamentals/004 - Scheduling Tasks.mp4 73.58 MB
Linux Fundamentals/005 - Cron Command Part 1.mp4 65.84 MB
Linux Fundamentals/006 - Cron Command Part 2.mp4 49.45 MB
Linux Fundamentals/007 - Performance Monitoring Part 1.mp4 47.54 MB
Linux Fundamentals/008 - Performance Monitoring Part 2.mp4 52.47 MB
Linux Fundamentals/009 - System Monitoring.mp4 50.86 MB
Linux Fundamentals/010 - Logging and Text File Commands Part 1.mp4 72.46 MB
Linux Fundamentals/011 - Logging and Text File Commands Part 2.mp4 42.87 MB
Linux Fundamentals/012 - Text Manipulation Part 1.mp4 105.32 MB
Linux Fundamentals/013 - Text Manipulation Part 2.mp4 81.81 MB
Linux Fundamentals/014 - Text Manipulation Part 3.mp4 61.04 MB
Linux Fundamentals/015 - Linux Overview Part 1.mp4 56.32 MB
Linux Fundamentals/016 - Linux Overview Part 2.mp4 58.36 MB
Linux Fundamentals/017 - Installing Linux.mp4 59.41 MB
Linux Fundamentals/018 - Directory Organization Part 1.mp4 46.54 MB
Linux Fundamentals/019 - Directory Organization Part 2.mp4 56.21 MB
Linux Fundamentals/020 - File Management.mp4 102.05 MB
Linux Fundamentals/021 - VI Editor.mp4 77.46 MB
Linux Fundamentals/022 - Links Part 1.mp4 61.26 MB
Linux Fundamentals/023 - Links Part 2.mp4 73.30 MB
Linux Fundamentals/024 - File Information Part 1.mp4 73.31 MB
Linux Fundamentals/025 - File Information Part 2.mp4 51.76 MB
Linux Fundamentals/026 - Locating Files.mp4 77.32 MB
Linux Fundamentals/027 - Removable Storage Part 1.mp4 65.03 MB
Linux Fundamentals/028 - Removable Storage Part 2.mp4 95.69 MB
Linux Fundamentals/029 - Users and Groups.mp4 72.95 MB
Linux Fundamentals/030 - Privilege Escalation.mp4 57.57 MB
Linux Fundamentals/031 - User Accounts Part 1.mp4 53.89 MB
Linux Fundamentals/032 - User Accounts Part 2.mp4 69.26 MB
Linux Fundamentals/033 - Modifying Users.mp4 83.84 MB
Linux Fundamentals/034 - Creating, Modifying, and Deleting Groups.mp4 48.89 MB
Linux Fundamentals/035 - Deleting and Disabling Accounts.mp4 42.73 MB
Linux Fundamentals/036 - File Ownership Part 1.mp4 91.09 MB
Linux Fundamentals/037 - File Ownership Part 2.mp4 94.77 MB
Linux Fundamentals/038 - File Ownership Part 3.mp4 108.82 MB
Linux Fundamentals/039 - Shell Configuration Part 1.mp4 77.78 MB
Linux Fundamentals/040 - Shell Configuration Part 2.mp4 70.79 MB
Linux Fundamentals/041 - Shell Configuration Part 3.mp4 84.01 MB
Linux Fundamentals/042 - GUI Configuration Part 1.mp4 84.55 MB
Linux Fundamentals/043 - GUI Configuration Part 2.mp4 81.29 MB
Linux Fundamentals/044 - GUI Configuration Part 3.mp4 72.18 MB
Linux Fundamentals/045 - Graphics Information.mp4 89.01 MB
Linux Fundamentals/046 - Package Management Part 1.mp4 81.36 MB
Linux Fundamentals/047 - Package Management Part 2.mp4 74.94 MB
Linux Fundamentals/048 - Package Management Part 3.mp4 61.57 MB
Linux Fundamentals/049 - Package Management Part 4.mp4 42.11 MB
Linux Fundamentals/050 - Managing Libraries Part 1.mp4 79.44 MB
Linux Fundamentals/051 - Managing Libraries Part 2.mp4 66.45 MB
Linux Fundamentals/052 - Disk Management Part 1.mp4 95.93 MB
Linux Fundamentals/053 - Disk Management Part 2.mp4 69.60 MB
Linux Fundamentals/054 - Disk Management Part 3.mp4 80.91 MB
Linux Fundamentals/055 - Mounting File Systems Part 1.mp4 88.86 MB
Linux Fundamentals/056 - Mounting File Systems Part 2.mp4 73.08 MB
Linux Fundamentals/057 - Virtual File Systems.mp4 31.37 MB
Linux Fundamentals/058 - Disk Usage.mp4 107.75 MB
Linux Fundamentals/059 - Disk Quotas.mp4 97.23 MB
Linux Fundamentals/060 - Devices.mp4 95.78 MB
Linux Fundamentals/061 - Processes Part 1.mp4 62.35 MB
Linux Fundamentals/062 - Processes Part 2.mp4 68.97 MB
Linux Fundamentals/063 - Processes Part 3.mp4 80.21 MB
Linux Fundamentals/064 - Processes Priority and Execution Part 1.mp4 59.26 MB
Linux Fundamentals/065 - Processes Priority and Execution Part 2.mp4 63.59 MB
Linux Fundamentals/066 - Kernels Part 1.mp4 94.66 MB
Linux Fundamentals/067 - Kernels Part 2.mp4 91.16 MB
Linux Fundamentals/068 - Networks Part 1.mp4 43.19 MB
Linux Fundamentals/069 - Networks Part 2.mp4 67.86 MB
Linux Fundamentals/070 - Addressing Part 1.mp4 70.33 MB
Linux Fundamentals/071 - Addressing Part 2.mp4 61.36 MB
Linux Fundamentals/072 - Addressing Part 3.mp4 63.57 MB
Linux Fundamentals/073 - Character Based Names.mp4 80.89 MB
Linux Fundamentals/074 - Networking Services Part 1.mp4 74.80 MB
Linux Fundamentals/075 - Networking Services Part 2.mp4 84.25 MB
Linux Fundamentals/076 - Networking Services Part 3.mp4 95.22 MB
Linux Fundamentals/077 - Time Zones Part 1.mp4 74.56 MB
Linux Fundamentals/078 - Time Zones Part 2.mp4 56.35 MB
Linux Fundamentals/079 - Domain Name Services Part 1.mp4 64.63 MB
Linux Fundamentals/080 - Domain Name Services Part 2.mp4 78.14 MB
Linux Fundamentals/081 - Domain Name Services Part 3.mp4 88.89 MB
Linux Fundamentals/082 - Domain Name Services Part 4.mp4 50.70 MB
Linux Fundamentals/083 - Network File Resources Part 1.mp4 71.80 MB
Linux Fundamentals/084 - Network File Resources Part 2.mp4 68.07 MB
Linux Fundamentals/085 - Managing NFS.mp4 56.57 MB
Linux Fundamentals/086 - Printing.mp4 69.40 MB
Linux Fundamentals/087 - Accessibility.mp4 69.14 MB
Linux Fundamentals/088 - Localization Part 1.mp4 84.87 MB
Linux Fundamentals/089 - Localization Part 2.mp4 79.63 MB
Linux Fundamentals/090 - System Security Part 1.mp4 83.09 MB
Linux Fundamentals/091 - System Security Part 2.mp4 72.51 MB
Linux Fundamentals/092 - Network Security Part 1.mp4 75.77 MB
Linux Fundamentals/093 - Network Security Part 2.mp4 93.18 MB
Linux Fundamentals/094 - Network Security Part 3.mp4 57.40 MB
Linux Fundamentals/095 - Network Security Part 4.mp4 77.26 MB
Linux Fundamentals/096 - Network Security Part 5.mp4 74.79 MB
Linux Fundamentals/097 - Network Security Part 6.mp4 82.29 MB
Linux Fundamentals/098 - Network Security Part 7.mp4 87.07 MB
Linux Fundamentals/099 - Web Services Part 1.mp4 78.13 MB
Linux Fundamentals/100 - Web Services Part 2.mp4 74.69 MB
Linux Fundamentals/101 - Web Services Part 3.mp4 66.80 MB
Linux Fundamentals/102 - MySQL.mp4 65.49 MB
Linux Fundamentals/103 - SQL Part 1.mp4 74.94 MB
Linux Fundamentals/104 - SQL Part 2.mp4 74.10 MB
Linux Fundamentals/105 - FTP Services Part 1.mp4 71.46 MB
Linux Fundamentals/106 - FTP Services Part 2.mp4 72.62 MB
Linux Fundamentals/107 - FTP Services Part 3.mp4 70.94 MB
Linux Fundamentals/108 - SSH Part 1.mp4 81.76 MB
Linux Fundamentals/109 - SSH Part 2.mp4 70.55 MB
Linux Fundamentals/110 - Configuring E-Mail Part 1.mp4 81.70 MB
Linux Fundamentals/111 - Configuring E-Mail Part 2.mp4 90.58 MB
Linux Fundamentals/112 - Booting Part 1.mp4 76.42 MB
Linux Fundamentals/113 - Booting Part 2.mp4 59.46 MB
Linux Fundamentals/114 - Run Levels Part 1.mp4 92.70 MB
Linux Fundamentals/115 - Run Levels Part 2.mp4 90.75 MB
Linux Fundamentals/116 - Network Troubleshooting Part 1.mp4 66.48 MB
Linux Fundamentals/117 - Network Troubleshooting Part 2.mp4 67.90 MB
Linux Fundamentals/118 - Scripting Part 1.mp4 73.25 MB
Linux Fundamentals/119 - Scripting Part 2.mp4 85.80 MB
Linux Fundamentals/120 - Scripting Part 3.mp4 81.31 MB
Linux Fundamentals/121 - Scripting Part 4.mp4 54.85 MB
Linux Fundamentals/122 - Text Stream Utilities.mp4 36.00 MB
Linux Fundamentals/123 - Graphical User Interfaces Part 1.mp4 60.72 MB
Linux Fundamentals/124 - Graphical User Interfaces Part 2.mp4 61.76 MB
Linux Fundamentals/125 - Command Line Linux Part 1.mp4 76.98 MB
Linux Fundamentals/126 - Command Line Linux Part 2.mp4 69.98 MB
Linux Fundamentals/127 - Command Line Linux Part 3.mp4 93.15 MB
Linux Fundamentals/128 - Getting Help.mp4 86.77 MB
Machine Learning for Red Team Hackers/1.2_Code Repository.txt 93 B
Machine Learning for Red Team Hackers/6.2_DeepfakeCrime.txt 251 B
Machine Learning for Red Team Hackers/001_Welcome to Machine Learning for Red Team Hackers!.mp4 21.31 MB
Machine Learning for Red Team Hackers/002_Introduction to Machine Learning for Red Team Hackers.mp4 29.09 MB
Machine Learning for Red Team Hackers/004_CAPTCHA Breaking.mp4 1.98 MB
Machine Learning for Red Team Hackers/005_Reconnaissance.mp4 16.08 MB
Machine Learning for Red Team Hackers/006_Constructing a Dataset.mp4 29.57 MB
Machine Learning for Red Team Hackers/007_Preprocessing the Dataset.mp4 54.48 MB
Machine Learning for Red Team Hackers/008_Training a Deep Neural Network.mp4 31.76 MB
Machine Learning for Red Team Hackers/009_Building a CAPTCHA Breaking Bot.mp4 17.18 MB
Machine Learning for Red Team Hackers/011_What is Fuzzing.mp4 4.89 MB
Machine Learning for Red Team Hackers/012_Basic Fuzzing and Code Coverage.mp4 23.86 MB
Machine Learning for Red Team Hackers/013_Mutation.mp4 27.07 MB
Machine Learning for Red Team Hackers/014_How to Write Your Own Evolutionary Fuzzer.mp4 56.76 MB
Machine Learning for Red Team Hackers/015_Fuzzing with AFL.mp4 23.98 MB
Machine Learning for Red Team Hackers/016_Assignment FuzzMe video.mp4 1.42 MB
Machine Learning for Red Team Hackers/018_Evading Machine Learning Malware Classifiers Overview.mp4 5.97 MB
Machine Learning for Red Team Hackers/019_Meet a Machine Learning Classifier.mp4 21.86 MB
Machine Learning for Red Team Hackers/020_Modifying PE Files the Easy Way.mp4 5.72 MB
Machine Learning for Red Team Hackers/021_Evading a Machine Learning Malware Classifier.mp4 23.11 MB
Machine Learning for Red Team Hackers/022_Assignment EvadeMe video.mp4 2.34 MB
Machine Learning for Red Team Hackers/024_Adversarial Machine Learning.mp4 13.19 MB
Machine Learning for Red Team Hackers/025_White-Box Attacks on Machine Learning.mp4 21.87 MB
Machine Learning for Red Team Hackers/026_Getting Started with Clarif.AI.mp4 22.12 MB
Machine Learning for Red Team Hackers/027_Black-Box Attack on Clarif.AI.mp4 61.15 MB
Machine Learning for Red Team Hackers/028_Assignment TrickMe video.mp4 7.87 MB
Machine Learning for Red Team Hackers/030_What is Deepfake.mp4 10.74 MB
Machine Learning for Red Team Hackers/032_Deepfake Dry Run.mp4 54.77 MB
Machine Learning for Red Team Hackers/033_Setting Up Your Deepfake Rig.mp4 37.77 MB
Machine Learning for Red Team Hackers/034_Assignment Deepfake video.mp4 1.63 MB
Machine Learning for Red Team Hackers/036_Model-Stealing Attacks on Machine Learning.mp4 11.71 MB
Machine Learning for Red Team Hackers/037_Machine Learning Poisoning.mp4 21.89 MB
Machine Learning for Red Team Hackers/038_Backdoor Attacks on Machine Learning Assignment.mp4 8.77 MB
Machine Learning for Red Team Hackers/ML Challenge #1_ CAPTCHA.docx 6.37 KB
Machine Learning for Red Team Hackers/ML Challenge #2_ FuzzMe.docx 6.43 KB
Machine Learning for Red Team Hackers/ML Challenge #3_ EvadeMe.docx 6.43 KB
Machine Learning for Red Team Hackers/ML Challenge #4_ TrickMe.docx 6.51 KB
Machine Learning for Red Team Hackers/ML Challenge #5_ DeepFake.docx 6.29 KB
Machine Learning for Red Team Hackers/ML Challenge #6_ Backdoor Attack.docx 6.54 KB
Mobile Application Pentesting/001 - Introduction.mp4 23.10 MB
Mobile Application Pentesting/002 - Analyzing an iOS App.mp4 111.61 MB
Mobile Application Pentesting/003 - Binary Analysis.mp4 90.76 MB
Mobile Application Pentesting/004 - Setting Up the Device.mp4 61.03 MB
Mobile Application Pentesting/005 - iOS App Security Measures.mp4 106.80 MB
Mobile Application Pentesting/006 - Insecure Data Storage.mp4 26.27 MB
Mobile Application Pentesting/007 - Runtime Manipulation.mp4 127.62 MB
Mobile Application Pentesting/008 - URL Schemes.mp4 72.87 MB
Mobile Application Pentesting/009 - Side Channel Data Leakage.mp4 39.88 MB
Mobile Application Pentesting/010 - Analyzing Network Traffic.mp4 49.69 MB
Mobile Application Pentesting/011 - Broken Cryptography.mp4 13.02 MB
Mobile Application Pentesting/012 - Automated Testing.mp4 25.44 MB
Mobile Application Pentesting/013 - Secure Coding Guidelines.mp4 28.09 MB
Mobile Application Pentesting/014 - Setting up the VM.mp4 20.33 MB
Mobile Application Pentesting/015 - Setting up the Emulator.mp4 40.53 MB
Mobile Application Pentesting/016 - Reversing Android Applications.mp4 94.78 MB
Mobile Application Pentesting/017 - Introduction to Drozer.mp4 52.25 MB
Mobile Application Pentesting/018 - Exploiting Android Components.mp4 134.32 MB
Mobile Application Pentesting/019 - Frida.mp4 49.61 MB
Mobile Forensics/001 - Mobile Forensics a.mp4 139.30 MB
Mobile Forensics/002 - Mobile Forensics b.mp4 125.77 MB
Mobile Forensics/003 - Mobile Forensics c.mp4 165.76 MB
Mobile Forensics/004 - Mobile Forensics d.mp4 174.36 MB
Offensive Bash Scripting/001 - Concise History of Linux.mp4 98.78 MB
Offensive Bash Scripting/002 - Virtual Box and Virtual Machines.mp4 6.68 MB
Offensive Bash Scripting/003 - Downloading Virtual Box and Kali Linux.mp4 59.95 MB
Offensive Bash Scripting/004 - Configure Kali Linux in Virtual Box, Part 1.mp4 56.95 MB
Offensive Bash Scripting/005 - Configure Kali Linux in Virtual Box, Part 2.mp4 219.04 MB
Offensive Bash Scripting/006 - New Installation.mp4 24.49 MB
Offensive Bash Scripting/007 - Commands in Bash.mp4 5.62 MB
Offensive Bash Scripting/008 - Basic Linux Commands.mp4 528.07 MB
Offensive Bash Scripting/009 - Grep.mp4 272.33 MB
Offensive Bash Scripting/010 - Symbols and Characters.mp4 298.09 MB
Offensive Bash Scripting/011 - If Else Elif, Part 1.mp4 112.54 MB
Offensive Bash Scripting/012 - If Else Elif, Part 2.mp4 164.72 MB
Offensive Bash Scripting/013 - Elif Ladder.mp4 353.83 MB
Offensive Bash Scripting/014 - For Loops, Part 1.mp4 81.02 MB
Offensive Bash Scripting/015 - For Loops, Part 2.mp4 87.10 MB
Offensive Bash Scripting/016 - For Loops, Part 3.mp4 66.57 MB
Offensive Bash Scripting/017 - For Loops, Part 4.mp4 106.07 MB
Offensive Bash Scripting/018 - While Loops.mp4 270.70 MB
Offensive Bash Scripting/019 - Generating Passwords, Part 1.mp4 57.07 MB
Offensive Bash Scripting/020 - Generating Passwords, Part 2.mp4 86.35 MB
Offensive Bash Scripting/021 - Strings and Variables.mp4 404.20 MB
Offensive Bash Scripting/022 - If Then, Part 1.mp4 281.11 MB
Offensive Bash Scripting/023 - If Then, Part 2.mp4 146.12 MB
Offensive Bash Scripting/024 - If Else Elif.mp4 435.20 MB
Offensive Bash Scripting/025 - Introduction and Demonstration of For Loops.mp4 212.23 MB
Offensive Bash Scripting/026 - For Loop Demonstration, continued.mp4 282.66 MB
Offensive Bash Scripting/027 - Introduction and Demonstration of While Loops.mp4 376.97 MB
Offensive Bash Scripting/028 - User and Group Management, Part 1.mp4 192.67 MB
Offensive Bash Scripting/029 - User and Group Management, Part 2.mp4 142.77 MB
Offensive Bash Scripting/030 - User and Group Management, Part 3.mp4 95.42 MB
Offensive Bash Scripting/031 - File Permission and Process, Part 1.mp4 67.45 MB
Offensive Bash Scripting/032 - File Permission and Process, Part 2.mp4 287.38 MB
Offensive Bash Scripting/033 - File Permission and Process, Part 3.mp4 290.69 MB
Offensive Bash Scripting/034 - VM Downloads.mp4 95.95 MB
Offensive Bash Scripting/035 - Network Reconnaissance, Part 1.mp4 211.17 MB
Offensive Bash Scripting/036 - Network Reconnaissance, Part 2.mp4 47.19 MB
Offensive Bash Scripting/037 - Network Reconnaissance, Part 3.mp4 296.62 MB
Offensive Bash Scripting/040 - Web Applications, Part 1.mp4 149.08 MB
Offensive Bash Scripting/041 - Web Applications, Part 2.mp4 331.67 MB
Offensive Bash Scripting/042 - Web Applications, Part 3.mp4 341.36 MB
Offensive Bash Scripting/043 - Web Applications, Part 4.mp4 424.04 MB
Offensive Bash Scripting/045 - Privilege Escalation.mp4 427.11 MB
Offensive Bash Scripting/046 - Privilege Escalation - Git.mp4 33.84 MB
Offensive Bash Scripting/049 - Project Walkthrough.mp4 631.09 MB
Offensive Bash Scripting/053 - Project Hints.mp4 94.80 MB
Offensive Bash Scripting/Challenge Questions Kioptrix2.pdf 41.79 KB
Offensive Bash Scripting/Course8 Payload links.pdf 18.48 KB
Offensive Bash Scripting/Kioptrix2 Challenge Questions with Answers.pdf 54.33 KB
Offensive Bash Scripting/OBS Kioptrix Level 4.zip 298.48 MB
Offensive Bash Scripting/OBS Kioptrix Level 01.zip 243.96 MB
Offensive Bash Scripting/OBS Project KioptrixLevel2.zip 539.49 MB
Offensive Bash Scripting/OBS VulnhubVMlinks.pdf 25.81 KB
Offensive Bash Scripting/OBS Windows10 link.pdf 16.38 KB
Offensive Bash Scripting/Offensive Bash Kioptrix2 Resources.pdf 37.62 KB
OWASP Top Ten/001 - Welcome to the OWASP Top Ten Path!.mp4 29.75 MB
OWASP Top Ten/002 - Risk One - Injection.mp4 60.84 MB
OWASP Top Ten/003 - Injection Demo.mp4 7.93 MB
OWASP Top Ten/004 - Risk Two - Broken Authentication.mp4 82.88 MB
OWASP Top Ten/005 - Risk Three - Sensitive Data Exposure.mp4 81.74 MB
OWASP Top Ten/006 - Risk Four - XXE.mp4 68.78 MB
OWASP Top Ten/007 - Risk Five - Broken Access Control.mp4 63.00 MB
OWASP Top Ten/008 - Risk Six - Security Misconfiguration.mp4 68.57 MB
OWASP Top Ten/009 - Risk Seven - XSS.mp4 72.32 MB
OWASP Top Ten/010 - Risk Eight - Insecure Deserialization.mp4 53.12 MB
OWASP Top Ten/011 - Risk Nine - Using Components with Known Vulnerabilities.mp4 60.03 MB
OWASP Top Ten/012 - Risk Ten - Insufficient Logging and Monitoring.mp4 49.74 MB
OWASP Top Ten/013 - OWASP Top Ten - Scenarios.mp4 17.08 MB
OWASP Top Ten/015 - Lab 1 Local File Inclusion (LFI) walkthrough.mp4 204.94 MB
OWASP Top Ten/016 - Lab 2 Secure Coding walkthrough.mp4 394.70 MB
OWASP Top Ten/017 - Lab 3 Web Application Firewall (WAF) walkthrough.mp4 234.53 MB
OWASP Top Ten/IS Skills Purple Team Web App Security Project Solutions.pdf 192.75 KB
OWASP Top Ten/Purple Team Web Application Security Project Files.zip 5.14 GB
PMI Project Management Professional (PMP)/001 - Project Management Overview Part 1.mp4 200.54 MB
PMI Project Management Professional (PMP)/002 - Project Management Overview Part 2.mp4 206.09 MB
PMI Project Management Professional (PMP)/003 - Project Management Overview Part 3.mp4 265.72 MB
PMI Project Management Professional (PMP)/004 - Project Management Overview Part 4.mp4 73.27 MB
PMI Project Management Professional (PMP)/005 - Role of the Project Manager.mp4 69.50 MB
PMI Project Management Professional (PMP)/006 - Initiating Process Group.mp4 21.10 MB
PMI Project Management Professional (PMP)/007 - Develop Project Charter.mp4 122.42 MB
PMI Project Management Professional (PMP)/008 - Identify Stakeholders.mp4 105.21 MB
PMI Project Management Professional (PMP)/009 - Planning Process Group.mp4 18.63 MB
PMI Project Management Professional (PMP)/010 - Develop Project Management Plan.mp4 79.73 MB
PMI Project Management Professional (PMP)/011 - Plan Scope Management.mp4 65.98 MB
PMI Project Management Professional (PMP)/012 - Collect Requirements.mp4 149.21 MB
PMI Project Management Professional (PMP)/013 - Define Scope.mp4 64.57 MB
PMI Project Management Professional (PMP)/014 - Create WBS.mp4 103.47 MB
PMI Project Management Professional (PMP)/015 - Plan Schedule Management.mp4 55.54 MB
PMI Project Management Professional (PMP)/016 - Define Activities.mp4 48.93 MB
PMI Project Management Professional (PMP)/017 - Sequence Activities.mp4 125.48 MB
PMI Project Management Professional (PMP)/018 - Estimate Activity Durations.mp4 153.77 MB
PMI Project Management Professional (PMP)/019 - Develop Schedule Part 1.mp4 196.58 MB
PMI Project Management Professional (PMP)/020 - Develop Schedule Part 2.mp4 125.16 MB
PMI Project Management Professional (PMP)/021 - Plan Cost Management.mp4 63.36 MB
PMI Project Management Professional (PMP)/022 - Estimate Costs.mp4 116.81 MB
PMI Project Management Professional (PMP)/023 - Determine Budget.mp4 98.99 MB
PMI Project Management Professional (PMP)/024 - Plan Quality Management.mp4 124.49 MB
PMI Project Management Professional (PMP)/025 - Plan Resource Management.mp4 73.41 MB
PMI Project Management Professional (PMP)/026 - Estimate Activity Resources.mp4 80.11 MB
PMI Project Management Professional (PMP)/027 - Plan Communications Management.mp4 125.73 MB
PMI Project Management Professional (PMP)/028 - Plan Risk Management.mp4 141.01 MB
PMI Project Management Professional (PMP)/029 - Plan Stakeholder Engagement.mp4 52.51 MB
PMI Project Management Professional (PMP)/030 - Identify Risks.mp4 94.85 MB
PMI Project Management Professional (PMP)/031 - Perform Qualitative Risk Analysis.mp4 71.21 MB
PMI Project Management Professional (PMP)/032 - Perform Quantitative Risk Analysis.mp4 145.14 MB
PMI Project Management Professional (PMP)/033 - Plan Risk Responses.mp4 89.23 MB
PMI Project Management Professional (PMP)/034 - Plan Procurement Management.mp4 184.41 MB
PMI Project Management Professional (PMP)/035 - Planning Processes Summary.mp4 68.79 MB
PMI Project Management Professional (PMP)/036 - Executing Process Group.mp4 20.46 MB
PMI Project Management Professional (PMP)/037 - Direct and Manage Project Work.mp4 78.63 MB
PMI Project Management Professional (PMP)/038 - Manage Project Knowledge.mp4 90.86 MB
PMI Project Management Professional (PMP)/039 - Manage Quality.mp4 89.13 MB
PMI Project Management Professional (PMP)/040 - Acquire Resources.mp4 55.47 MB
PMI Project Management Professional (PMP)/041 - Develop Team.mp4 84.36 MB
PMI Project Management Professional (PMP)/042 - Manage Team.mp4 33.03 MB
PMI Project Management Professional (PMP)/043 - Manage Communications.mp4 43.67 MB
PMI Project Management Professional (PMP)/044 - Implement Risk Responses.mp4 25.62 MB
PMI Project Management Professional (PMP)/045 - Conduct Procurements.mp4 48.29 MB
PMI Project Management Professional (PMP)/046 - Manage Stakeholder Engagement.mp4 56.70 MB
PMI Project Management Professional (PMP)/047 - Monitoring and Controlling Process Group.mp4 15.68 MB
PMI Project Management Professional (PMP)/048 - Monitor and Control Project Work.mp4 55.08 MB
PMI Project Management Professional (PMP)/049 - Perform integrated Change Control.mp4 79.74 MB
PMI Project Management Professional (PMP)/050 - Validate Scope.mp4 46.08 MB
PMI Project Management Professional (PMP)/051 - Control Scope.mp4 31.94 MB
PMI Project Management Professional (PMP)/052 - Control Schedule.mp4 83.09 MB
PMI Project Management Professional (PMP)/053 - Control Costs.mp4 230.40 MB
PMI Project Management Professional (PMP)/054 - Control Quality.mp4 96.53 MB
PMI Project Management Professional (PMP)/055 - Control Resources.mp4 36.05 MB
PMI Project Management Professional (PMP)/056 - Monitor Communications.mp4 38.61 MB
PMI Project Management Professional (PMP)/057 - Control Procurements.mp4 56.88 MB
PMI Project Management Professional (PMP)/058 - Monitor Risks.mp4 42.11 MB
PMI Project Management Professional (PMP)/059 - Monitor Stakeholder Engagement.mp4 44.70 MB
PMI Project Management Professional (PMP)/060 - Close Project or Phase.mp4 64.26 MB
PMI Project Management Professional (PMP)/061 - Ethics.mp4 50.31 MB
PMI Project Management Professional (PMP)/062 - Preparing for the Exam.mp4 97.44 MB
PMI Project Management Professional (PMP)/063 - Application Process.mp4 80.19 MB
Securing LinuxUNIX/001 - Introduction to Linux Users.mp4 14.60 MB
Securing LinuxUNIX/002 - Setting FileGroup Permissions.mp4 16.31 MB
Securing LinuxUNIX/003 - Special File Permissions and using 'sticky bit'.mp4 12.51 MB
Securing LinuxUNIX/004 - Special File Permissions and using SUID GUID.mp4 24.36 MB
Securing LinuxUNIX/005 - Special File Permissions and using Sudo.mp4 20.91 MB
Securing LinuxUNIX/006 - What is ssh and why is it so important to Linux.mp4 27.05 MB
Securing LinuxUNIX/007 - SSH is great, but how do we make it more secure.mp4 42.41 MB
Securing LinuxUNIX/008 - TCP Wrappers.mp4 20.01 MB
Securing LinuxUNIX/009 - Hiding your SSH (or other daemons) with knockd.mp4 25.09 MB
Securing LinuxUNIX/010 - Linux Ports, Daemons and port scanning.mp4 10.63 MB
Securing LinuxUNIX/011 - More about ports on Linux.mp4 24.92 MB
Securing LinuxUNIX/012 - What is SSL and what is it good for.mp4 11.59 MB
Securing LinuxUNIX/013 - Demo of HTTP vs. HTTPS.mp4 10.01 MB
Securing LinuxUNIX/014 - TLS certs from Let’s Encrypt.mp4 23.77 MB
Securing LinuxUNIX/015 - TLS self-signed cert.mp4 12.35 MB
Securing LinuxUNIX/016 - Firewalls for Linux (Layer 3).mp4 16.74 MB
Securing LinuxUNIX/017 - WAF Firewall (Layer 7).mp4 16.49 MB
Securing LinuxUNIX/018 - Demo of Modescurity.mp4 16.03 MB
Securing LinuxUNIX/019 - Host IDS with OSSEC.mp4 12.13 MB
Securing LinuxUNIX/020 - Demo of OSSEC.mp4 18.73 MB
Securing LinuxUNIX/021 - Host IPS with Fail2Ban.mp4 15.06 MB
Securing LinuxUNIX/022 - Demo of Fail2Ban.mp4 15.31 MB
Securing LinuxUNIX/023 - What is PGPGPG and what is it good for.mp4 15.51 MB
Securing LinuxUNIX/024 - Demo of GPG.mp4 24.07 MB
Securing LinuxUNIX/025 - What is SELinux and what does it do.mp4 21.09 MB
Securing LinuxUNIX/026 - Demo of SELinux.mp4 48.12 MB
Securing LinuxUNIX/027 - Using SCAP and STIGs on Linux.mp4 10.40 MB
Securing LinuxUNIX/028 - Demo of the STIG viewer on Linux.mp4 12.13 MB
Securing LinuxUNIX/029 - Demo of the scap-workbench on Linux.mp4 16.42 MB
Security Engineering/001 - Security Models Part 1.mp4 67.94 MB
Security Engineering/002 - Security Models Part 2.mp4 84.49 MB
Security Engineering/003 - Security Models Part 3.mp4 70.57 MB
Security Engineering/004_Security Modes.mp4 30.90 MB
Security Engineering/005 - Evaluation Models.mp4 52.42 MB
Security Engineering/006 - Rainbow Series.mp4 27.31 MB
Security Engineering/007 - Common Criteria.mp4 54.94 MB
Security Engineering/008 - Certification and Accreditation.mp4 29.89 MB
Security Engineering/009 - Firewalls.mp4 74.75 MB
Security Engineering/010 - DMZ.mp4 80.99 MB
Security Engineering/011 - Honeypots.mp4 42.44 MB
Security Engineering/012 - Endpoint Security.mp4 24.66 MB
Security Engineering/013 - IDS.mp4 67.72 MB
Security Engineering/014 - Authentication Protocols.mp4 29.86 MB
Security Engineering/015 - VPN and VLAN.mp4 61.47 MB
Security Engineering/017 - Distributed and Cloud Computing.mp4 60.19 MB
Security Engineering/018 - Virtualization.mp4 76.57 MB
Security Engineering/019 - Virtualized Networks.mp4 52.07 MB
Security Engineering/020 - Wireless Networks.mp4 105.04 MB
Security Engineering/021 - Mobile Systems.mp4 92.38 MB
Security Engineering/022 - WAN Technologies.mp4 74.67 MB
Security Engineering/023 - Remote Access.mp4 61.03 MB
Security Engineering/024 - Secure Communication Protocols.mp4 81.76 MB
Security Engineering/025 - TCB.mp4 17.68 MB
Security Engineering/026 - Computer Components.mp4 62.16 MB
Security Engineering/027 - Protection Mechanisms.mp4 67.60 MB
Security Engineering/028 - Common Architecture Flaws.mp4 86.93 MB
Security Engineering/029 - Web-Based Vulnerabilities.mp4 69.51 MB
Security Engineering/030 - Covert Channels.mp4 48.60 MB
Security Engineering/031 - Embedded Systems.mp4 47.89 MB
Security Engineering/032 - Facility Design.mp4 63.75 MB
Security Engineering/033 - Facility Construction.mp4 36.23 MB
Security Engineering/034 - Perimeter Defenses.mp4 100.98 MB
Security Engineering/035 - Doors and Locks.mp4 70.68 MB
Security Engineering/036 - Internal Facilities Security.mp4 117.72 MB
Security Engineering/037 - Physical Intrusion Detection.mp4 107.72 MB
Security Engineering/038 - Personnel Safety.mp4 33.40 MB
Security Engineering/039 - Media Storage.mp4 33.24 MB
Security Engineering/040 - Utilities and HVAC.mp4 95.57 MB
Security Engineering/041 - Fire Safety.mp4 86.40 MB
Security Engineering/042 - Change Control.mp4 58.50 MB
Security Engineering/043 - Software Testing.mp4 94.80 MB
Security Engineering/044 - Software Environment.mp4 87.22 MB
Security Engineering/045 - Object-Oriented Programming (OOP).mp4 45.58 MB
Security Engineering/046 - Distributed Computing.mp4 38.25 MB
Security Engineering/047 - Mobile Code.mp4 48.24 MB
Security Engineering/048 - Acquired Software.mp4 34.24 MB
Security Engineering/049 - Application Attacks.mp4 80.68 MB
Security Engineering/050 - Malware.mp4 44.80 MB
Security Engineering/051 - Recovery Strategy.mp4 100.81 MB
Security Engineering/052 - Recovery Process.mp4 129.30 MB
Security Engineering/053 - Disaster Recovery Plan (DRP) Testing.mp4 49.52 MB
Security Engineering/054 - RAID.mp4 42.68 MB
Security Engineering/055 - Backups.mp4 75.91 MB
Security Engineering/056 - Network Redundancy.mp4 48.99 MB
Security Engineering/057 - Incident Response Plan.mp4 83.99 MB
Security Engineering/058 - Business Impact Analysis (BIA).mp4 83.10 MB
Security Engineering/059 - Network Security Device Types.mp4 37.99 MB
Security Engineering/060 - Network Security Component Management.mp4 86.19 MB
Security Engineering/061 - Analyze Network-Enabled Devices.mp4 97.22 MB
Security Engineering/062 - Analyze Advanced Network Design.mp4 77.26 MB
Security Engineering/063 - Network Security Control Topics.mp4 73.69 MB
Security Engineering/064 - Configure Controls for Network Security.mp4 61.67 MB
Security Engineering/065 - Select Host Hardware and Software.mp4 74.80 MB
Security Engineering/066 - Harden Hosts.mp4 71.76 MB
Security Engineering/067 - Protect Boot Loaders.mp4 27.33 MB
Security Engineering/068 - Storage Types.mp4 70.15 MB
Security Engineering/069 - Storage Protocols.mp4 83.68 MB
Security Engineering/070 - Implement Secure Storage Controls.mp4 73.76 MB
Security Engineering/071 - Identify General Application Vulnerabilities.mp4 86.90 MB
Security Engineering/072 - Identify Web Application Vulnerabilities.mp4 106.55 MB
Security Engineering/073 - Application Security Design.mp4 42.71 MB
Security Engineering/074 - Implement Application Security Controls.mp4 123.91 MB
Security Engineering/075 - General Security Principles.mp4 44.37 MB
Security Engineering/076 - Risk Management Principles.mp4 15.17 MB
Security Engineering/077 - System Resilience Principles.mp4 21.04 MB
Security Engineering/078 - Vulnerability Management Principles.mp4 25.64 MB
Security Engineering/079 - Risk Management Process.mp4 72.05 MB
Security Engineering/080 - Operational Risk Management.mp4 57.86 MB
Security Engineering/081 - Stakeholder Requirements Definition.mp4 29.75 MB
Security Engineering/082 - Requirements Analysis.mp4 13.48 MB
Security Engineering/083 - System Security Architecture and Design.mp4 23.70 MB
Security Engineering/084 - Implementation, Integration, and Deployment of Systems or System Modifications.mp4 11.70 MB
Security Engineering/085 - Verification and Validation of Systems or System Modifications.mp4 20.95 MB
Security Engineering/086 - Secure Operations.mp4 57.13 MB
Security Engineering/087 - Secure Maintenance.mp4 25.75 MB
Security Engineering/088 - Secure Disposal.mp4 15.05 MB
Security Engineering/089 - Acquisition Process.mp4 32.52 MB
Security Engineering/090 - System Development Methodologies.mp4 7.72 MB
Security Engineering/091 - Technical Management Processes.mp4 64.92 MB
Security Engineering/IPSec VPN.pdf 78.69 KB
SIEM Architecture and Process/001 - Welcome to SIEM Architecture and Process.mp4 13.65 MB
SIEM Architecture and Process/002 - Introduction to SIEM.mp4 33.24 MB
SIEM Architecture and Process/003 - The Adoption of SIEM.mp4 23.77 MB
SIEM Architecture and Process/004 - SIEM Technologies.mp4 31.25 MB
SIEM Architecture and Process/005 - Questions and Answers.mp4 16.16 MB
SIEM Architecture and Process/006 - Installing SIEM.mp4 20.58 MB
SIEM Architecture and Process/007 - SIEM Architecture.mp4 51.50 MB
SIEM Architecture and Process/008 - Navigating SIEM.mp4 52.95 MB
SIEM Architecture and Process/009 - Data Collection.mp4 28.71 MB
SIEM Architecture and Process/010 - My First Log.mp4 52.25 MB
SIEM Architecture and Process/011 - Data Processing.mp4 31.52 MB
SIEM Architecture and Process/012 - Data Processing - Hands On.mp4 55.48 MB
SIEM Architecture and Process/013 - Data Enrichment.mp4 20.46 MB
SIEM Architecture and Process/014 - Data Enrichment - Real Example.mp4 37.67 MB
SIEM Architecture and Process/015 - Data Indexing.mp4 27.59 MB
SIEM Architecture and Process/016 - Use Cases.mp4 27.26 MB
SIEM Architecture and Process/017 - Searching for Data.mp4 47.93 MB
SIEM Architecture and Process/018 - Building Dashboards.mp4 22.76 MB
SIEM Architecture and Process/019 - Filtering Noise.mp4 32.14 MB
SIEM Architecture and Process/020 - Creating Reports.mp4 17.18 MB
SIEM Architecture and Process/021 - Alarms.mp4 29.17 MB
SIEM Architecture and Process/022 - Summation.mp4 12.83 MB
Web Server Protection/001 - Welcome to Web Server Protection!.mp4 50.41 MB
Web Server Protection/002 - Introduction to the Web.mp4 15.95 MB
Web Server Protection/003 - Client-Server Model.mp4 15.21 MB
Web Server Protection/004 - Common Protocols.mp4 27.14 MB
Web Server Protection/005 - TCPIP.mp4 24.64 MB
Web Server Protection/006 - DNS.mp4 22.42 MB
Web Server Protection/007 - HTTP.mp4 36.01 MB
Web Server Protection/008 - HTTPS.mp4 32.11 MB
Web Server Protection/009 - Web Servers.mp4 24.61 MB
Web Server Protection/010 - The Cloud.mp4 21.78 MB
Web Server Protection/011 - CDN.mp4 23.06 MB
Web Server Protection/012 - Web Server Security.mp4 35.02 MB
Web Server Protection/013 - Firewalls.mp4 15.34 MB
Web Server Protection/014 - Load Balancers.mp4 19.48 MB
Web Server Protection/015 - Web Application Firewall.mp4 44.37 MB
Web Server Protection/016 - Intrusion Detection and Prevention Systems (IDPS).mp4 44.25 MB
Web Server Protection/017 - File Integrity Monitoring.mp4 16.31 MB
Web Server Protection/018 - Multitier Architecture.mp4 28.66 MB
Web Server Protection/019 - Business Requirements.mp4 15.68 MB
Web Server Protection/020 - Basic Security Controls.mp4 55.66 MB
Web Server Protection/021 - Build From Scratch or Use Bundle.mp4 33.18 MB
Web Server Protection/022 - Network Hardening.mp4 44.25 MB
Web Server Protection/023 - Host Hardening.mp4 54.06 MB
Web Server Protection/024 - Web Server Configuration Hardening.mp4 38.49 MB
Web Server Protection/025 - Applications Hardening.mp4 19.12 MB
Web Server Protection/026 - Whitelisting.mp4 27.16 MB
Web Server Protection/027 - Logs.mp4 29.86 MB
Web Server Protection/028 - Log Formats.mp4 10.84 MB
Web Server Protection/029 - Using the Logs.mp4 21.48 MB
Web Server Protection/030 - Apache Logs.mp4 29.91 MB
Web Server Protection/031 - NGINX Logs.mp4 13.85 MB
Web Server Protection/032 - IIS Logs.mp4 17.25 MB
Web Server Protection/033 - ModSecurity Logs.mp4 32.56 MB
Web Server Protection/034 - HAProxy Logs.mp4 13.22 MB
Web Server Protection/035 - curl.mp4 17.54 MB
Web Server Protection/036 - OpenSSL.mp4 13.88 MB
Web Server Protection/037 - grep and egrep.mp4 12.93 MB
Web Server Protection/038 - awk.mp4 15.09 MB
Web Server Protection/039 - jq.mp4 12.07 MB
Web Server Protection/040 - cut.mp4 8.36 MB
Web Server Protection/041 - sort.mp4 12.54 MB
Web Server Protection/042 - Summarizing Events.mp4 29.14 MB
Web Server Protection/043 - ss and netstat.mp4 9.12 MB
Web Server Protection/044 - tcpdump.mp4 16.33 MB
Web Server Protection/045 - testssl.sh.mp4 9.01 MB
Web Server Protection/046 - base64.mp4 12.76 MB
Web Server Protection/047 - hexdump and xxd.mp4 7.35 MB
Web Server Protection/048 - gzip.mp4 21.56 MB
Web Server Protection/049 - CyberChef.mp4 14.98 MB
Web Server Protection/050 - Web Application Firewalls for Compliance.mp4 18.80 MB
Web Server Protection/051 - Web Application Firewalls for Security.mp4 34.78 MB
Web Server Protection/052 - Web Application Firewalls False Positives.mp4 11.41 MB
Web Server Protection/053 - ModSecurity and OWASP CRS.mp4 46.45 MB
Web Server Protection/054 - ModSecurity Rules.mp4 60.54 MB
Web Server Protection/055 - Virtual Patching.mp4 11.27 MB
Web Server Protection/056 - Log Life Cycle.mp4 28.29 MB
Web Server Protection/057 - Collecting the Logs.mp4 28.52 MB
Web Server Protection/058 - Time Stamps.mp4 15.69 MB
Web Server Protection/059 - Status Codes.mp4 22.81 MB
Web Server Protection/060 - Profiling the Web Server.mp4 29.82 MB
Web Server Protection/061 - Security Onion.mp4 51.36 MB
Web Server Protection/062 - Anomaly Detection.mp4 39.23 MB
Web Server Protection/063 - Alerting.mp4 19.77 MB
Web Server Protection/064 - WebLabyrinth.mp4 29.87 MB
Web Server Protection/065 - fail2ban.mp4 15.88 MB
Web Server Protection/066 - Active Response with fail2ban.mp4 36.73 MB
Windows Registry Forensics/001 - What is the registry and why it is important.mp4 16.89 MB
Windows Registry Forensics/002 - Structure of the Windows Registry.mp4 10.09 MB
Windows Registry Forensics/005 - Viewing the live registry with RegEdit.mp4 16.57 MB
Windows Registry Forensics/006 - Software needed to examine the Registry.mp4 33.34 MB
Windows Registry Forensics/007 - Locating the Registry Files within the Windows Filesystem.mp4 60.16 MB
Windows Registry Forensics/008 - Locating and Interpreting Registry Values.mp4 71.60 MB
Windows Registry Forensics/009 - Recent Docs.mp4 43.85 MB
Windows Registry Forensics/010 - Typed URLs.mp4 25.89 MB
Windows Registry Forensics/011 - UserAssist.mp4 151.88 MB
Windows Registry Forensics/012 - Recent Apps.mp4 49.28 MB
Windows Registry Forensics/013 - Run and Run Once.mp4 13.68 MB
Windows Registry Forensics/014 - ComDIg32 Subkey.mp4 32.40 MB
Windows Registry Forensics/015 - Run MRU Subkey.mp4 24.25 MB
Windows Registry Forensics/016 - Typed Paths Subkey.mp4 22.37 MB
Windows Registry Forensics/017 - Microsoft Office Applications and the MRU Subkey.mp4 18.65 MB
Windows Registry Forensics/018 - Windows Search Function and the Wordwheel Query.mp4 36.13 MB
Windows Registry Forensics/019 - SAM File Overview.mp4 14.00 MB
Windows Registry Forensics/020 - Security Identifiers.mp4 14.05 MB
Windows Registry Forensics/021 - User Accounts (RIDs).mp4 24.87 MB
Windows Registry Forensics/022 - Password Hashes.mp4 7.31 MB
Windows Registry Forensics/023 - Other Types of User Accounts.mp4 42.56 MB
Windows Registry Forensics/024 - Software File Subkeys of Interest.mp4 77.29 MB
Windows Registry Forensics/025 - Network List Subkey.mp4 28.81 MB
Windows Registry Forensics/026 - Connected Devices.mp4 20.35 MB
Windows Registry Forensics/027 - System File Subkeys of Interest.mp4 99.96 MB
Windows Registry Forensics/028 - USB Device Forensics.mp4 56.64 MB
Windows Registry Forensics/029 - AppCompat Cache and Background Activities Monitor.mp4 34.07 MB
Windows Registry Forensics/030 - ShellBags.mp4 34.64 MB
Windows Registry Forensics/031 - MuiCache and Managed By App Sub-keys.mp4 36.28 MB
Windows Registry Forensics/032 - AmCache Hive File Subkeys of Interest.mp4 38.31 MB
Windows Registry Forensics/033 - AmCache Parser.exe demo.mp4 61.93 MB
Windows Registry Forensics/Windows Registry Forensics Class Tools.pdf 13.85 KB
Introduction to Applied Cryptography and Cryptanalysis/001 - Welcome to Introduction to Cryptography!.mp4 32.52 MB
No trackers found

TorrentBank
Copyright © 2024