Create Tool:
Create Time:1970-01-01 08:00:00
File Size:9.41 GB
File Count:413
File Hash:53e7ef410d9692d73cd4cf9d164dc1859a17db2d
01. Welcome to the SOC Analyst Level 1 Career Path/Module 1_ Welcome to the SOC Analyst Level 1 Career Path/1.1 Welcome to the SOC Analyst Level 1 Career Path.mp4 | 42.03 MB |
01. Welcome to the SOC Analyst Level 1 Career Path/Module 1_ Welcome to the SOC Analyst Level 1 Career Path/1.1 Welcome to the SOC Analyst Level 1 Career Path.vtt | 4.31 KB |
02. Kali Linux Fundamentals/Module 1 - Introduction/1.1 Intro-Instructor Welcome and Objectives(KL).mp4 | 3.99 MB |
02. Kali Linux Fundamentals/Module 1 - Introduction/1.2 Intro-Disclaimer(KL).mp4 | 6.01 MB |
02. Kali Linux Fundamentals/Module 2/2.1 The Beginning (KL).mp4 | 22.67 MB |
02. Kali Linux Fundamentals/Module 2/2.2 Getting Kali up and Running (KL).mp4 | 22.34 MB |
02. Kali Linux Fundamentals/Module 2/2.3 Moving Around (KL).mp4 | 43.78 MB |
02. Kali Linux Fundamentals/Module 2/2.4 Module Summary (KL).mp4 | 2.84 MB |
02. Kali Linux Fundamentals/Module 3/3.1 The Terminal (KL).mp4 | 37.09 MB |
02. Kali Linux Fundamentals/Module 3/3.2 File System (KL).mp4 | 26.96 MB |
02. Kali Linux Fundamentals/Module 3/3.3 Useful Commands (KL).mp4 | 42.24 MB |
02. Kali Linux Fundamentals/Module 3/3.4 Summary (KL).mp4 | 3.95 MB |
02. Kali Linux Fundamentals/Module 4/4.1 Basic Network Commands (KL).mp4 | 30.58 MB |
02. Kali Linux Fundamentals/Module 4/4.2 Services (KL).mp4 | 26.24 MB |
02. Kali Linux Fundamentals/Module 4/4.3 Managing Users (KL).mp4 | 12.77 MB |
02. Kali Linux Fundamentals/Module 4/4.4 Summary (KL).mp4 | 2.96 MB |
02. Kali Linux Fundamentals/Module 5/5.1 Troubleshooting Basics (KL).mp4 | 29.74 MB |
02. Kali Linux Fundamentals/Module 5/5.2 The Tools Chest (KL).mp4 | 27.44 MB |
02. Kali Linux Fundamentals/Module 5/5.3 Summary (KL).mp4 | 1.76 MB |
02. Kali Linux Fundamentals/Resources/1. Syllabus and Outline.pdf | 224.64 KB |
02. Kali Linux Fundamentals/Resources/2. Module 1 Quiz.pdf | 26.34 KB |
02. Kali Linux Fundamentals/Resources/3. Module 2 Quiz.pdf | 22.43 KB |
02. Kali Linux Fundamentals/Resources/4. Module 3 Quiz.pdf | 20.82 KB |
02. Kali Linux Fundamentals/Resources/5. Study Guide.pdf | 170.76 KB |
02. Kali Linux Fundamentals/Resources/6. Glossary.pdf | 176.25 KB |
03. Command Line Basics/Module 1 - Introduction to the Command Line/1.1 Introduction and Setup.mp4 | 44.51 MB |
03. Command Line Basics/Module 1 - Introduction to the Command Line/1.2 Opening the Command Line.mp4 | 33.32 MB |
03. Command Line Basics/Module 1 - Introduction to the Command Line/1.3 Asking for Help.mp4 | 71.72 MB |
03. Command Line Basics/Module 2 - Introductory Commands/2.1 Command Line Survival Part 1.mp4 | 55.64 MB |
03. Command Line Basics/Module 2 - Introductory Commands/2.2 Command Line Survival Part 2.mp4 | 41.41 MB |
03. Command Line Basics/Module 2 - Introductory Commands/2.3 Changing Directories.mp4 | 46.54 MB |
03. Command Line Basics/Module 2 - Introductory Commands/2.4 Common Linux Tools.mp4 | 89.73 MB |
03. Command Line Basics/Module 2 - Introductory Commands/2.5 Windows Common Tools.mp4 | 46.49 MB |
03. Command Line Basics/Module 2 - Introductory Commands/2.6 Copy and Paste in Windows Command.mp4 | 19.44 MB |
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.01 Linux Basics Part 1.mp4 | 34.20 MB |
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.02 Linux Basics Part 2.mp4 | 37.77 MB |
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.03 Linux Basics Part 3.mp4 | 43.80 MB |
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.04 Linux Files Part 1.mp4 | 31.93 MB |
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.05 Linux Files Part 2.mp4 | 36.56 MB |
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.06 Linux Files Part 3.mp4 | 42.95 MB |
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.07 Linux Files Part 4.mp4 | 31.41 MB |
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.08 Linux Files Part 5.mp4 | 35.70 MB |
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.09 Linux System Part 1.mp4 | 33.61 MB |
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.10 Linux System Part 2.mp4 | 38.55 MB |
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.11 Linux Networking Part 1.mp4 | 53.20 MB |
03. Command Line Basics/Module 3 - Linux Command Line Tools/3.12 Linux Networking Part 2.mp4 | 70.14 MB |
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.01 Windows Basis.mp4 | 37.00 MB |
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.02 Windows Files Part 1.mp4 | 30.48 MB |
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.03 Windows Files Part 2.mp4 | 37.95 MB |
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.04 Windows System Part 1.mp4 | 28.03 MB |
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.05 Windows System Part 2.mp4 | 38.52 MB |
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.06 Windows System Part 3.mp4 | 24.21 MB |
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.07 Windows Networking Part 1.mp4 | 41.67 MB |
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.08 Windows Networking Part 2.mp4 | 31.68 MB |
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.09 Windows Networking Part 3.mp4 | 29.06 MB |
03. Command Line Basics/Module 4 - Windows Command Line Tools/4.10 Net Command.mp4 | 40.96 MB |
03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.1 Windows Advanced Piping and Ampersands.mp4 | 35.73 MB |
03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.2 Windows Command Redirection.mp4 | 44.25 MB |
03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.3 For and While Loops.mp4 | 32.58 MB |
03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.4 Linux Shell Scripting.mp4 | 21.83 MB |
03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.5 Windows Batch Scripting.mp4 | 20.80 MB |
03. Command Line Basics/Module 5 - Advanced Command Line Techniques/5.6 Conclusion.mp4 | 14.17 MB |
03. Command Line Basics/Resources/1. Syllabus and Outline.mp4 | 203.98 KB |
03. Command Line Basics/Resources/2. Study Guide.pdf | 388.28 KB |
03. Command Line Basics/Resources/3. Glossary.pdf | 154.55 KB |
03. Command Line Basics/Resources/4. Command Categories.pdf | 96.00 KB |
05. Malware Threats/Module 1 - Introduction/1.1 Introduction.mp4 | 11.56 MB |
05. Malware Threats/Module 1 - Introduction/1.2 Malware Introduction.mp4 | 24.56 MB |
05. Malware Threats/Module 2 - Analyze Malware/2.1 Analyze and Classify Malware Lab Part 1.mp4 | 40.68 MB |
05. Malware Threats/Module 2 - Analyze Malware/2.2 Analyze and Classify Malware Lab Part 2.mp4 | 18.26 MB |
05. Malware Threats/Module 2 - Analyze Malware/2.3 Rootkit Lab Part 1.mp4 | 56.52 MB |
05. Malware Threats/Module 2 - Analyze Malware/2.4 Rootkit Lab Part 2.mp4 | 59.24 MB |
05. Malware Threats/Module 2 - Analyze Malware/2.5 Rootkit Lab Part 3.mp4 | 51.41 MB |
05. Malware Threats/Module 3 - Conclusion/3.1 Conclusion.mp4 | 7.47 MB |
05. Malware Threats/Resources/1. Syllabus and Outline.pdf | 100.54 KB |
05. Malware Threats/Resources/2. Module 2 - Analyze and Classify Malware Lab.pdf | 101.30 KB |
05. Malware Threats/Resources/3. Module 2 - Rootkit Lab.pdf | 116.46 KB |
07. Cybersecurity Kill Chain™/Module 1 - Introduction and the Cyber Kill Chain Overview/1.1 Introduction.mp4 | 8.25 MB |
07. Cybersecurity Kill Chain™/Module 1 - Introduction and the Cyber Kill Chain Overview/1.2 The Cyber Kill Chain.mp4 | 22.19 MB |
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.1 Reconnaissance 1.mp4 | 58.89 MB |
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.2 Reconnaissance 2.mp4 | 32.35 MB |
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.3 Reconnaissance 3.mp4 | 27.88 MB |
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.4 Weaponization.mp4 | 29.22 MB |
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.5 Delivery.mp4 | 31.18 MB |
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.6 Exploitation and Installation.mp4 | 26.01 MB |
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.7 Command and Control.mp4 | 28.00 MB |
07. Cybersecurity Kill Chain™/Module 2 - The Cyber Kill Chain/2.8 Action on Objectives.mp4 | 35.61 MB |
07. Cybersecurity Kill Chain™/Module 3 - Defense in Depth Using the Cyber Kill Chain/3.1 Defense in Depth.mp4 | 17.12 MB |
07. Cybersecurity Kill Chain™/Module 4 - Conclusion/4.1 Conclusion.mp4 | 17.39 MB |
07. Cybersecurity Kill Chain™/Resources/1. Syllabus and Outline.pdf | 240.61 KB |
07. Cybersecurity Kill Chain™/Resources/2. Study Guide.pdf | 377.93 KB |
07. Cybersecurity Kill Chain™/Resources/3. Glossary.pdf | 201.84 KB |
07. Cybersecurity Kill Chain™/Resources/4. Module 2 - Weaponization Lab Using MSFvenom Step by Step Guide.pdf | 208.68 KB |
07. Cybersecurity Kill Chain™/Resources/5. Fingerprinting Using Nmap Step by Step Guide.pdf | 207.19 KB |
07. Cybersecurity Kill Chain™/Resources/6. Footprinting Using Passive Tools - NsLookup Step by Step Guide.pdf | 211.59 KB |
07. Cybersecurity Kill Chain™/Resources/7. Footprinting Using Passive Tools - Websites Step by Step Guide.pdf | 251.82 KB |
07. Cybersecurity Kill Chain™/Resources/8. Footprinting Using Passive Tools - Whois Step by Step Guide.pdf | 224.06 KB |
07. Cybersecurity Kill Chain™/Resources/9. Additional Resources.pdf | 147.13 KB |
08. Post Exploitation Hacking/Section 1/1.1 Post Exploitation Hacking Introduction.mp4 | 36.94 MB |
08. Post Exploitation Hacking/Section 1/1.2 Basics of Networking Mac & IP Addressing.mp4 | 27.81 MB |
08. Post Exploitation Hacking/Section 1/1.3 Basics of Networking - Tcp; Udp; Icmp.mp4 | 16.38 MB |
08. Post Exploitation Hacking/Section 1/1.4 Basics of Networking - Headers.mp4 | 35.51 MB |
08. Post Exploitation Hacking/Section 1/1.5 Introduction Information Gathering.mp4 | 15.11 MB |
08. Post Exploitation Hacking/Section 2/2.01 Linux Host Information Gathering (part 1) Ifconfig.mp4 | 33.99 MB |
08. Post Exploitation Hacking/Section 2/2.02 Linux Host Information Gathering (part 2) netstat.mp4 | 68.86 MB |
08. Post Exploitation Hacking/Section 2/2.03 Linux Host Information Gathering (part 3) Nsswitch.conf.info.mp4 | 27.36 MB |
08. Post Exploitation Hacking/Section 2/2.04 Linux Tools Lab (part 1) Ifconfig, Arp, Netstat.mp4 | 36.96 MB |
08. Post Exploitation Hacking/Section 2/2.05 Linux Tools Lab (part 2) Resolv.conf, Nmap, Nsswitch.mp4 | 30.53 MB |
08. Post Exploitation Hacking/Section 2/2.06 Linux Scanning Lab.mp4 | 67.87 MB |
08. Post Exploitation Hacking/Section 2/2.07 Linux Network Information Gathering Lecture (part 1).mp4 | 53.24 MB |
08. Post Exploitation Hacking/Section 2/2.08 Linux Network Information Gathering Lecture (part 2).mp4 | 54.81 MB |
08. Post Exploitation Hacking/Section 2/2.09 Linux Sniffing.mp4 | 78.73 MB |
08. Post Exploitation Hacking/Section 2/2.10 Windows Host Tools (part 1).mp4 | 39.89 MB |
08. Post Exploitation Hacking/Section 2/2.11 Windows Host Information Gathering Lecture.mp4 | 68.65 MB |
08. Post Exploitation Hacking/Section 2/2.12 Windows Host Tools (part 2).mp4 | 37.89 MB |
08. Post Exploitation Hacking/Section 2/2.13 Windows Network Tools Lab.mp4 | 46.80 MB |
08. Post Exploitation Hacking/Section 2/2.14 Windows Network Information Gathering Lecture (part 1).mp4 | 46.21 MB |
08. Post Exploitation Hacking/Section 2/2.15 Windows Network Information Gathering Lecture (part 2).mp4 | 48.98 MB |
08. Post Exploitation Hacking/Section 2/2.16 Windows Network Information Gathering Lecture (part 3).mp4 | 26.94 MB |
08. Post Exploitation Hacking/Section 3/3.01 Introduction Part 3 Persistence & Backdooring.mp4 | 11.91 MB |
08. Post Exploitation Hacking/Section 3/3.02 Tftp Use Lab.mp4 | 40.54 MB |
08. Post Exploitation Hacking/Section 3/3.03 Enabling Rdp Windows Lab.mp4 | 26.41 MB |
08. Post Exploitation Hacking/Section 3/3.04 Rdp Lecture.mp4 | 56.85 MB |
08. Post Exploitation Hacking/Section 3/3.05 Ncat Backdoor Lecture.mp4 | 34.35 MB |
08. Post Exploitation Hacking/Section 3/3.06 Windows Ncat Backdoor Lab.mp4 | 57.76 MB |
08. Post Exploitation Hacking/Section 3/3.07 New User Backdoor Lecture.mp4 | 26.17 MB |
08. Post Exploitation Hacking/Section 3/3.08 Windows New User Backdoor Lab.mp4 | 40.73 MB |
08. Post Exploitation Hacking/Section 3/3.09 Batch Schtasks At (part 1).mp4 | 33.39 MB |
08. Post Exploitation Hacking/Section 3/3.10 Batch Schtasks At (part 2) Windows Scheduling.mp4 | 53.25 MB |
08. Post Exploitation Hacking/Section 3/3.11 Linux Bash History - Touch - Lab.mp4 | 43.50 MB |
08. Post Exploitation Hacking/Section 4/4.1 Linux Bash History - Covering Tracks.mp4 | 40.79 MB |
08. Post Exploitation Hacking/Section 4/4.2 Password Cracking Concepts.mp4 | 61.04 MB |
08. Post Exploitation Hacking/Section 4/4.3 Windows Logs, Timestamps, & Passwords Lecture.mp4 | 72.16 MB |
08. Post Exploitation Hacking/Section 4/4.4 Windows Clearing Event Logs.mp4 | 37.67 MB |
08. Post Exploitation Hacking/Section 4/4.5 Windows Passwords.mp4 | 33.10 MB |
08. Post Exploitation Hacking/Section 4/4.6 Conclusion.mp4 | 46.72 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 1 - Introduction/1.1 Scanning & Enumeration Introduction.mp4 | 12.27 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.1 Checking for Live Systems Lab Part 1.mp4 | 38.24 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.2 Checking for Live Systems Lab Part 2.mp4 | 41.61 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.3 Checking for Open Ports Lab Part 1.mp4 | 34.85 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 2 - Check for Live Systems & Ports/2.4 Checking for Open Ports Lab Part 2.mp4 | 26.09 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.01 Scanning Introduction.mp4 | 21.91 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.02 Scanning with with NMAP Half Connect Scan.mp4 | 20.60 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.03 Scanning with NMAP Full Connect Scan.mp4 | 11.72 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.04 Scanning with XMAS Scan Part 1.mp4 | 16.58 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.05 Scanning with XMAS Scan Part 2.mp4 | 20.01 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.06 Scanning with NMAP ACK Scan.mp4 | 17.63 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.07 Scanning with NMAP ACK Scan and Windows Firewall.mp4 | 25.36 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.08 Scanning with hping3 and SYN Scan.mp4 | 32.87 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.09 Scanning with hping3 and ACK Scan.mp4 | 19.70 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.10 Scanning with hping3 and XMAS Scan.mp4 | 30.77 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 3 - Scanning/3.11 Scanning with hping3, ACK Scan, and Windows Firewall.mp4 | 27.46 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 4 - Fingerprinting & Banner Grabbing/4.1 OS Fingerprinting.mp4 | 41.31 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 4 - Fingerprinting & Banner Grabbing/4.2 Banner Grabbing.mp4 | 44.80 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 5 - Enumeration Tools/5.1 Zenmap.mp4 | 44.91 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 5 - Enumeration Tools/5.2 Dig and Finger Commands.mp4 | 35.78 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.1 Vulnerability Scanner Setup and Configuration of Core Impact Part 1.mp4 | 35.32 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.2 Vulnerability Scanner Setup and Configuration of Core Impact Part 2.mp4 | 34.25 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.3 Vulnerability Scanner Setup and Configuration of OpenVAS Part 1.mp4 | 35.85 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 6 - Vulnerabilities/6.4 Vulnerability Scanner Setup and Configuration of OpenVAS Part 2.mp4 | 55.89 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 7 - Conclusion/7.1 Vulnerability Scan Assessment Overview.mp4 | 6.56 MB |
09. Scanning, Enumeration, and Vulnerabilities/Module 7 - Conclusion/7.2 Scanning, Enumerations, & Vulnerabilities Conclusion.mp4 | 17.35 MB |
09. Scanning, Enumeration, and Vulnerabilities/Resources/01. Scanning & Enumeration Glossary.pdf | 229.97 KB |
09. Scanning, Enumeration, and Vulnerabilities/Resources/02. Scanning & Enumeration Study Guide.pdf | 197.21 KB |
09. Scanning, Enumeration, and Vulnerabilities/Resources/03. Scanning & Enumeration Step by Step Guide - Module 2 Lab 1.pdf | 172.75 KB |
09. Scanning, Enumeration, and Vulnerabilities/Resources/04. Scanning & Enumeration Step by Step Guide - Module 2 Lab 2.pdf | 143.53 KB |
09. Scanning, Enumeration, and Vulnerabilities/Resources/05. Scanning & Enumeration Step by Step Guide - Module 3 Lab.pdf | 171.91 KB |
09. Scanning, Enumeration, and Vulnerabilities/Resources/06. Scanning & Enumeration Step by Step Guide - Module 4 Lab 1.pdf | 106.58 KB |
09. Scanning, Enumeration, and Vulnerabilities/Resources/07. Scanning & Enumeration Step by Step Guide - Module 4 Lab 2.pdf | 106.69 KB |
09. Scanning, Enumeration, and Vulnerabilities/Resources/08. Scanning & Enumeration Step by Step Guide - Module 5 Lab.pdf | 87.72 KB |
09. Scanning, Enumeration, and Vulnerabilities/Resources/09. Scanning & Enumeration Step by Step Guide - Module 6 Lab 1.pdf | 116.84 KB |
09. Scanning, Enumeration, and Vulnerabilities/Resources/10. Scanning & Enumeration Step by Step Guide - Module 6 Lab 2.pdf | 118.77 KB |
09. Scanning, Enumeration, and Vulnerabilities/Resources/11. Scanning & Enumeration Scanning Assessment.pdf | 112.63 KB |
10. OWASP Top 10/Module 01 - Introduction/1.1 OWASP Introduction.mp4 | 12.75 MB |
10. OWASP Top 10/Module 01 - Introduction/1.2 Differences Between 2013 and 2017.mp4 | 15.01 MB |
10. OWASP Top 10/Module 02 - Injection/2.1 Vulnerabilities and Attacks.mp4 | 19.91 MB |
10. OWASP Top 10/Module 02 - Injection/2.2 SQL Injection Lab Instructions Part 1.mp4 | 44.50 MB |
10. OWASP Top 10/Module 02 - Injection/2.3 SQL Injection Lab Instructions Part 2.mp4 | 36.58 MB |
10. OWASP Top 10/Module 02 - Injection/2.4 Command Injection Lab Instructions.mp4 | 41.77 MB |
10. OWASP Top 10/Module 02 - Injection/2.5 HTML Injection Lab Instructions.mp4 | 38.20 MB |
10. OWASP Top 10/Module 03 - Broken Authentication/3.1 Broken Authentication.mp4 | 23.01 MB |
10. OWASP Top 10/Module 03 - Broken Authentication/3.2 Broken Authentication Lab Instructions Part 1.mp4 | 36.28 MB |
10. OWASP Top 10/Module 03 - Broken Authentication/3.3 Broken Authentication Lab Instructions Part 2.mp4 | 24.54 MB |
10. OWASP Top 10/Module 04 - Sensitive Data Exposure/4.1 Sensitive Data Exposure.mp4 | 17.95 MB |
10. OWASP Top 10/Module 04 - Sensitive Data Exposure/4.2 Sensitive Data Exposure NIKTO Lab Instructions Part 1.mp4 | 50.01 MB |
10. OWASP Top 10/Module 04 - Sensitive Data Exposure/4.3 Sensitive Data Exposure NIKTO Lab Instructions Part 2.mp4 | 68.45 MB |
10. OWASP Top 10/Module 04 - Sensitive Data Exposure/4.4 Sensitive Data Exposure DIRBUSTER Lab Instructions.mp4 | 39.69 MB |
10. OWASP Top 10/Module 04 - Sensitive Data Exposure/4.5 Sensitive Data Exposure ERROR MESSAGES Lab Instructions.mp4 | 21.20 MB |
10. OWASP Top 10/Module 05 - XML External Entities/5.1 XML External Entities.mp4 | 13.02 MB |
10. OWASP Top 10/Module 05 - XML External Entities/5.2 XML External Entities Lab Instruction Part 1.mp4 | 43.76 MB |
10. OWASP Top 10/Module 05 - XML External Entities/5.3 XML External Entities Lab Instruction Part 2.mp4 | 27.26 MB |
10. OWASP Top 10/Module 06 - Broken Access Control/6.1 Broken Access Control.mp4 | 15.82 MB |
10. OWASP Top 10/Module 06 - Broken Access Control/6.2 Broken Access Control Lab Instructions Part 1.mp4 | 52.11 MB |
10. OWASP Top 10/Module 06 - Broken Access Control/6.3 Broken Access Control Lab Instructions Part 2.mp4 | 32.23 MB |
10. OWASP Top 10/Module 07 - Security Misconfiguration/7.1 Security Misconfigurations.mp4 | 12.54 MB |
10. OWASP Top 10/Module 07 - Security Misconfiguration/7.2 Security Misconfiguration Lab Instructions Part 1.mp4 | 47.57 MB |
10. OWASP Top 10/Module 07 - Security Misconfiguration/7.3 Security Misconfiguration Lab Instructions Part 2.mp4 | 55.26 MB |
10. OWASP Top 10/Module 08 - Cross-Site Scripting (XSS)/8.1 XSS.mp4 | 14.35 MB |
10. OWASP Top 10/Module 08 - Cross-Site Scripting (XSS)/8.2 Reflected XSS Attack Lab Instructions.mp4 | 61.18 MB |
10. OWASP Top 10/Module 09 - Insecure Deserialization/9.1 Insecure Deserialization.mp4 | 14.38 MB |
10. OWASP Top 10/Module 09 - Insecure Deserialization/9.2 Insecure Deserialization Lab Instructions.mp4 | 43.33 MB |
10. OWASP Top 10/Module 10 - Using Components with Known Vulnerabilities/10.1 Using Components with Known Vulnerabilities.mp4 | 16.99 MB |
10. OWASP Top 10/Module 10 - Using Components with Known Vulnerabilities/10.2 Using Components with Known Vulnerabilities Lab Instructions Part 1.mp4 | 56.13 MB |
10. OWASP Top 10/Module 10 - Using Components with Known Vulnerabilities/10.3 Using Components with Known Vulnerabilities Lab Instructions Part 2.mp4 | 63.91 MB |
10. OWASP Top 10/Module 10 - Using Components with Known Vulnerabilities/10.4 Using Components with Known Vulnerabilities Lab Instructions Part 3.mp4 | 41.60 MB |
10. OWASP Top 10/Module 11 - Insufficient Logging & Monitoring/11.1 Insufficient Monitoring & Logging Overview.mp4 | 18.05 MB |
10. OWASP Top 10/Module 11 - Insufficient Logging & Monitoring/11.2 Insufficient Logging & Monitoring Lab Instructions Part 1.mp4 | 58.97 MB |
10. OWASP Top 10/Module 11 - Insufficient Logging & Monitoring/11.3 Insufficient Logging & Monitoring Lab Instructions Part 2.mp4 | 28.36 MB |
10. OWASP Top 10/Module 11 - Insufficient Logging & Monitoring/11.4 OWASP Capstone Lab Instructions.mp4 | 11.91 MB |
10. OWASP Top 10/Module 12 - Course Summary/12.1 OWASP Course Summary.mp4 | 30.64 MB |
10. OWASP Top 10/Resources/01. Syllabus and Outline.pdf | 172.54 KB |
10. OWASP Top 10/Resources/02. Study Guide OWASP.pdf | 313.74 KB |
10. OWASP Top 10/Resources/03. Glossary OWASP.pdf | 214.84 KB |
10. OWASP Top 10/Resources/04. Module 2 - Step by Step Guide - Injection Lab.pdf | 203.37 KB |
10. OWASP Top 10/Resources/05. Module 3 - Step by Step Guide - Broken Authentication Lab.pdf | 154.91 KB |
10. OWASP Top 10/Resources/06. Module 4 - Step by Step Guide - Sensitive Data Exposure Lab.pdf | 201.40 KB |
10. OWASP Top 10/Resources/07. Module 5 - Step by Step Guide - XML External Entities Lab.pdf | 184.83 KB |
10. OWASP Top 10/Resources/08. Module 6 - Step by Step Guide - Broken Access Control Lab.pdf | 188.64 KB |
10. OWASP Top 10/Resources/09. Module 7 - Step by Step Guide - Security Misconfiguration Lab.pdf | 202.11 KB |
10. OWASP Top 10/Resources/10. Module 8 - Step by Step Guide - Cross Site Scripting XSS Lab.pdf | 186.37 KB |
10. OWASP Top 10/Resources/11. Module 9 - Step by Step Guide - Insecure Deserialization Lab.pdf | 184.17 KB |
10. OWASP Top 10/Resources/12. Module 10 - Step by Step Guide - Using Components with Known Vulnerabilities Lab.pdf | 192.58 KB |
10. OWASP Top 10/Resources/13. Module 11 - Step by Step Guide - Insufficient Logging and Monitoring Lab.pdf | 184.54 KB |
11. Sniffing/Module 1 - Introduction/1.1 Introduction.mp4 | 8.85 MB |
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.01 Wireshark Lab Part 1.mp4 | 40.15 MB |
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.02 Wireshark Lab Part 2.mp4 | 46.76 MB |
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.03 Wireshark Lab Part 3.mp4 | 36.90 MB |
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.04 Packet Sniffing Lab Part 1.mp4 | 44.34 MB |
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.05 Packet Sniffing Lab Part 2.mp4 | 22.58 MB |
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.06 Applying Filters to TCPDUMP and Wireshark Lab Part 1.mp4 | 52.87 MB |
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.07 Applying Filters to TCPDUMP and Wireshark Lab Part 2.mp4 | 76.09 MB |
11. Sniffing/Module 2 - Wireshark and TCPDUMP/2.08 TCPDUMP Lab.mp4 | 50.16 MB |
11. Sniffing/Module 3 - Conclusion/3.1 Capstone Lab Navigation.mp4 | 7.56 MB |
11. Sniffing/Module 3 - Conclusion/3.2 Conclusion.mp4 | 6.70 MB |
11. Sniffing/Resources/01. Syllabus and Outline.pdf | 243.52 KB |
11. Sniffing/Resources/02. Glossary.pdf | 365.65 KB |
11. Sniffing/Resources/03. Study Guide.pdf | 324.64 KB |
11. Sniffing/Resources/04. Lab 1 Wireshark - Step by Step Guide.pdf | 141.86 KB |
11. Sniffing/Resources/05. Lab 2 Packet Sniffing - Step by Step Guide.pdf | 136.38 KB |
11. Sniffing/Resources/06. Lab 3 Applying Filters to TCPDump and Wireshark - Step by Step Guide.pdf | 142.14 KB |
11. Sniffing/Resources/07. Lab 4 TCPDump - Step by Step Guide.pdf | 129.77 KB |
11. Sniffing/Resources/08. TCPDump Cheat Sheet.pdf | 161.28 KB |
11. Sniffing/Resources/09. Wireshark Cheat Sheet.pdf | 272.37 KB |
11. Sniffing/Resources/10. Wireshark & TCPDump - Instructor Notes.pdf | 531.80 KB |
11. Sniffing/Resources/11. Wireshark Filters.pdf | 189.41 KB |
11. Sniffing/Resources/12. Wireshark & TCPDump Sources.pdf | 111.41 KB |
12. Introduction to Splunk/Module 1 - Introduction/1.1 Welcome.mp4 | 16.11 MB |
12. Introduction to Splunk/Module 1 - Introduction/1.2 What is Splunk.mp4 | 16.90 MB |
12. Introduction to Splunk/Module 1 - Introduction/1.3 Splunk and Your Career.mp4 | 28.95 MB |
12. Introduction to Splunk/Module 2 - Splunk Products, Resources, and Certifications/2.1 Splunk Products, Resources, and Certifications.mp4 | 2.99 MB |
12. Introduction to Splunk/Module 2 - Splunk Products, Resources, and Certifications/2.2 Splunk Website.mp4 | 25.80 MB |
12. Introduction to Splunk/Module 2 - Splunk Products, Resources, and Certifications/2.3 Splunk Products.mp4 | 19.22 MB |
12. Introduction to Splunk/Module 3 - Setting Up Splunk/3.1 Setting Up Splunk.mp4 | 9.88 MB |
12. Introduction to Splunk/Module 3 - Setting Up Splunk/3.2 Parts of Splunk.mp4 | 17.22 MB |
12. Introduction to Splunk/Module 3 - Setting Up Splunk/3.3 Installing Splunk on Linux.mp4 | 40.55 MB |
12. Introduction to Splunk/Module 3 - Setting Up Splunk/3.4 Installing Splunk on Windows.mp4 | 22.40 MB |
12. Introduction to Splunk/Module 3 - Setting Up Splunk/3.5 Installing a Universal Forwarder.mp4 | 19.03 MB |
12. Introduction to Splunk/Module 4 - Data/4.1 Data.mp4 | 1.56 MB |
12. Introduction to Splunk/Module 4 - Data/4.2 Web Interface Tour.mp4 | 33.11 MB |
12. Introduction to Splunk/Module 4 - Data/4.3 Ways to Get Data.mp4 | 47.88 MB |
12. Introduction to Splunk/Module 4 - Data/4.4 Inputs Monitoring.mp4 | 28.31 MB |
12. Introduction to Splunk/Module 5 - Using Data/5.1 Using Data.mp4 | 2.13 MB |
12. Introduction to Splunk/Module 5 - Using Data/5.2 Searches.mp4 | 21.53 MB |
12. Introduction to Splunk/Module 5 - Using Data/5.3 Alerts.mp4 | 36.26 MB |
12. Introduction to Splunk/Module 5 - Using Data/5.4 Reports and Dashboards.mp4 | 23.07 MB |
12. Introduction to Splunk/Module 5 - Using Data/5.5 App Basics.mp4 | 19.93 MB |
12. Introduction to Splunk/Module 6 - Conclusion/6.1 More to Learn.mp4 | 9.63 MB |
12. Introduction to Splunk/Module 6 - Conclusion/6.2 Final Review.mp4 | 9.28 MB |
12. Introduction to Splunk/Resources/1. Syllabus and Outline.pdf | 235.49 KB |
12. Introduction to Splunk/Resources/2. Study Guide.pdf | 672.37 KB |
12. Introduction to Splunk/Resources/3. Glossary.pdf | 138.48 KB |
12. Introduction to Splunk/Resources/4. Cheet Sheet.pdf | 107.72 KB |
12. Introduction to Splunk/Resources/5. Lab Info.pdf | 416.35 KB |
12. Introduction to Splunk/Resources/6. Additional Readings.pdf | 230.45 KB |
12. Introduction to Splunk/Resources/7. Quiz Questions.pdf | 158.70 KB |
12. Introduction to Splunk/Resources/8. Slides/1.2 Slide Handout.pdf | 4.92 MB |
12. Introduction to Splunk/Resources/8. Slides/1.3 Slide Handout.pdf | 3.88 MB |
12. Introduction to Splunk/Resources/8. Slides/2.3 Slide Handout.pdf | 3.98 MB |
12. Introduction to Splunk/Resources/8. Slides/3.2 Slide Handout.pdf | 3.07 MB |
12. Introduction to Splunk/Resources/8. Slides/3.3 Slide Handout.pdf | 2.05 MB |
12. Introduction to Splunk/Resources/8. Slides/3.4 Slide Handout.pdf | 1.52 MB |
12. Introduction to Splunk/Resources/8. Slides/4.3 Slide Handout.pdf | 1.71 MB |
12. Introduction to Splunk/Resources/8. Slides/4.4 Slide Handout.pdf | 2.87 MB |
12. Introduction to Splunk/Resources/8. Slides/5.2 Slide Handout.pdf | 1.80 MB |
12. Introduction to Splunk/Resources/8. Slides/5.3 Slide Handout.pdf | 2.95 MB |
12. Introduction to Splunk/Resources/8. Slides/5.4 Slide Handout.pdf | 2.95 MB |
12. Introduction to Splunk/Resources/8. Slides/5.5 Slide Handout.pdf | 2.69 MB |
12. Introduction to Splunk/Resources/8. Slides/6.1 Slide Handout.pdf | 2.69 MB |
12. Introduction to Splunk/Resources/8. Slides/6.2 Slide Handout.pdf | 1.55 MB |
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.1 Course Introduction.mp4 | 14.78 MB |
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.2 Web Applications Architecture Review Part 1.mp4 | 34.57 MB |
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.3 Web Applications Architecture Review Part 2.mp4 | 32.96 MB |
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.4 Web Server Logs Review Part 1.mp4 | 26.16 MB |
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.5 Web Server Logs Review Part 2.mp4 | 29.27 MB |
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.6 Tips and Common Issues Part 1.mp4 | 29.88 MB |
13. Identifying Web Attacks Through Logs/Module 1_ Introduction and Review/1.7 Tips and Common Issues Part 2.mp4 | 32.91 MB |
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.1 Web Application Attacks Review.mp4 | 38.25 MB |
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.10 Course Summary.mp4 | 14.52 MB |
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.2 Vulnerability Scans.mp4 | 38.67 MB |
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.3 Brute Force Attacks.mp4 | 32.63 MB |
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.4 SQL Injection.mp4 | 43.20 MB |
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.5 File Inclusion.mp4 | 29.28 MB |
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.6 XSS_ Cross-Site Scripting.mp4 | 34.34 MB |
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.7 CSRF_ Cross Site Request Forgery.mp4 | 17.46 MB |
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.8 Other Log Sources Part 1.mp4 | 42.54 MB |
13. Identifying Web Attacks Through Logs/Module 2_ Identifying Web Attacks Through Logs/2.9 Other Log Sources Part 2.mp4 | 31.91 MB |
13. Identifying Web Attacks Through Logs/Resources/1. Syllabus and Outline.pdf | 107.97 KB |
13. Identifying Web Attacks Through Logs/Resources/2. Glossary.pdf | 185.90 KB |
13. Identifying Web Attacks Through Logs/Resources/3. Study Guide.pdf | 4.59 MB |
13. Identifying Web Attacks Through Logs/Resources/4. Quiz.pdf | 919.67 KB |
13. Identifying Web Attacks Through Logs/Resources/5. Internet Logs.zip | 453.93 KB |
13. Identifying Web Attacks Through Logs/Resources/6. Lab logs.zip | 1.48 MB |
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.01 What is PowerShell.mp4 | 30.73 MB |
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.02 Working with P2.mp4 | 29.53 MB |
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.03 Command Line.mp4 | 24.01 MB |
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.04 Getting Help.mp4 | 42.23 MB |
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.05 Additional Piping.mp4 | 25.08 MB |
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.06 Additional Help.mp4 | 22.80 MB |
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.07 Scripting Basics.mp4 | 43.37 MB |
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.08 Common Commands Part 1.mp4 | 40.60 MB |
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.09 Common Commands Part 2.mp4 | 69.70 MB |
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.10 Common Commands Part 3.mp4 | 20.82 MB |
15. Intro to Powershell Scripting/Module 1 - Intro to PowerShell Scripting/1.11 Common Commands Part 4.mp4 | 33.82 MB |
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.01 Why Security+.mp4 | 32.33 MB |
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.02 Risk Management and Security Basics.mp4 | 13.88 MB |
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.03 Risk Management Overview.mp4 | 15.10 MB |
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.04 Use and Misuse Cases.mp4 | 11.64 MB |
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.05 Risk Assessment.mp4 | 24.39 MB |
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.06 Risk Mitigation.mp4 | 19.00 MB |
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.07 Risk Monitoring.mp4 | 6.71 MB |
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.08 Security Principles - Confidentiality.mp4 | 18.94 MB |
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.09 Integrity and Availability Threats and Mitigation.mp4 | 9.46 MB |
16. CompTIA Security+ (SY0-601)/Module 1 - Risk Management and Security Basics/1.10 Security Principles Wrap-Up.mp4 | 5.66 MB |
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.01 Understanding Attacks.mp4 | 13.23 MB |
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.02 Social Engineering.mp4 | 13.08 MB |
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.03 Malware.mp4 | 8.71 MB |
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.04 Network-Based Attacks.mp4 | 26.90 MB |
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.05 Spoofing and Redirection.mp4 | 10.60 MB |
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.06 DNS Service.mp4 | 25.00 MB |
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.07 Passwords.mp4 | 15.23 MB |
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.08 Wireless Security Part 1.mp4 | 27.26 MB |
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.09 Wireless Security Part 2.mp4 | 19.03 MB |
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.10 Application Attacks.mp4 | 9.61 MB |
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.11 Code Injection and Cross Site Scripting.mp4 | 27.00 MB |
16. CompTIA Security+ (SY0-601)/Module 2 - Threats, Attacks and Vulnerabilities/2.12 XSRF Race Conditions and Memory Issues.mp4 | 17.24 MB |
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.01 Cryptography Introduction and Services.mp4 | 12.88 MB |
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.02 Cryptography Definitions - Initialization Vectors.mp4 | 26.30 MB |
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.03 Algorithms and Keys.mp4 | 8.69 MB |
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.04 Desirable Qualities of Algorithms and Keys.mp4 | 15.20 MB |
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.05 Symmetric Cryptography.mp4 | 16.93 MB |
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.06 Symmetric Ciphers Stream and Block.mp4 | 17.72 MB |
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.07 Asymmetric Cryptography.mp4 | 13.03 MB |
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.08 Hashing for Integrity.mp4 | 20.82 MB |
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.09 MAC Message Authentication Code.mp4 | 9.56 MB |
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.10 Hybrid Cryptography SSL and TLS.mp4 | 13.31 MB |
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.11 SSL, TLS and PKI Introduction.mp4 | 10.51 MB |
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.12 PKI Continued.mp4 | 23.11 MB |
16. CompTIA Security+ (SY0-601)/Module 3 - Cryptography/3.13 PGP and SMIME.mp4 | 13.38 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.01 Networking Concepts.mp4 | 23.61 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.02 Network Connectivity.mp4 | 17.78 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.03 Network Services Continued - DHCP and IPAM.mp4 | 24.85 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.04 OSI Model Introduction and Encapsulation.mp4 | 31.85 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.05 OSI Layers 1 and 2.mp4 | 47.33 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.06 OSI Layers 3 and 4.mp4 | 26.85 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.07 OSI Layers 5, 6, 7 and Summary.mp4 | 25.42 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.08 Ports and Protocols Introduction.mp4 | 13.09 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.09 Protocols of the TCPIP Suite Part 1.mp4 | 36.09 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.10 Protocols of the TCPIP Suite Part 2.mp4 | 21.49 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.11 Network Services DNS.mp4 | 26.83 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.12 Network Storage.mp4 | 18.48 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.13 Remote Access.mp4 | 15.54 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.14 Tunneling and IPSec Part 1.mp4 | 24.06 MB |
16. CompTIA Security+ (SY0-601)/Module 4 - Network Security/4.15 Tunneling and IPSec Part 2.mp4 | 23.09 MB |
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.01 Network Connectivity Devices Part 1.mp4 | 31.38 MB |
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.02 Network Connectivity Devices Part 2.mp4 | 13.03 MB |
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.03 Switch and VLAN Configuration Part 1.mp4 | 18.82 MB |
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.04 Switch and VLAN Configuration Part 2.mp4 | 13.58 MB |
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.05 Routing.mp4 | 34.89 MB |
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.06 Network Address Translation.mp4 | 14.54 MB |
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.07 Firewalls.mp4 | 35.75 MB |
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.08 Firewall Best Practices.mp4 | 17.93 MB |
16. CompTIA Security+ (SY0-601)/Module 5 - Network Connectivity Devices/5.09 Intrusion Detection and Prevention.mp4 | 33.92 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.01 Introduction and Policy.mp4 | 11.50 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.02 Policies and Best Practices Part 1.mp4 | 27.32 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.03 Policies and Best Practices Part 2.mp4 | 23.46 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.04 Scanning, Monitoring and Patching.mp4 | 27.52 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.05 Patch Lifecycle Baselines and Traffic Analysis.mp4 | 25.20 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.06 Fault Management.mp4 | 17.67 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.07 RAID and Data Backups.mp4 | 25.68 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.08 Business Continuity and Disaster Recovery Part 1.mp4 | 32.05 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.09 Business Continuity and Disaster Recovery Part 2.mp4 | 14.63 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.10 Virtualization Part 1.mp4 | 25.65 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.11 Virtualization Part 2.mp4 | 24.49 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.12 Cloud Computing.mp4 | 15.45 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.13 Cloud Services.mp4 | 39.54 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.14 Cloud Deployment Models and Cloud Wrap-Up.mp4 | 14.99 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.15 IoT Introduction.mp4 | 13.42 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.16 OWASP IoT and Wrap-Up.mp4 | 20.82 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.17 Hardening the System Part 1.mp4 | 9.22 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.18 Hardening the System Part 2.mp4 | 12.82 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.19 Vulnerability Assessments and Penetration Tests.mp4 | 16.99 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.20 Incident Response.mp4 | 11.49 MB |
16. CompTIA Security+ (SY0-601)/Module 6 - Operational Security/6.21 Forensic Investigations.mp4 | 18.34 MB |
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.01 Identity and Access Management Introduction.mp4 | 12.98 MB |
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.02 Authentication.mp4 | 38.50 MB |
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.03 Single Sign-On Kerberos Part 1.mp4 | 21.42 MB |
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.04 Single Sign-On Kerberos Part 2.mp4 | 13.69 MB |
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.05 Single Sign-On with Federated Services Part 1.mp4 | 22.17 MB |
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.06 Single Sign-On with Federated Services Part 2.mp4 | 17.85 MB |
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.07 Network Access Control and Authentication Wrap-Up.mp4 | 20.61 MB |
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.08 Authorization.mp4 | 27.19 MB |
16. CompTIA Security+ (SY0-601)/Module 7 - Identity and Access Management/7.09 Auditing and Wrap-Up.mp4 | 6.36 MB |
16. CompTIA Security+ (SY0-601)/Resources/1. CompTIA Security Plus Syllabus and Outline.pdf | 205.21 KB |
https://opentracker.i2p.rocks:443/announce |
https://tracker.bt4g.com:443/announce |
udp://bt.ktrackers.com:6666/announce |
udp://bt1.archive.org:6969/announce |
udp://exodus.desync.com:6969/announce |
udp://explodie.org:6969/announce |
udp://movies.zsw.ca:6969/announce |
udp://open.demonii.com:1337/announce |
udp://open.stealth.si:80/announce |
udp://open.tracker.cl:1337/announce |
udp://open.tracker.ink:6969/announce |
udp://opentracker.i2p.rocks:6969/announce |
udp://opentracker.io:6969/announce |
udp://tracker-udp.gbitt.info:80/announce |
udp://tracker.auctor.tv:6969/announce |
udp://tracker.moeking.me:6969/announce |
udp://tracker.opentrackr.org:1337/announce |
udp://tracker.skyts.net:6969/announce |
udp://tracker.tiny-vps.com:6969/announce |
udp://tracker.torrent.eu.org:451/announce |
udp://tracker1.bt.moack.co.kr:80/announce |
TorrentBank
Copyright © 2024