搜索
The Complete Cybersecurity Bootcamp, 2nd Edition
磁力链接/BT种子名称
The Complete Cybersecurity Bootcamp, 2nd Edition
磁力链接/BT种子简介
种子哈希:
592eb51388846a7fbd607faea10e0b8688207de9
文件大小:
6.22G
已经下载:
12832
次
下载速度:
极快
收录时间:
2023-12-17
最近下载:
2026-04-04
DMCA/投诉/Complaint:
DMCA/投诉/Complaint
移花宫入口
移花宫.com
邀月.com
怜星.com
花无缺.com
yhgbt.icu
yhgbt.top
磁力链接下载
magnet:?xt=urn:btih:592EB51388846A7FBD607FAEA10E0B8688207DE9
推荐使用
PIKPAK网盘
下载资源,10TB超大空间,不限制资源,无限次数离线下载,视频在线观看
下载BT种子文件
磁力链接
迅雷下载
PIKPAK在线播放
世界之窗
小蓝俱乐部
含羞草
欲漫涩
逼哩逼哩
快手视频
51品茶
萝莉岛APP
51动漫
91短视频
抖音Max
91porn视频
TikTok成人版
PornHub
暗网Xvideo
草榴社区
P站专业版
海角乱伦
萝莉岛
搜同
91妻友
最近搜索
姐二
母狗『九九』
動畫
翔哥
buffy the vampire slayer
sword+art+online+progressive
국 아다
pornfidelity bridgette b
maze runner: the death cure 2018
伪娘+撸
h0930-ori1547
女友+后入
小宇
sviatoslav richter bach
wwe smackdown 2020
magazine pdf
风吟
n6000-uk9.7.3.8.n1.1.bin
arknights: perish in frost
resident+evil+hd+remaster
peanky blinders 2 temporada 720p
great performances season 1
mythological cold towers
名侦探柯南 782
the+lawnmower+man+1992+
新婚科教片
lego the hobbit
death by lightning s01
heydouga-4290-007
the+final+countdown+1980
文件列表
Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS.mp4
86.6 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration.mp4
80.0 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats.mp4
79.0 MB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks.mp4
76.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques.mp4
75.8 MB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts.mp4
74.4 MB
Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors.mp4
73.4 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration.mp4
71.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery.mp4
69.7 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs).mp4
68.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall.mp4
68.2 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper.mp4
66.1 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework.mp4
65.8 MB
Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS.mp4
63.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools.mp4
63.3 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption.mp4
62.7 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration.mp4
61.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering.mp4
59.1 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection.mp4
57.2 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth.mp4
52.3 MB
Module 5 Mobile Device Security/Lesson 31 Fundamentals of Android Security/004. 31.3 Understanding Android Hacking Tools and Methodologies.mp4
50.8 MB
Module 6 Internet of Things (IoT) Security/Lesson 34 Hacking IoT Devices/002. 34.1 Surveying Tools for Dissasembling iOS Applications.mp4
50.7 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 23 Building Your Lab and Attack Hardware/003. 23.2 Surveying Wi-Fi Devices Like the Pinneaple.mp4
49.7 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/006. 21.5 Surveying Wireless Hacking Tools.mp4
49.6 MB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/011. 33.10 Understanding OT Countermeasures.mp4
48.8 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/007. 1.6 Defining Threat Intelligence.mp4
47.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/014. 19.13 Attacking Web Services, APIs, and Understanding Webhooks.mp4
47.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/012. 19.11 Exploiting Cross-site Scripting (XSS) Vulnerabilities.mp4
47.4 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/004. 15.3 Explaining the Importance of the Planning and Preparation Phase.mp4
47.1 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/008. 19.7 Attacking Authentication, Authorization, and Access Controls - Part 2.mp4
46.5 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/002. 5.1 Describing Concepts as Documented in NIST.SP800-86.mp4
46.3 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/004. 19.3 Footprinting Web Infrastructures.mp4
45.9 MB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/007. 33.6 Introducing OT Concepts.mp4
44.7 MB
Module 5 Mobile Device Security/Lesson 31 Fundamentals of Android Security/002. 31.1 Hacking Android Devices.mp4
44.6 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/004. 5.3 Scoping the Incident Response Plan and Process.mp4
43.7 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 18 Hacking Web Servers/004. 18.3 Surveying Web Server Attack Tools.mp4
41.7 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/006. 17.5 Performing OS Discovery (Banner GrabbingOS Fingerprinting).mp4
41.6 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/003. 19.2 Understanding Web App Threats and Hacking Methodologies.mp4
41.2 MB
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/007. 4.6 Examining Digital Certificates.mp4
40.9 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/007. 27.6 Cracking Passwords with hashcat.mp4
40.9 MB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/005. 33.4 Surveying IoT Hacking Tools.mp4
39.9 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/005. 17.4 Understanding Port and Service Discovery.mp4
39.6 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/013. 14.12 Introducing APIs, NETCONF, RESTCONF, and YANG.mp4
39.0 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/007. 9.6 Understanding Windows Forensics Basics.mp4
39.0 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/006. 16.5 Understanding Website Footprinting.mp4
38.6 MB
Module 6 Internet of Things (IoT) Security/Lesson 34 Hacking IoT Devices/005. 34.4 Exploring ZWave.mp4
38.1 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/003. 5.2 Mapping the Organization Stakeholders Against the NIST IR Categories.mp4
37.9 MB
Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/005. 29.4 Understanding Mobile Device Management.mp4
37.8 MB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/010. 33.9 Surveying OT Hacking Tools.mp4
37.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/008. 21.7 Introducing Wireless Countermeasures.mp4
37.2 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/011. 6.10 Grasping Security Monitoring Operational Challenges.mp4
36.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/003. 17.2 Exploiting Scanning Tools.mp4
36.7 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/008. 5.7 Analyzing Product Security Incident Response Teams (PSIRTs).mp4
36.3 MB
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/005. 4.4 Understanding Hashing Algorithms.mp4
36.3 MB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/006. 33.5 Understanding IoT Countermeasures.mp4
36.2 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/010. 17.9 Performing NetBIOS Enumeration.mp4
36.2 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/002. 3.1 Surveying Types of Vulnerabilities.mp4
35.9 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management.mp4
35.3 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/002. 6.1 Describing Endpoint-based Attacks.mp4
35.0 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/012. 9.11 Understanding Linux and MAC OS X Forensics Basics.mp4
34.8 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/002. 10.1 Introducing Intrusion Analysis Fundamentals.mp4
34.3 MB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/008. 33.7 Performing OT Attacks.mp4
32.8 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/011. 14.10 Introducing Network Programmability.mp4
32.4 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 26 Post-Exploitation Techniques/002. 26.1 Maintaining Persistence After Compromising a System.mp4
31.8 MB
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/002. 4.1 Understanding the Basic Components of Cryptography.mp4
31.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 22 Wireless Client Attacks/002. 22.1 Understanding Wireless Client Attacks and Their Motives.mp4
31.7 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/002. 21.1 Introducing Wireless Concepts.mp4
31.6 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/004. 3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling.mp4
30.9 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/002. 11.1 Understanding Authentication.mp4
30.6 MB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/002. 37.1 Introducing Cloud Computing Concepts.mp4
30.6 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 28 Reporting and Communication/004. 28.3 Explaining the Importance of Appropriate Communication.mp4
30.2 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/005. 14.4 Introducing Cisco DNA and Cisco DNA Center.mp4
29.9 MB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/004. 33.3 Understanding IoT Hacking Methodologies.mp4
29.8 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/008. 1.7 Defining Threat Hunting.mp4
29.6 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/009. 1.8 Understanding Malware Analysis.mp4
29.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 23 Building Your Lab and Attack Hardware/004. 23.3 Building Your Own Lab.mp4
29.2 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/003. 10.2 Examining Packet Captures.mp4
28.9 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/003. 3.2 Understanding Passive Reconnaissance and Social Engineering.mp4
28.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/002. 16.1 Introducing Footprinting Concepts and Methodologies.mp4
27.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/009. 16.8 Understanding DNS Footprinting.mp4
27.7 MB
Module 5 Mobile Device Security/Lesson 30 Mobile Device Security/004. 30.3 Understanding Mobile Device Management (MDM).mp4
27.7 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/002. 19.1 Introducing Web Application Concepts.mp4
27.6 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/015. 3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection.mp4
27.6 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 18 Hacking Web Servers/002. 18.1 Introducing Web Server Concepts.mp4
26.3 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/008. 17.7 Creating Network Diagrams.mp4
26.2 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/014. 14.13 A Brief Introduction to Git.mp4
26.1 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/002. 24.1 Introducing the Aircrack-ng Suite.mp4
25.8 MB
Module 5 Mobile Device Security/Lesson 30 Mobile Device Security/003. 30.2 Wrestling with the BYOD Dilemma.mp4
25.7 MB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/003. 2.2 Comparing Threats, Vulnerabilities, and Exploits.mp4
25.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/008. 25.7 Surveying Tools to Find and Exploit Buffer Overflows.mp4
25.4 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/002. 7.1 Identifying and Mitigating Reconnaissance.mp4
25.2 MB
Module 6 Internet of Things (IoT) Security/Lesson 35 Attacking Bluetooth/003. 35.2 Surveying Tools for Bluetooth Monitoring.mp4
25.2 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/008. 11.7 Exploring Multifactor Authentication and Single Sign-On.mp4
24.8 MB
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/003. 38.2 Exploring Social Engineering Techniques.mp4
24.6 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/011. 9.10 Surveying Windows Forensics Hard Drives, FAT, and NTFS.mp4
24.1 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/005. 19.4 Analyzing Web Applications.mp4
24.1 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/012. 17.11 Performing LDAP Enumeration.mp4
23.5 MB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/009. 33.8 Understanding OT Hacking Methodologies.mp4
23.3 MB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/002. 2.1 Performing Risk Assessment.mp4
23.2 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/013. 3.12 Identifying the Challenges of Data Visibility in Detection.mp4
23.2 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/004. 16.3 Performing Footprinting through Web Services.mp4
23.2 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/002. 25.1 Understanding Buffer Overflows.mp4
23.2 MB
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/006. 4.5 Examining Secure Socket Layer and Transport Layer Security.mp4
23.1 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/011. 19.1 Input Validation and Sanitation.mp4
22.7 MB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/010. 37.9 Introducing Agile, DevOps, and CICD Pipelines.mp4
22.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 18 Hacking Web Servers/005. 18.4 Understanding Patch Management.mp4
22.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/002. 27.1 Understanding Authentication and Authorization Mechanisms.mp4
22.4 MB
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/005. 38.4 Impersonation on Social Networking Sites.mp4
22.4 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/003. 15.2 Exploring Penetration Testing Methodologies.mp4
22.1 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/007. 19.6 Attacking Authentication, Authorization, and Access Controls - Part 1.mp4
22.0 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/008. 16.7 Understanding Whois Footprinting.mp4
21.9 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/013. 9.12 Examining Web Server Logs.mp4
21.9 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/002. 8.1 Examining Types of Evidence.mp4
21.9 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/002. 15.1 Introducing Ethical Hacking and Pen Testing.mp4
21.6 MB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/012. 2.11 Understanding Rule-based Access Control.mp4
21.4 MB
Module 5 Mobile Device Security/Lesson 30 Mobile Device Security/005. 30.4 Understanding Mobile Device Security Policies.mp4
21.3 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/005. 21.4 Understanding Wireless Hacking Methodologies.mp4
21.3 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/006. 19.5 Introducing the OWASP Top 10.mp4
21.2 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/002. 20.1 Introducing SQL Injection Concepts.mp4
21.1 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/010. 9.9 Surveying Windows Forensics The Windows Registry.mp4
21.0 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/006. 25.5 Creating a Fuzzing Strategy.mp4
21.0 MB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/003. 37.2 Exploring Container Technology.mp4
20.9 MB
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/003. 4.2 Introducing Public Key Infrastructure.mp4
20.8 MB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/005. 37.4 Surveying Cloud Computing Threats.mp4
20.6 MB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/006. 37.5 Understanding Cloud Hacking and Cloud Security Implementations.mp4
20.6 MB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/007. 2.6 Examining the Access Control Process Security and Access Control Classification.mp4
20.6 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/003. 16.2 Performing Footprinting through Search Engines.mp4
20.3 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/013. 19.12 Exploiting XML External Entities.mp4
20.2 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/003. 25.2 Exploiting Buffer Overflows.mp4
19.1 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/012. 5.11 Applying the VERIS Schema to Incident Handling.mp4
19.1 MB
Module 5 Mobile Device Security/Lesson 30 Mobile Device Security/002. 30.1 Understanding OWASP Mobile Device Vulnerabilities.mp4
19.1 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/003. 8.2 Understanding Chain of Custody.mp4
18.5 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/012. 3.11 Exploring Security Evasion Techniques.mp4
18.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/009. 17.8 Introducing Enumeration Techniques.mp4
18.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 23 Building Your Lab and Attack Hardware/002. 23.1 Understanding Wireless Antennas.mp4
18.3 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/005. 10.4 Analyzing Security Device Data.mp4
18.3 MB
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/004. 4.3 Deciphering Encryption Algorithms.mp4
18.3 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/004. 14.3 Introducing Cisco ACI.mp4
18.0 MB
Introduction/001. The Complete Cybersecurity Bootcamp Introduction.mp4
17.6 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/009. 5.8 Surveying Coordination Centers.mp4
17.3 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/004. 20.3 Exploring the SQL Injection Methodologies.mp4
17.2 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/009. 9.8 Surveying Windows Forensics Memory.mp4
17.0 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/005. 8.4 Handling Evidence.mp4
16.6 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/007. 20.6 Understanding SQL Injection Countermeasures.mp4
16.6 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/007. 6.6 Performing Web Log Analysis.mp4
16.4 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/015. 14.14 Exploring pxGrid.mp4
16.3 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/007. 10.6 Comparing Inline Traffic Interrogation and Taps or Traffic Monitoring.mp4
16.2 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/006. 9.5 Exploring Systems-based Sandboxing.mp4
16.2 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/005. 13.4 Configuring and Verifying Dynamic ARP Inspection.mp4
15.9 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/003. 9.2 Exploring Antimalware and Antivirus.mp4
15.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 18 Hacking Web Servers/003. 18.2 Exploring Web Server Attacks and Methodologies.mp4
15.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/003. 27.2 Understanding Authentication and Authorization Attacks.mp4
15.8 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/006. 13.5 Exploring and Mitigating Common Layer 2 Threats.mp4
15.8 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/011. 13.10 Exploring How to Secure the Control Plane.mp4
15.3 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/006. 15.5 Learning How to Scope a Penetration Testing Engagement Properly.mp4
15.3 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/009. 13.8 Understanding the Control Plane, Data Plane, and Management Plane.mp4
15.3 MB
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/002. 38.1 Introducing Social Engineering Concepts.mp4
15.2 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/006. 11.5 Surveying Authorization Models.mp4
15.2 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/009. 3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks.mp4
15.2 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/009. 19.8 Performing Command Injection Attacks.mp4
15.0 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 28 Reporting and Communication/002. 28.1 Surveying Report Writing and Handling Best Practices.mp4
14.7 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/006. 8.5 Examining Asset and Threat Actor Attribution.mp4
14.6 MB
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/006. 38.5 Understanding Identity Theft.mp4
14.6 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/005. 15.4 Understanding the Legal Concepts of Penetration Testing.mp4
14.5 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/010. 13.9 Exploring How to Secure the Management Plane.mp4
14.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/010. 16.9 Understanding Network Footprinting.mp4
14.3 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/002. 14.1 Introducing SDN.mp4
14.2 MB
Module 6 Internet of Things (IoT) Security/Lesson 36 Attacking NFC/003. 36.2 Exploring NFC Attacks and Case Studies.mp4
14.0 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/007. 25.6 Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers.mp4
13.5 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/004. 9.3 Understanding Host-based Firewalls.mp4
13.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 26 Post-Exploitation Techniques/003. 26.2 Understanding How to Perform Lateral Movement and Pivoting.mp4
13.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/002. 17.1 Surveying Network Scanning Concepts.mp4
13.4 MB
Module 6 Internet of Things (IoT) Security/Lesson 34 Hacking IoT Devices/006. 34.5 Exploring LoRA.mp4
13.3 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/002. 13.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite.mp4
13.2 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems.mp4
13.0 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/010. 3.9 Understanding Password Attacks.mp4
13.0 MB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/012. 37.11 Exploring the Concepts of DevSecOps.mp4
13.0 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/007. 16.6 Understanding Email Footprinting.mp4
12.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/005. 24.4 Introducing Aireplay-ng.mp4
12.6 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/003. 20.2 Understanding the Types of SQL Injection.mp4
12.5 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/006. 3.5 Understanding Backdoors and Man-in-the-Middle Attacks.mp4
12.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/004. 24.3 Understanding Airodump-ng.mp4
12.4 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/003. 13.2 Configuring and Verifying Port Security.mp4
12.1 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections.mp4
12.0 MB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/009. 37.8 Performing Security Assessments in Cloud Environments.mp4
11.9 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/012. 13.11 Exploring How to Secure the Data Plane.mp4
11.8 MB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/007. 37.6 Introducing the Different Cloud Deployment and Service Models.mp4
11.8 MB
Module 6 Internet of Things (IoT) Security/Lesson 34 Hacking IoT Devices/003. 34.2 Exploring ZigBee and IEEE 802.15.4.mp4
11.7 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/016. 14.15 Integrating and Automating Security Operations with Cisco Products.mp4
11.5 MB
Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/006. 29.5 Surveying Mobile Security Guidelines and Tools.mp4
11.4 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/005. 27.4 Understanding Password Storage Vulnerability.mp4
11.4 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/007. 15.6 Learning the Key Aspects of Compliance-based Assessments.mp4
11.4 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/004. 13.3 Configuring and Verifying DHCP Snooping.mp4
11.4 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 22 Wireless Client Attacks/004. 22.3 Eavesdropping and Manipulating Unencrypted Wi-Fi Communications.mp4
11.4 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/004. 12.3 Describing Flexible NetFlow Records.mp4
11.3 MB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/009. 2.8 Understanding Mandatory Access Control.mp4
11.3 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/003. 7.2 Identifying and Mitigating Weaponization.mp4
11.2 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/009. 10.8 Interpreting Common Artifact Elements from an Event to Identify an Alert.mp4
11.2 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware.mp4
11.2 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/008. 9.7 Surveying Windows Forensics Application Processes.mp4
11.1 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/007. 24.6 Introducing Airserv-ng.mp4
11.1 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/010. 5.9 Analyzing Managed Security Service Providers Incident Response Teams.mp4
11.0 MB
Module 5 Mobile Device Security/Lesson 31 Fundamentals of Android Security/003. 31.2 Exploring Android Emulators and SDK.mp4
10.8 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/004. 6.3 Deconstructing Universal Data Formats.mp4
10.7 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/011. 3.10 Understanding Wireless Attacks.mp4
10.7 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/010. 19.9 Exploiting DirectoryPath Traversal Vulnerabilities.mp4
10.6 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/005. 12.4 Understanding NetFlow Deployment.mp4
10.6 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/003. 11.2 Exploring the RADIUS Protocol.mp4
10.6 MB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/006. 2.5 Examining the Access Control Process Data States and Policy Roles.mp4
10.5 MB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/005. 2.4 Examining the Access Control Process Terminology and Data Classification.mp4
10.3 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/008. 14.7 Surveying Open Source SDN Solutions.mp4
10.3 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/007. 3.6 Understanding Denial of Service Attacks.mp4
10.3 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/006. 14.5 Understanding VXLAN and Network Overlays.mp4
10.3 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/005. 5.4 Understanding Information Sharing and Coordination.mp4
10.2 MB
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/004. 38.3 Understanding the Insider Threat.mp4
10.1 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/013. 1.12 Defining Reverse Engineering.mp4
10.1 MB
Module 6 Internet of Things (IoT) Security/Lesson 34 Hacking IoT Devices/004. 34.3 Exploring INSTEON.mp4
10.0 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/010. 1.9 Interpreting the Output Report of a Malware Analysis Tool.mp4
9.9 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/003. 14.2 Explaining North Bound and South Bound APIs in the SDN Architecture.mp4
9.9 MB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/008. 2.7 Understanding Discretionary Access Control.mp4
9.7 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/001. Module introduction.mp4
9.6 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/006. 7.5 Identifying and Mitigating Installation.mp4
9.5 MB
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/007. 38.6 Understanding Social Engineering Countermeasures.mp4
9.3 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/007. 14.6 Understanding Microsegmentation.mp4
9.3 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/008. 13.7 Understanding and Configuring CDPLLDP.mp4
9.1 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/002. 9.1 Examining Host-based Intrusion Detection.mp4
9.1 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 28 Reporting and Communication/003. 28.2 Recommending Mitigation Strategies for the Discovered Vulnerabilities.mp4
9.0 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/012. 1.11 Defining Run Book Automation (RBA).mp4
8.9 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/011. 5.10 Introducing the Vocabulary for Event Recording and Incident Sharing (VERIS).mp4
8.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/006. 20.5 Exploring Evasion Techniques.mp4
8.8 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/004. 10.3 Examining Protocol Headers.mp4
8.8 MB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/013. 2.12 Understanding Time-based Access Control.mp4
8.5 MB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/008. 37.7 Surveying Patch Management in the Cloud.mp4
8.5 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/001. Learning objectives.mp4
8.4 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 18 Hacking Web Servers/006. 18.5 Surveying Web Server Security Tools.mp4
8.4 MB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/010. 2.9 Understanding Role-based Access Control.mp4
8.3 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/008. 27.7 Improving Password Security.mp4
8.3 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/001. Learning objectives.mp4
8.3 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/005. 25.4 Understanding Fuzzing.mp4
8.1 MB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/004. 2.3 Understanding Authentication, Authorization, and Accounting.mp4
8.0 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/006. 10.5 Differentiating False Positives, False Negatives, True Positives, and True Negatives.mp4
7.9 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/003. 6.2 Understanding Data Normalization.mp4
7.9 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/009. 6.8 Understanding Security Monitoring Fundamentals.mp4
7.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/012. 16.11 Surveying Footprinting Tools.mp4
7.7 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/005. 16.4 Performing Footprinting through Social Networking Sites.mp4
7.6 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/009. 14.8 Understanding the Threats Against SDN Solutions.mp4
7.6 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/004. 7.3 Identifying and Mitigating Delivery.mp4
7.6 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/005. 11.4 Understanding Authorization.mp4
7.5 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/010. 6.9 Surveying Security Monitoring Tools.mp4
7.4 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/008. 10.7 Extracting Files from a TCP Stream when Given a PCAP File and Wireshark.mp4
7.3 MB
Summary/001. The Complete Cybersecurity Bootcamp Summary.mp4
7.3 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/008. 3.7 Surveying Attack Methods for Data Exfiltration.mp4
7.3 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/004. 11.3 Surveying the TACACS+ Protocol.mp4
7.2 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/004. 27.3 Exploring Password Storage Mechanisms.mp4
7.2 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/008. 24.7 Introducing Airtun-ng.mp4
7.2 MB
Module 6 Internet of Things (IoT) Security/Lesson 36 Attacking NFC/002. 36.1 Understanding NFC Vulnerabilities.mp4
7.2 MB
Module 5 Mobile Device Security/Lesson 32 Hacking iOS Devices/003. 32.2 Exploring Jailbraking iOS.mp4
7.0 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/010. 14.9 Understanding the Security Benefits in SDN Solutions.mp4
7.0 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 22 Wireless Client Attacks/005. 22.4 Attacking Publicly Secure Packet Forwarding (PSPF).mp4
6.9 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/007. 13.6 Understanding and Configuring BPDU Guard and Root Guard.mp4
6.8 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/009. 11.8 Exploring Examples of Multifactor and Single Sign-On.mp4
6.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 26 Post-Exploitation Techniques/004. 26.3 Understanding How to Cover Your Tracks and Clean up Systems After a Penetration Testing Engagement.mp4
6.7 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/002. 1.1 Describing the CIA Triad.mp4
6.7 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/003. 12.2 Introducing NetFlow and IPFIX.mp4
6.6 MB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/011. 2.10 Understanding Attribute-based Access Control.mp4
6.6 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/001. Learning objectives.mp4
6.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/006. 24.5 Introducing Airdecap-ng.mp4
6.5 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/008. 6.7 Performing Deterministic and Probabilistic Analysis.mp4
6.4 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/008. 7.7 Understanding Action on Objectives.mp4
6.4 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/001. Learning objectives.mp4
6.2 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/002. 12.1 Defining Network Visibility and Segmentation.mp4
6.2 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/001. Module introduction.mp4
6.2 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/001. Learning objectives.mp4
6.1 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/001. Learning objectives.mp4
6.1 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/007. 11.6 Defining Accounting.mp4
6.1 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/011. 1.10 Understanding the Different Threat Actor Types.mp4
5.9 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/007. 12.6 Exploring Application-based Segmentation.mp4
5.8 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/005. 6.4 Understanding the 5-tuple Correlation.mp4
5.8 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/004. 25.3 Overcoming Defenses for Buffer Overflow Vulnerabilities.mp4
5.7 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/005. 9.4 Exploring Application-level AllowListsBlockLists.mp4
5.7 MB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/011. 37.10 Understanding Container Orchestration and an Introduction to Kubernetes.mp4
5.7 MB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/001. Learning objectives.mp4
5.6 MB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/001. Learning objectives.mp4
5.6 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/001. Learning objectives.mp4
5.6 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/014. 3.13 Identifying Potential Data Loss from Provided Traffic Profiles.mp4
5.6 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/006. 6.5 Performing DNS Analysis.mp4
5.5 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/013. 5.12 Surveying the VERIS Incident Recording Tool and Other Resources.mp4
5.5 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/001. Learning objectives.mp4
5.4 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/003. 24.2 Introducing Airmon-ng.mp4
5.4 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/001. Learning objectives.mp4
5.4 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/006. 12.5 Introducing Network Segmentation.mp4
5.4 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/007. 7.6 Identifying and Mitigating Command and Control.mp4
5.3 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/001. Learning objectives.mp4
5.3 MB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/014. 1.13 Understanding the Sliding Window Anomaly Detection.mp4
5.0 MB
Module 5 Mobile Device Security/Lesson 32 Hacking iOS Devices/004. 32.3 Surveying Tools for Disassembling iOS Applications.mp4
5.0 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/008. 12.7 Describing Network Access with CoA.mp4
5.0 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 22 Wireless Client Attacks/006. 22.5 Attacking the Preferred Network List (PNL).mp4
4.8 MB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/005. 3.4 Understanding Privilege Escalation and Code Execution Attacks.mp4
4.7 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 22 Wireless Client Attacks/003. 22.2 Learning Packet Injection Attacks.mp4
4.7 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/006. 5.5 Identifying the Incident Response Team Structure.mp4
4.6 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/001. Module introduction.mp4
4.5 MB
Module 5 Mobile Device Security/Lesson 32 Hacking iOS Devices/002. 32.1 Introducing iOS Security.mp4
4.5 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/001. Learning objectives.mp4
4.4 MB
Module 6 Internet of Things (IoT) Security/Lesson 35 Attacking Bluetooth/002. 35.1 Attacking Bluetooth.mp4
4.4 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/001. Learning objectives.mp4
4.3 MB
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/001. Learning objectives.mp4
3.9 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/001. Learning objectives.mp4
3.9 MB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/004. 37.3 Understanding Serverless Computing.mp4
3.9 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/012. 14.11 Exploring DevNet and DevNet Resources for Security Automation.mp4
3.9 MB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/001. Learning objectives.mp4
3.9 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/001. Learning objectives.mp4
3.8 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/001. Learning objectives.mp4
3.7 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/001. Learning objectives.mp4
3.7 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/001. Learning objectives.mp4
3.5 MB
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/001. Learning objectives.mp4
3.4 MB
Module 8 Social Engineering Fundamentals/001. Module introduction.mp4
3.4 MB
Module 7 Cloud Security Fundamentals/001. Module introduction.mp4
3.3 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/005. 7.4 Identifying and Mitigating Exploitation.mp4
3.3 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/001. Learning objectives.mp4
3.2 MB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/001. Learning objectives.mp4
3.1 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 26 Post-Exploitation Techniques/001. Learning objectives.mp4
3.0 MB
Module 1 Security Concepts/001. Module introduction.mp4
3.0 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 28 Reporting and Communication/001. Learning objectives.mp4
3.0 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 22 Wireless Client Attacks/001. Learning objectives.mp4
2.9 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 18 Hacking Web Servers/001. Learning objectives.mp4
2.9 MB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/001. Learning objectives.mp4
2.8 MB
Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/001. Learning objectives.mp4
2.7 MB
Module 5 Mobile Device Security/Lesson 30 Mobile Device Security/001. Learning objectives.mp4
2.6 MB
Module 5 Mobile Device Security/Lesson 31 Fundamentals of Android Security/001. Learning objectives.mp4
2.5 MB
Module 6 Internet of Things (IoT) Security/Lesson 34 Hacking IoT Devices/001. Learning objectives.mp4
2.5 MB
Module 5 Mobile Device Security/001. Module introduction.mp4
2.5 MB
Module 6 Internet of Things (IoT) Security/001. Module introduction.mp4
2.4 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 23 Building Your Lab and Attack Hardware/001. Learning objectives.mp4
2.3 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/001. Learning objectives.mp4
2.1 MB
Module 5 Mobile Device Security/Lesson 32 Hacking iOS Devices/001. Learning objectives.mp4
2.0 MB
Module 6 Internet of Things (IoT) Security/Lesson 36 Attacking NFC/001. Learning ojectives.mp4
1.8 MB
Module 6 Internet of Things (IoT) Security/Lesson 35 Attacking Bluetooth/001. Learning objectives.mp4
1.6 MB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/004. 15.3 Explaining the Importance of the Planning and Preparation Phase en.srt
28.0 kB
Module 5 Mobile Device Security/Lesson 31 Fundamentals of Android Security/004. 31.3 Understanding Android Hacking Tools and Methodologies en.srt
27.1 kB
Module 5 Mobile Device Security/Lesson 31 Fundamentals of Android Security/002. 31.1 Hacking Android Devices en.srt
25.0 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/007. 9.6 Understanding Windows Forensics Basics en.srt
24.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/008. 19.7 Attacking Authentication, Authorization, and Access Controls - Part 2 en.srt
23.7 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/009. 7.8 Understanding the MITRE ATT&CK Framework en.srt
22.7 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/011. 6.10 Grasping Security Monitoring Operational Challenges en.srt
21.5 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/004. 8.3 Understanding Evidence Collection en.srt
21.0 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/012. 19.11 Exploiting Cross-site Scripting (XSS) Vulnerabilities en.srt
20.0 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/005. 20.4 Exploring SQL Injection Tools en.srt
20.0 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/012. 9.11 Understanding Linux and MAC OS X Forensics Basics en.srt
19.8 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/006. 27.5 Cracking Passwords with John the Ripper en.srt
19.6 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/002. 3.1 Surveying Types of Vulnerabilities en.srt
18.8 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/004. 19.3 Footprinting Web Infrastructures en.srt
18.8 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/003. 3.2 Understanding Passive Reconnaissance and Social Engineering en.srt
18.8 kB
Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/003. 29.2 Hacking iOS en.srt
18.6 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/008. 5.7 Analyzing Product Security Incident Response Teams (PSIRTs) en.srt
17.8 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/002. 11.1 Understanding Authentication en.srt
17.8 kB
Module 6 Internet of Things (IoT) Security/Lesson 34 Hacking IoT Devices/005. 34.4 Exploring ZWave en.srt
17.8 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/004. 21.3 Exploring Wireless Threats en.srt
17.7 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/004. 5.3 Scoping the Incident Response Plan and Process en.srt
17.5 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/007. 17.6 Scanning Beyond IDS and Firewall en.srt
17.4 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/004. 3.3 Understanding Active Reconnaissance Port Scanning and Host Profiling en.srt
17.1 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/013. 14.12 Introducing APIs, NETCONF, RESTCONF, and YANG en.srt
17.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/011. 16.10 Performing Footprinting through Social Engineering en.srt
17.0 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/008. 25.7 Surveying Tools to Find and Exploit Buffer Overflows en.srt
16.9 kB
Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/002. 29.1 Understanding Mobile Platform Attack Vectors en.srt
16.9 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/014. 19.13 Attacking Web Services, APIs, and Understanding Webhooks en.srt
16.3 kB
Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/004. 29.3 Hacking Android OS en.srt
16.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 18 Hacking Web Servers/002. 18.1 Introducing Web Server Concepts en.srt
16.0 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 18 Hacking Web Servers/004. 18.3 Surveying Web Server Attack Tools en.srt
15.9 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/006. 25.5 Creating a Fuzzing Strategy en.srt
15.9 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/005. 17.4 Understanding Port and Service Discovery en.srt
15.8 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/002. 6.1 Describing Endpoint-based Attacks en.srt
15.7 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/003. 15.2 Exploring Penetration Testing Methodologies en.srt
15.6 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/015. 17.14 Conducting Additional Enumeration Techniques en.srt
15.4 kB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/002. 33.1 Introducing IoT Concepts en.srt
15.3 kB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/002. 37.1 Introducing Cloud Computing Concepts en.srt
15.3 kB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/005. 33.4 Surveying IoT Hacking Tools en.srt
15.2 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/003. 21.2 Understanding Wireless Encryption en.srt
15.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/011. 17.1 Performing SNMP Enumeration en.srt
15.0 kB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/003. 33.2 Understanding IoT Attacks en.srt
14.7 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/002. 25.1 Understanding Buffer Overflows en.srt
14.5 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/014. 17.13 Performing SMTP and DNS Enumeration en.srt
14.4 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/004. 17.3 Understanding Host Discovery en.srt
14.3 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/011. 14.10 Introducing Network Programmability en.srt
13.8 kB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/003. 2.2 Comparing Threats, Vulnerabilities, and Exploits en.srt
13.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/007. 27.6 Cracking Passwords with hashcat en.srt
13.0 kB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/010. 37.9 Introducing Agile, DevOps, and CICD Pipelines en.srt
13.0 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/013. 17.12 Performing NTP and NFS Enumeration en.srt
12.8 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/007. 5.6 Analyzing Computer Incident Response Teams (CSIRTs) en.srt
12.8 kB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/007. 2.6 Examining the Access Control Process Security and Access Control Classification en.srt
12.7 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/002. 10.1 Introducing Intrusion Analysis Fundamentals en.srt
12.6 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/002. 7.1 Identifying and Mitigating Reconnaissance en.srt
12.5 kB
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/003. 38.2 Exploring Social Engineering Techniques en.srt
12.2 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/006. 16.5 Understanding Website Footprinting en.srt
12.2 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/002. 19.1 Introducing Web Application Concepts en.srt
12.2 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/013. 3.12 Identifying the Challenges of Data Visibility in Detection en.srt
12.1 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/002. 8.1 Examining Types of Evidence en.srt
12.1 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/011. 9.10 Surveying Windows Forensics Hard Drives, FAT, and NTFS en.srt
12.1 kB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/006. 37.5 Understanding Cloud Hacking and Cloud Security Implementations en.srt
12.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 26 Post-Exploitation Techniques/002. 26.1 Maintaining Persistence After Compromising a System en.srt
11.8 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/008. 1.7 Defining Threat Hunting en.srt
11.8 kB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/005. 37.4 Surveying Cloud Computing Threats en.srt
11.7 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/003. 19.2 Understanding Web App Threats and Hacking Methodologies en.srt
11.7 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/003. 25.2 Exploiting Buffer Overflows en.srt
11.7 kB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/002. 2.1 Performing Risk Assessment en.srt
11.7 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/005. 14.4 Introducing Cisco DNA and Cisco DNA Center en.srt
11.5 kB
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/007. 4.6 Examining Digital Certificates en.srt
11.4 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/010. 9.9 Surveying Windows Forensics The Windows Registry en.srt
11.3 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/009. 16.8 Understanding DNS Footprinting en.srt
11.3 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/005. 19.4 Analyzing Web Applications en.srt
11.3 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 23 Building Your Lab and Attack Hardware/003. 23.2 Surveying Wi-Fi Devices Like the Pinneaple en.srt
11.3 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/007. 21.6 Hacking Bluetooth en.srt
11.2 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/003. 17.2 Exploiting Scanning Tools en.srt
11.1 kB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/009. 33.8 Understanding OT Hacking Methodologies en.srt
11.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/006. 15.5 Learning How to Scope a Penetration Testing Engagement Properly en.srt
10.9 kB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/008. 33.7 Performing OT Attacks en.srt
10.8 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/012. 3.11 Exploring Security Evasion Techniques en.srt
10.8 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/009. 3.8 Understanding ARP Cache Poisoning and Route Manipulation Attacks en.srt
10.7 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/006. 21.5 Surveying Wireless Hacking Tools en.srt
10.6 kB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/010. 33.9 Surveying OT Hacking Tools en.srt
10.6 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/007. 25.6 Exploring Mutation-based, Generation-based, and Evolutionary Fuzzers en.srt
10.4 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/014. 14.13 A Brief Introduction to Git en.srt
10.3 kB
Module 6 Internet of Things (IoT) Security/Lesson 34 Hacking IoT Devices/006. 34.5 Exploring LoRA en.srt
10.3 kB
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/002. 38.1 Introducing Social Engineering Concepts en.srt
10.3 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/003. 8.2 Understanding Chain of Custody en.srt
10.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/002. 24.1 Introducing the Aircrack-ng Suite en.srt
9.9 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/008. 21.7 Introducing Wireless Countermeasures en.srt
9.9 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/010. 17.9 Performing NetBIOS Enumeration en.srt
9.8 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/005. 15.4 Understanding the Legal Concepts of Penetration Testing en.srt
9.8 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/004. 16.3 Performing Footprinting through Web Services en.srt
9.6 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/002. 15.1 Introducing Ethical Hacking and Pen Testing en.srt
9.6 kB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/003. 37.2 Exploring Container Technology en.srt
9.6 kB
Module 6 Internet of Things (IoT) Security/Lesson 36 Attacking NFC/003. 36.2 Exploring NFC Attacks and Case Studies en.srt
9.5 kB
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/005. 4.4 Understanding Hashing Algorithms en.srt
9.5 kB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/007. 33.6 Introducing OT Concepts en.srt
9.5 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 22 Wireless Client Attacks/002. 22.1 Understanding Wireless Client Attacks and Their Motives en.srt
9.4 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/007. 19.6 Attacking Authentication, Authorization, and Access Controls - Part 1 en.srt
9.4 kB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/011. 33.10 Understanding OT Countermeasures en.srt
9.3 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/009. 9.8 Surveying Windows Forensics Memory en.srt
9.3 kB
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/005. 38.4 Impersonation on Social Networking Sites en.srt
9.2 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/004. 14.3 Introducing Cisco ACI en.srt
9.1 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/006. 3.5 Understanding Backdoors and Man-in-the-Middle Attacks en.srt
9.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/013. 19.12 Exploiting XML External Entities en.srt
9.1 kB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/004. 33.3 Understanding IoT Hacking Methodologies en.srt
9.1 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/013. 9.12 Examining Web Server Logs en.srt
9.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/002. 20.1 Introducing SQL Injection Concepts en.srt
9.1 kB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/006. 2.5 Examining the Access Control Process Data States and Policy Roles en.srt
9.0 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/002. 16.1 Introducing Footprinting Concepts and Methodologies en.srt
9.0 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 18 Hacking Web Servers/005. 18.4 Understanding Patch Management en.srt
9.0 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/006. 17.5 Performing OS Discovery (Banner GrabbingOS Fingerprinting) en.srt
9.0 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/009. 13.8 Understanding the Control Plane, Data Plane, and Management Plane en.srt
9.0 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/008. 11.7 Exploring Multifactor Authentication and Single Sign-On en.srt
8.9 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/003. 16.2 Performing Footprinting through Search Engines en.srt
8.7 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/003. 9.2 Exploring Antimalware and Antivirus en.srt
8.6 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/007. 3.6 Understanding Denial of Service Attacks en.srt
8.6 kB
Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/005. 29.4 Understanding Mobile Device Management en.srt
8.5 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/005. 10.4 Analyzing Security Device Data en.srt
8.5 kB
Module 6 Internet of Things (IoT) Security/Lesson 34 Hacking IoT Devices/004. 34.3 Exploring INSTEON en.srt
8.3 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/003. 27.2 Understanding Authentication and Authorization Attacks en.srt
8.3 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/003. 10.2 Examining Packet Captures en.srt
8.2 kB
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/002. 4.1 Understanding the Basic Components of Cryptography en.srt
8.2 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/005. 8.4 Handling Evidence en.srt
8.1 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/011. 13.10 Exploring How to Secure the Control Plane en.srt
8.1 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/002. 14.1 Introducing SDN en.srt
8.0 kB
Module 6 Internet of Things (IoT) Security/Lesson 34 Hacking IoT Devices/002. 34.1 Surveying Tools for Dissasembling iOS Applications en.srt
7.9 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 28 Reporting and Communication/002. 28.1 Surveying Report Writing and Handling Best Practices en.srt
7.9 kB
Module 6 Internet of Things (IoT) Security/Lesson 34 Hacking IoT Devices/003. 34.2 Exploring ZigBee and IEEE 802.15.4 en.srt
7.9 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/015. 14.14 Exploring pxGrid en.srt
7.8 kB
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/006. 38.5 Understanding Identity Theft en.srt
7.7 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/006. 8.5 Examining Asset and Threat Actor Attribution en.srt
7.6 kB
Module 5 Mobile Device Security/Lesson 30 Mobile Device Security/002. 30.1 Understanding OWASP Mobile Device Vulnerabilities en.srt
7.6 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/007. 15.6 Learning the Key Aspects of Compliance-based Assessments en.srt
7.5 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 18 Hacking Web Servers/003. 18.2 Exploring Web Server Attacks and Methodologies en.srt
7.4 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/008. 17.7 Creating Network Diagrams en.srt
7.4 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 22 Wireless Client Attacks/004. 22.3 Eavesdropping and Manipulating Unencrypted Wi-Fi Communications en.srt
7.3 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/002. 13.1 Configuring and Verifying Network Segmentation Using VLANs and VRF-lite en.srt
7.3 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/005. 13.4 Configuring and Verifying Dynamic ARP Inspection en.srt
7.3 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/002. 21.1 Introducing Wireless Concepts en.srt
7.2 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/010. 13.9 Exploring How to Secure the Management Plane en.srt
7.2 kB
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/006. 33.5 Understanding IoT Countermeasures en.srt
7.1 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/002. 5.1 Describing Concepts as Documented in NIST.SP800-86 en.srt
7.0 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/011. 3.10 Understanding Wireless Attacks en.srt
6.9 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/005. 21.4 Understanding Wireless Hacking Methodologies en.srt
6.9 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/011. 19.1 Input Validation and Sanitation en.srt
6.9 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/007. 1.6 Defining Threat Intelligence en.srt
6.8 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/004. 1.3 Comparing Security Deployments Agentless and Agent-based Protections en.srt
6.8 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/010. 16.9 Understanding Network Footprinting en.srt
6.7 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/006. 11.5 Surveying Authorization Models en.srt
6.7 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/012. 5.11 Applying the VERIS Schema to Incident Handling en.srt
6.6 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/006. 9.5 Exploring Systems-based Sandboxing en.srt
6.6 kB
Module 6 Internet of Things (IoT) Security/Lesson 35 Attacking Bluetooth/003. 35.2 Surveying Tools for Bluetooth Monitoring en.srt
6.6 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/013. 1.12 Defining Reverse Engineering en.srt
6.6 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/005. 1.4 Comparing Security Deployments Legacy Antivirus and Antimalware en.srt
6.5 kB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/008. 2.7 Understanding Discretionary Access Control en.srt
6.5 kB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/007. 37.6 Introducing the Different Cloud Deployment and Service Models en.srt
6.4 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/009. 10.8 Interpreting Common Artifact Elements from an Event to Identify an Alert en.srt
6.4 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/010. 3.9 Understanding Password Attacks en.srt
6.4 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/007. 14.6 Understanding Microsegmentation en.srt
6.3 kB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/009. 2.8 Understanding Mandatory Access Control en.srt
6.3 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/004. 9.3 Understanding Host-based Firewalls en.srt
6.2 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/009. 19.8 Performing Command Injection Attacks en.srt
6.2 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/006. 19.5 Introducing the OWASP Top 10 en.srt
6.2 kB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/012. 37.11 Exploring the Concepts of DevSecOps en.srt
6.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/005. 25.4 Understanding Fuzzing en.srt
6.1 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/006. 13.5 Exploring and Mitigating Common Layer 2 Threats en.srt
6.1 kB
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/006. 4.5 Examining Secure Socket Layer and Transport Layer Security en.srt
6.0 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/003. 5.2 Mapping the Organization Stakeholders Against the NIST IR Categories en.srt
6.0 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/008. 16.7 Understanding Whois Footprinting en.srt
5.9 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/010. 19.9 Exploiting DirectoryPath Traversal Vulnerabilities en.srt
5.9 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/004. 12.3 Describing Flexible NetFlow Records en.srt
5.8 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/012. 13.11 Exploring How to Secure the Data Plane en.srt
5.7 kB
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/004. 4.3 Deciphering Encryption Algorithms en.srt
5.7 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/006. 1.5 Comparing Security Deployments SIEM, SOAR, and Log Management en.srt
5.7 kB
Module 5 Mobile Device Security/Lesson 31 Fundamentals of Android Security/003. 31.2 Exploring Android Emulators and SDK en.srt
5.7 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 26 Post-Exploitation Techniques/003. 26.2 Understanding How to Perform Lateral Movement and Pivoting en.srt
5.6 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 22 Wireless Client Attacks/005. 22.4 Attacking Publicly Secure Packet Forwarding (PSPF) en.srt
5.6 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/005. 27.4 Understanding Password Storage Vulnerability en.srt
5.5 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/009. 5.8 Surveying Coordination Centers en.srt
5.5 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/007. 6.6 Performing Web Log Analysis en.srt
5.5 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/008. 9.7 Surveying Windows Forensics Application Processes en.srt
5.4 kB
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/003. 4.2 Introducing Public Key Infrastructure en.srt
5.4 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/007. 20.6 Understanding SQL Injection Countermeasures en.srt
5.3 kB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/009. 37.8 Performing Security Assessments in Cloud Environments en.srt
5.3 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/016. 14.15 Integrating and Automating Security Operations with Cisco Products en.srt
5.2 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/003. 11.2 Exploring the RADIUS Protocol en.srt
5.2 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/003. 13.2 Configuring and Verifying Port Security en.srt
5.2 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/011. 1.10 Understanding the Different Threat Actor Types en.srt
5.2 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/002. 9.1 Examining Host-based Intrusion Detection en.srt
5.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 28 Reporting and Communication/004. 28.3 Explaining the Importance of Appropriate Communication en.srt
5.1 kB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/005. 2.4 Examining the Access Control Process Terminology and Data Classification en.srt
5.0 kB
Module 6 Internet of Things (IoT) Security/Lesson 36 Attacking NFC/002. 36.1 Understanding NFC Vulnerabilities en.srt
4.9 kB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/008. 37.7 Surveying Patch Management in the Cloud en.srt
4.9 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/008. 14.7 Surveying Open Source SDN Solutions en.srt
4.8 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/006. 14.5 Understanding VXLAN and Network Overlays en.srt
4.8 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/004. 25.3 Overcoming Defenses for Buffer Overflow Vulnerabilities en.srt
4.8 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/015. 3.14 Comparing Rule-based Detection vs. Behavioral and Statistical Detection en.srt
4.6 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 23 Building Your Lab and Attack Hardware/004. 23.3 Building Your Own Lab en.srt
4.6 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/002. 27.1 Understanding Authentication and Authorization Mechanisms en.srt
4.6 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/010. 5.9 Analyzing Managed Security Service Providers Incident Response Teams en.srt
4.6 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/004. 20.3 Exploring the SQL Injection Methodologies en.srt
4.6 kB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/012. 2.11 Understanding Rule-based Access Control en.srt
4.5 kB
Module 5 Mobile Device Security/Lesson 32 Hacking iOS Devices/003. 32.2 Exploring Jailbraking iOS en.srt
4.5 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/004. 24.3 Understanding Airodump-ng en.srt
4.5 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/002. 1.1 Describing the CIA Triad en.srt
4.4 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/004. 6.3 Deconstructing Universal Data Formats en.srt
4.4 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/009. 1.8 Understanding Malware Analysis en.srt
4.4 kB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/004. 2.3 Understanding Authentication, Authorization, and Accounting en.srt
4.3 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/009. 17.8 Introducing Enumeration Techniques en.srt
4.3 kB
Introduction/001. The Complete Cybersecurity Bootcamp Introduction en.srt
4.3 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/005. 5.4 Understanding Information Sharing and Coordination en.srt
4.2 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/010. 6.9 Surveying Security Monitoring Tools en.srt
4.2 kB
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/007. 38.6 Understanding Social Engineering Countermeasures en.srt
4.2 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/005. 12.4 Understanding NetFlow Deployment en.srt
4.2 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/007. 24.6 Introducing Airserv-ng en.srt
4.2 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/003. 6.2 Understanding Data Normalization en.srt
4.2 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/006. 10.5 Differentiating False Positives, False Negatives, True Positives, and True Negatives en.srt
4.2 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/008. 3.7 Surveying Attack Methods for Data Exfiltration en.srt
4.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/012. 16.11 Surveying Footprinting Tools en.srt
4.1 kB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/010. 2.9 Understanding Role-based Access Control en.srt
4.1 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/004. 13.3 Configuring and Verifying DHCP Snooping en.srt
4.0 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/003. 20.2 Understanding the Types of SQL Injection en.srt
4.0 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/006. 7.5 Identifying and Mitigating Installation en.srt
3.9 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/005. 24.4 Introducing Aireplay-ng en.srt
3.9 kB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/011. 2.10 Understanding Attribute-based Access Control en.srt
3.9 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/009. 6.8 Understanding Security Monitoring Fundamentals en.srt
3.9 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/007. 16.6 Understanding Email Footprinting en.srt
3.9 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/012. 17.11 Performing LDAP Enumeration en.srt
3.8 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/004. 27.3 Exploring Password Storage Mechanisms en.srt
3.8 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/009. 14.8 Understanding the Threats Against SDN Solutions en.srt
3.8 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/003. 14.2 Explaining North Bound and South Bound APIs in the SDN Architecture en.srt
3.8 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/008. 27.7 Improving Password Security en.srt
3.8 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 18 Hacking Web Servers/006. 18.5 Surveying Web Server Security Tools en.srt
3.8 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/005. 11.4 Understanding Authorization en.srt
3.7 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 23 Building Your Lab and Attack Hardware/002. 23.1 Understanding Wireless Antennas en.srt
3.7 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/003. 7.2 Identifying and Mitigating Weaponization en.srt
3.7 kB
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/004. 38.3 Understanding the Insider Threat en.srt
3.6 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/008. 13.7 Understanding and Configuring CDPLLDP en.srt
3.6 kB
Module 5 Mobile Device Security/Lesson 32 Hacking iOS Devices/002. 32.1 Introducing iOS Security en.srt
3.6 kB
Module 5 Mobile Device Security/Lesson 30 Mobile Device Security/003. 30.2 Wrestling with the BYOD Dilemma en.srt
3.5 kB
Module 5 Mobile Device Security/Lesson 30 Mobile Device Security/004. 30.3 Understanding Mobile Device Management (MDM) en.srt
3.5 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/008. 7.7 Understanding Action on Objectives en.srt
3.5 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/002. 12.1 Defining Network Visibility and Segmentation en.srt
3.4 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/004. 11.3 Surveying the TACACS+ Protocol en.srt
3.4 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 28 Reporting and Communication/003. 28.2 Recommending Mitigation Strategies for the Discovered Vulnerabilities en.srt
3.3 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/011. 5.10 Introducing the Vocabulary for Event Recording and Incident Sharing (VERIS) en.srt
3.3 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 22 Wireless Client Attacks/006. 22.5 Attacking the Preferred Network List (PNL) en.srt
3.2 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/005. 16.4 Performing Footprinting through Social Networking Sites en.srt
3.2 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/004. 10.3 Examining Protocol Headers en.srt
3.2 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/007. 13.6 Understanding and Configuring BPDU Guard and Root Guard en.srt
3.2 kB
Module 6 Internet of Things (IoT) Security/Lesson 35 Attacking Bluetooth/002. 35.1 Attacking Bluetooth en.srt
3.2 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/003. 12.2 Introducing NetFlow and IPFIX en.srt
3.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/002. 17.1 Surveying Network Scanning Concepts en.srt
3.1 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/012. 1.11 Defining Run Book Automation (RBA) en.srt
3.1 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/007. 12.6 Exploring Application-based Segmentation en.srt
3.0 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 26 Post-Exploitation Techniques/004. 26.3 Understanding How to Cover Your Tracks and Clean up Systems After a Penetration Testing Engagement en.srt
3.0 kB
Module 5 Mobile Device Security/Lesson 30 Mobile Device Security/005. 30.4 Understanding Mobile Device Security Policies en.srt
3.0 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/005. 3.4 Understanding Privilege Escalation and Code Execution Attacks en.srt
3.0 kB
Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/006. 29.5 Surveying Mobile Security Guidelines and Tools en.srt
3.0 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/004. 7.3 Identifying and Mitigating Delivery en.srt
2.9 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/007. 10.6 Comparing Inline Traffic Interrogation and Taps or Traffic Monitoring en.srt
2.9 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/014. 3.13 Identifying Potential Data Loss from Provided Traffic Profiles en.srt
2.9 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/005. 9.4 Exploring Application-level AllowListsBlockLists en.srt
2.8 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/010. 14.9 Understanding the Security Benefits in SDN Solutions en.srt
2.8 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/007. 11.6 Defining Accounting en.srt
2.8 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/005. 6.4 Understanding the 5-tuple Correlation en.srt
2.8 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 22 Wireless Client Attacks/003. 22.2 Learning Packet Injection Attacks en.srt
2.8 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/006. 20.5 Exploring Evasion Techniques en.srt
2.8 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/006. 12.5 Introducing Network Segmentation en.srt
2.7 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/006. 5.5 Identifying the Incident Response Team Structure en.srt
2.6 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/008. 6.7 Performing Deterministic and Probabilistic Analysis en.srt
2.6 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/006. 24.5 Introducing Airdecap-ng en.srt
2.5 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/008. 12.7 Describing Network Access with CoA en.srt
2.5 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/009. 11.8 Exploring Examples of Multifactor and Single Sign-On en.srt
2.4 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/007. 7.6 Identifying and Mitigating Command and Control en.srt
2.4 kB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/011. 37.10 Understanding Container Orchestration and an Introduction to Kubernetes en.srt
2.4 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/003. 24.2 Introducing Airmon-ng en.srt
2.4 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/008. 24.7 Introducing Airtun-ng en.srt
2.3 kB
Module 5 Mobile Device Security/Lesson 32 Hacking iOS Devices/004. 32.3 Surveying Tools for Disassembling iOS Applications en.srt
2.1 kB
Module 1 Security Concepts/Lesson 3 Types of Attacks and Vulnerabilities/001. Learning objectives en.srt
2.1 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/013. 5.12 Surveying the VERIS Incident Recording Tool and Other Resources en.srt
2.1 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/001. Module introduction en.srt
2.0 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/006. 6.5 Performing DNS Analysis en.srt
2.0 kB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/004. 37.3 Understanding Serverless Computing en.srt
1.9 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/003. 1.2 Comparing Security Deployments Network, Endpoint, and Application Security Systems en.srt
1.9 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/014. 1.13 Understanding the Sliding Window Anomaly Detection en.srt
1.8 kB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/013. 2.12 Understanding Time-based Access Control en.srt
1.7 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/010. 1.9 Interpreting the Output Report of a Malware Analysis Tool en.srt
1.7 kB
Summary/001. The Complete Cybersecurity Bootcamp Summary en.srt
1.7 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/001. Learning objectives en.srt
1.6 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 14 Software-Defined Networking Security and Programmability/012. 14.11 Exploring DevNet and DevNet Resources for Security Automation en.srt
1.6 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/005. 7.4 Identifying and Mitigating Exploitation en.srt
1.5 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 19 Hacking Web Applications/001. Learning objectives en.srt
1.3 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 7 Intrusion Event Categories/001. Learning objectives en.srt
1.3 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 17 Active Reconnaissance, Scanning, and Enumeration/001. Learning objectives en.srt
1.2 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/001. Module introduction en.srt
1.2 kB
Module 1 Security Concepts/Lesson 1 Cybersecurity Fundamentals/001. Learning objectives en.srt
1.2 kB
Module 7 Cloud Security Fundamentals/Lesson 37 Understanding Cloud Security/001. Learning objectives en.srt
1.1 kB
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 13 Network Infrastructure Security/001. Learning objectives en.srt
1.1 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/008. 10.7 Extracting Files from a TCP Stream when Given a PCAP File and Wireshark en.srt
1.1 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 6 Fundamentals of Security Monitoring/001. Learning objectives en.srt
1.0 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 9 Endpoint Security Technologies and Host-based Forensics Fundamentals/001. Learning objectives en.srt
1.0 kB
Module 1 Security Concepts/Lesson 2 Additional Cybersecurity Principles/001. Learning objectives en.srt
1.0 kB
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 10 Network Intrusion Analysis/001. Learning objectives en.srt
1.0 kB
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 15 Overview of Ethical Hacking and Penetration Testing/001. Learning objectives en.srt
891 Bytes
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 16 Information Gathering and Passive Reconnaissance/001. Learning objectives en.srt
890 Bytes
Module 2 Security Operations, Incident Response, and Digital Forensics/001. Module introduction en.srt
869 Bytes
Module 1 Security Concepts/Lesson 4 Fundamentals of Cryptography and PKI/001. Learning objectives en.srt
810 Bytes
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 27 Hacking User Credentials/001. Learning objectives en.srt
745 Bytes
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 25 Buffer Overflows/001. Learning objectives en.srt
732 Bytes
Module 7 Cloud Security Fundamentals/001. Module introduction en.srt
725 Bytes
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 5 Fundamentals of Incident Response/001. Learning objectives en.srt
706 Bytes
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 12 Network Visibility and Segmentation/001. Learning objectives en.srt
703 Bytes
Module 8 Social Engineering Fundamentals/001. Module introduction en.srt
678 Bytes
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 20 SQL Injection/001. Learning objectives en.srt
674 Bytes
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 21 Fundamentals of Wireless Hacking/001. Learning objectives en.srt
670 Bytes
Module 8 Social Engineering Fundamentals/Lesson 38 Understanding Social Engineering Countermeasures/001. Learning objectives en.srt
665 Bytes
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 28 Reporting and Communication/001. Learning objectives en.srt
664 Bytes
Module 6 Internet of Things (IoT) Security/Lesson 33 Fundamentals of IoT Security/001. Learning objectives en.srt
659 Bytes
Module 3 Security Operations, Incident Response, and Digital Forensics/Lesson 11 Introducing AAA and Identity Management/001. Learning objectives en.srt
606 Bytes
Module 1 Security Concepts/001. Module introduction en.srt
594 Bytes
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 22 Wireless Client Attacks/001. Learning objectives en.srt
578 Bytes
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 26 Post-Exploitation Techniques/001. Learning objectives en.srt
577 Bytes
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 18 Hacking Web Servers/001. Learning objectives en.srt
544 Bytes
Module 2 Security Operations, Incident Response, and Digital Forensics/Lesson 8 Digital Forensics Fundamentals/001. Learning objectives en.srt
541 Bytes
Module 5 Mobile Device Security/Lesson 29 Hacking Mobile Platforms/001. Learning objectives en.srt
520 Bytes
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 23 Building Your Lab and Attack Hardware/001. Learning objectives en.srt
481 Bytes
Module 5 Mobile Device Security/Lesson 31 Fundamentals of Android Security/001. Learning objectives en.srt
480 Bytes
Module 6 Internet of Things (IoT) Security/001. Module introduction en.srt
472 Bytes
Module 5 Mobile Device Security/001. Module introduction en.srt
468 Bytes
Module 6 Internet of Things (IoT) Security/Lesson 34 Hacking IoT Devices/001. Learning objectives en.srt
420 Bytes
Module 5 Mobile Device Security/Lesson 30 Mobile Device Security/001. Learning objectives en.srt
413 Bytes
Module 5 Mobile Device Security/Lesson 32 Hacking iOS Devices/001. Learning objectives en.srt
334 Bytes
Module 4 Fundamentals of Ethical Hacking and Penetration Testing/Lesson 24 Aircrack-ng/001. Learning objectives en.srt
310 Bytes
Module 6 Internet of Things (IoT) Security/Lesson 35 Attacking Bluetooth/001. Learning objectives en.srt
294 Bytes
Module 6 Internet of Things (IoT) Security/Lesson 36 Attacking NFC/001. Learning ojectives en.srt
282 Bytes
随机展示
相关说明
本站不存储任何资源内容,只收集BT种子元数据(例如文件名和文件大小)和磁力链接(BT种子标识符),并提供查询服务,是一个完全合法的搜索引擎系统。 网站不提供种子下载服务,用户可以通过第三方链接或磁力链接获取到相关的种子资源。本站也不对BT种子真实性及合法性负责,请用户注意甄别!